<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://bloghub.cict.com.au/blog/google-workspace-is-getting-a-new-ai-powered-video-creation-tool</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/5-cybersecurity-predictions-for-2024-you-should-plan-for</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-3.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD3</image:caption><image:title>CICTBlogPostFeaturedArtworkD3</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2025-01-14</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/why-your-business-needs-to-use-a-password-manager-now</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/7-customer-facing-technologies-to-give-you-an-advantage</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/upgrade-your-business-digital-defence-with-physical-keys</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BBlog%20Post%5D%20Featured%20Image.jpg</image:loc><image:caption>BlogPostFeaturedImage</image:caption><image:title>BlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Image%20%20Designed-2-1.jpg</image:loc><image:caption>CICTBlogPostFeaturedImageDesigned21</image:caption><image:title>CICTBlogPostFeaturedImageDesigned21</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-2.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD2</image:caption><image:title>CICTBlogPostFeaturedArtworkD2</image:title></image:image><lastmod>2024-02-19</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/how-to-properly-deploy-iot-on-a-business-network</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BBlog%20Post%5D%20Featured%20Image.jpg</image:loc><image:caption>BlogPostFeaturedImage</image:caption><image:title>BlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Image%20%20Designed-2-1.jpg</image:loc><image:caption>CICTBlogPostFeaturedImageDesigned21</image:caption><image:title>CICTBlogPostFeaturedImageDesigned21</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/data-backup-is-not-enough-you-also-need-data-protection</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/empowering-your-team-with-ai-a-guide-to-ethical-and-effective-use</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/elevate-your-meetings-with-the-yealink-meetingboard-65</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/protect-your-data-10-essential-data-breach-strategies</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-2.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD2</image:caption><image:title>CICTBlogPostFeaturedArtworkD2</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/your-guide-to-safer-browser-extension-use</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/threat-modelling-your-secret-weapon-against-cyber-attacks</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2025-01-14</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/from-phishing-to-phishing-2.0-how-ai-is-revolutionizing-cybercrime-</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2025-01-14</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/10-cybersecurity-horrors-that-might-be-lurking-in-your-business</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-2.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD2</image:caption><image:title>CICTBlogPostFeaturedArtworkD2</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/how-microsoft-365-defender-can-shield-your-company-from-phishing-scams</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/how-password-managers-protect-your-accounts</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-3.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD3</image:caption><image:title>CICTBlogPostFeaturedArtworkD3</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/these-4-surprising-apps-might-be-putting-your-data-at-risk</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Image%20%20Designed-2-1.jpg</image:loc><image:caption>CICTBlogPostFeaturedImageDesigned21</image:caption><image:title>CICTBlogPostFeaturedImageDesigned21</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BBlog%20Post%5D%20Featured%20Image.jpg</image:loc><image:caption>BlogPostFeaturedImage</image:caption><image:title>BlogPostFeaturedImage</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/qr-codes-are-vulnerable-to-cyber-threats-research-warns</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Image%20%20Designed-2-1.jpg</image:loc><image:caption>CICTBlogPostFeaturedImageDesigned21</image:caption><image:title>CICTBlogPostFeaturedImageDesigned21</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/what-is-zero-click-malware-how-do-you-fight-it</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/5-data-security-trends-to-prepare-for-in-2024</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/career-blog</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2025-01-10</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/understanding-the-acsc-essential-eight-cybersecurity-framework</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-3.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD3</image:caption><image:title>CICTBlogPostFeaturedArtworkD3</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Image%20%20Designed-2-1.jpg</image:loc><image:caption>CICTBlogPostFeaturedImageDesigned21</image:caption><image:title>CICTBlogPostFeaturedImageDesigned21</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BBlog%20Post%5D%20Featured%20Image.jpg</image:loc><image:caption>BlogPostFeaturedImage</image:caption><image:title>BlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><lastmod>2025-01-30</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/the-long-term-business-cost-of-data-breaches-a-deep-dive</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-2.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD2</image:caption><image:title>CICTBlogPostFeaturedArtworkD2</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/5-exciting-ways-microsoft-365-enable-the-hybrid-office</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/essential-actions-after-receiving-a-data-breach-notice</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-2.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD2</image:caption><image:title>CICTBlogPostFeaturedArtworkD2</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BBlog%20Post%5D%20Featured%20Image.jpg</image:loc><image:caption>BlogPostFeaturedImage</image:caption><image:title>BlogPostFeaturedImage</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/generative-ai-a-key-to-growth-for-small-businesses</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/new-phishing-threat-that-can-bypass-mfa-in-microsoft-365-emerges</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/what-to-include-in-a-year-end-technology-infrastructure-review</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/essential-eight-made-easy-how-microsoft-365-business-premium-ensures-cybersec-compliance</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D-2.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD2</image:caption><image:title>CICTBlogPostFeaturedArtworkD2</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BBlog%20Post%5D%20Featured%20Image.jpg</image:loc><image:caption>BlogPostFeaturedImage</image:caption><image:title>BlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/%5BCICT%5D%20Blog%20Post%20Featured%20Artwork%20D.png</image:loc><image:caption>CICTBlogPostFeaturedArtworkD</image:caption><image:title>CICTBlogPostFeaturedArtworkD</image:title></image:image><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/brandmark-globe-nobg-SVG%20(1).svg</image:loc><image:caption>brandmarkglobenobgSVG1</image:caption><image:title>brandmarkglobenobgSVG1</image:title></image:image><lastmod>2025-01-30</lastmod></url><url><loc>https://bloghub.cict.com.au/blog/the-future-of-cybersecurity-7-ways-ai-is-changing-the-game</loc><image:image><image:loc>https://22456829.fs1.hubspotusercontent-na1.net/hubfs/22456829/Logos/CICT%20LOGO-1.png</image:loc><image:caption>CICTLOGO1</image:caption><image:title>CICTLOGO1</image:title></image:image><lastmod>2024-12-16</lastmod></url></urlset>