<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityx.ca/blog/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityx.ca/blog/</loc>
		<lastmod>2021-10-21T09:17:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityx.ca/blog/cyber-words/</loc>
		<lastmod>2020-07-29T12:14:40+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/cyber_words.jpg</image:loc>
			<image:title><![CDATA[cyber words]]></image:title>
			<image:caption><![CDATA[cyber words]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/vmb3010-arlo-camera-hack/</loc>
		<lastmod>2020-07-29T12:26:58+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/vmb3010.jpg</image:loc>
			<image:title><![CDATA[vmb3010]]></image:title>
			<image:caption><![CDATA[vmb3010]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/icloud-hack/</loc>
		<lastmod>2020-07-29T14:53:59+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/icloud_hack.jpg</image:loc>
			<image:title><![CDATA[icloud hack]]></image:title>
			<image:caption><![CDATA[icloud hack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/trovi-search-removal/</loc>
		<lastmod>2020-08-04T13:00:27+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/trovi_search.jpg</image:loc>
			<image:title><![CDATA[trovi search]]></image:title>
			<image:caption><![CDATA[trovi search]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHAT-IS-TROVI-SEARCH.png</image:loc>
			<image:caption><![CDATA[WHAT IS TROVI SEARCH]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/HOW-TO-REMOVE-TROVI-SEARCH.png</image:loc>
			<image:caption><![CDATA[HOW TO REMOVE TROVI SEARCH]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/TROVI-REMOVAL-MANUALLY.png</image:loc>
			<image:caption><![CDATA[TROVI REMOVAL (MANUALLY)]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/REMOVE-TROVI-FROM-INTERNET-EXPLORER.png</image:loc>
			<image:caption><![CDATA[REMOVE TROVI FROM INTERNET EXPLORER]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/REMOVE-TROVI-FROM-MOZILLA-FIREFOX.png</image:loc>
			<image:caption><![CDATA[REMOVE TROVI FROM MOZILLA FIREFOX]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/REMOVE-TROVI-FROM-GOOGLE-CHROME.png</image:loc>
			<image:caption><![CDATA[REMOVE TROVI FROM GOOGLE CHROME]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/REMOVE-TROVI-FROM-SAFARI.png</image:loc>
			<image:caption><![CDATA[REMOVE TROVI FROM SAFARI]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/STEP1.png</image:loc>
			<image:caption><![CDATA[STEP1]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/STEP2.png</image:loc>
			<image:caption><![CDATA[STEP2]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/STEP3.png</image:loc>
			<image:caption><![CDATA[STEP3]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/retina-scan-security/</loc>
		<lastmod>2020-08-04T13:05:14+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/retina_scan_security.jpg</image:loc>
			<image:title><![CDATA[retina scan security]]></image:title>
			<image:caption><![CDATA[retina scan security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHAT-IS-RETINAL-BIOMETRICS.png</image:loc>
			<image:caption><![CDATA[WHAT IS RETINAL BIOMETRICS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHAT-IS-A-RETINA-SCAN.png</image:loc>
			<image:caption><![CDATA[WHAT IS A RETINA SCAN]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/HOW-DOES-RETINAL-SECURITY-SCANNING-WORK.png</image:loc>
			<image:caption><![CDATA[HOW DOES RETINAL SECURITY SCANNING WORK]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHAT-ARE-THE-TYPICAL-APPLICATIONS-OF-RETINA-SCAN.png</image:loc>
			<image:caption><![CDATA[WHAT ARE THE TYPICAL APPLICATIONS OF RETINA SCAN]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHY-RETINA-SCAN-IS-MORE-PREFFERED.png</image:loc>
			<image:caption><![CDATA[WHY RETINA SCAN IS MORE PREFFERED]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/what-are-the-4-main-types-of-vulnerability/</loc>
		<lastmod>2020-08-05T09:35:19+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/what_are_the_4_main_types_of_vulnerability.jpg</image:loc>
			<image:title><![CDATA[what are the 4 main types of vulnerability]]></image:title>
			<image:caption><![CDATA[what are the 4 main types of vulnerability]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/COMPLEXITY.jpg</image:loc>
			<image:caption><![CDATA[COMPLEXITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/FAMILIARITY.jpg</image:loc>
			<image:caption><![CDATA[FAMILIARITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/CONNECTIVITY.jpg</image:loc>
			<image:caption><![CDATA[CONNECTIVITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/POOR-PASSWORD-MANAGEMENT.png</image:loc>
			<image:caption><![CDATA[POOR PASSWORD MANAGEMENT]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/OPERATING-SYSTEM-FLAWS.jpg</image:loc>
			<image:caption><![CDATA[OPERATING SYSTEM FLAWS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/INTERNET-USAGE.jpg</image:loc>
			<image:caption><![CDATA[INTERNET USAGE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/SOFTWARE-BUGS.jpg</image:loc>
			<image:caption><![CDATA[SOFTWARE BUGS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/UNCHECKED-USER-INPUT.jpg</image:loc>
			<image:caption><![CDATA[UNCHECKED USER INPUT]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/EMPLOYEES.jpg</image:loc>
			<image:caption><![CDATA[EMPLOYEES]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/PHYSICAL-VULNERABILITY.jpg</image:loc>
			<image:caption><![CDATA[PHYSICAL VULNERABILITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/ECONOMIC-VULNERABILITY.jpg</image:loc>
			<image:caption><![CDATA[ECONOMIC VULNERABILITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/SOCIAL-VULNERABILITY.jpg</image:loc>
			<image:caption><![CDATA[SOCIAL VULNERABILITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/ATTITUDINAL-VULNERABILITY.jpg</image:loc>
			<image:caption><![CDATA[ATTITUDINAL VULNERABILITY]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/how-to-free-up-disk-space/</loc>
		<lastmod>2020-08-05T10:03:33+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/how_to_free_up_disk_space.jpg</image:loc>
			<image:title><![CDATA[how to free up disk space]]></image:title>
			<image:caption><![CDATA[how to free up disk space]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/UNINSTALL-JUNK-PROGRAMS.png</image:loc>
			<image:caption><![CDATA[UNINSTALL JUNK PROGRAMS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/HOW-TO-FREE-UP-DISK-SPACE-IN-WINDOWS-7.png</image:loc>
			<image:caption><![CDATA[HOW TO FREE UP DISK SPACE IN WINDOWS 7]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/HOW-TO-FREE-UP-DISK-SPACE-WINDOWS-8.png</image:loc>
			<image:caption><![CDATA[HOW TO FREE UP DISK SPACE WINDOWS 8]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/HOW-TO-FREE-UP-DISK-SPACE-WINDOWS-7.png</image:loc>
			<image:caption><![CDATA[HOW TO FREE UP DISK SPACE WINDOWS 7]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/HOW-TO-FREE-UP-DISK-SPACE-WINDOWS-8.1.png</image:loc>
			<image:caption><![CDATA[HOW TO FREE UP DISK SPACE WINDOWS 8.1]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/FREE-UP-SPACE-ON-MAC-STARTUP-DISK-AUTOMATICALLY.png</image:loc>
			<image:caption><![CDATA[FREE UP SPACE ON MAC STARTUP DISK AUTOMATICALLY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/HOW-TO-FREE-UP-SPACE-ON-MAC-STARTUP-DISK-MANUALLY.png</image:loc>
			<image:caption><![CDATA[HOW TO FREE UP SPACE ON MAC STARTUP DISK MANUALLY]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/face-recognition-apps/</loc>
		<lastmod>2020-08-05T11:50:32+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/face_recognition_apps.jpg</image:loc>
			<image:title><![CDATA[face recognition apps]]></image:title>
			<image:caption><![CDATA[face recognition apps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/maps-galaxy-virus/</loc>
		<lastmod>2020-08-05T11:53:35+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/maps_galaxy_virus.jpg</image:loc>
			<image:title><![CDATA[maps galaxy virus]]></image:title>
			<image:caption><![CDATA[maps galaxy virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/uninstall-pro-pc-cleaner/</loc>
		<lastmod>2020-08-05T11:56:23+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/uninstall_pro_pc_cleaner.jpg</image:loc>
			<image:title><![CDATA[uninstall pro pc cleaner]]></image:title>
			<image:caption><![CDATA[uninstall pro pc cleaner]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/volsteran-search/</loc>
		<lastmod>2020-08-13T10:43:57+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/volsteran_search.jpg</image:loc>
			<image:title><![CDATA[volsteran search]]></image:title>
			<image:caption><![CDATA[volsteran search]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/what_is_vosteran_search.png</image:loc>
			<image:caption><![CDATA[what is vosteran search]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/how_did_volsteran_virus_get_into_device.png</image:loc>
			<image:caption><![CDATA[how did volsteran virus get into device]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/how_to_remove_vosteran_search_from_safari.png</image:loc>
			<image:caption><![CDATA[how to remove vosteran search from safari]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/how_to_remove_volsteran_virus_from_chrome.png</image:loc>
			<image:caption><![CDATA[how to remove volsteran virus from chrome]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/how_to_remove_volsteran_virus_from_firefox.png</image:loc>
			<image:caption><![CDATA[how to remove volsteran virus from firefox]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/kickass-torrents/</loc>
		<lastmod>2020-08-17T11:46:11+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/kickass_torrents.jpg</image:loc>
			<image:title><![CDATA[kickass torrents]]></image:title>
			<image:caption><![CDATA[kickass torrents]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/threat-risk-assessment/</loc>
		<lastmod>2020-08-18T12:16:53+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/threat_risk_assessment.jpg</image:loc>
			<image:title><![CDATA[threat risk assessment]]></image:title>
			<image:caption><![CDATA[threat risk assessment]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/common_threat_risk_assessment_approaches.png</image:loc>
			<image:caption><![CDATA[common threat risk assessment approaches]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/threat_risk_assessment_process.png</image:loc>
			<image:caption><![CDATA[threat risk assessment process]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/cloud-computing/</loc>
		<lastmod>2020-08-18T12:22:02+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/cloud_computing.jpg</image:loc>
			<image:title><![CDATA[cloud computing]]></image:title>
			<image:caption><![CDATA[cloud computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/confidentiality-integrity-availability/</loc>
		<lastmod>2020-08-18T12:32:21+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/confidentiality_integrity_availability.jpg</image:loc>
			<image:title><![CDATA[confidentiality integrity availability]]></image:title>
			<image:caption><![CDATA[confidentiality integrity availability]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/cia_triad.png</image:loc>
			<image:caption><![CDATA[cia triad]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/what_is_confidentiality.png</image:loc>
			<image:caption><![CDATA[what is confidentiality]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/what_is_integrity.png</image:loc>
			<image:caption><![CDATA[what is integrity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/what_is_availability.png</image:loc>
			<image:caption><![CDATA[what is availability]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/cloud-based-managed-services/</loc>
		<lastmod>2020-08-21T13:48:33+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/cloud_based_managed_services.jpg</image:loc>
			<image:title><![CDATA[cloud based managed services]]></image:title>
			<image:caption><![CDATA[cloud based managed services]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/CLOUD-BASED-MANAGED-SERVICES-CUT-COSTS-min.png</image:loc>
			<image:caption><![CDATA[CLOUD BASED MANAGED SERVICES CUT COSTS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/CLOUD-BASED-MANAGED-SERVICES-HAVE-PREDICTABLE-PRICING-min.png</image:loc>
			<image:caption><![CDATA[CLOUD BASED MANAGED SERVICES HAVE PREDICTABLE PRICING]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/CLOUD-BASED-MANAGED-SERVICES-ARE-SCALABLE-min.png</image:loc>
			<image:caption><![CDATA[CLOUD BASED MANAGED SERVICES ARE SCALABLE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/CLOUD-BASED-MANAGED-SERVICES-ARE-RELIABLE-min.png</image:loc>
			<image:caption><![CDATA[CLOUD BASED MANAGED SERVICES ARE RELIABLE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/CLOUD-BASED-MANAGED-SERVICES-ARE-COST-EFFECTIVE-min.png</image:loc>
			<image:caption><![CDATA[CLOUD BASED MANAGED SERVICES ARE COST EFFECTIVE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/PREDICTABLE-EXPENSES-FOR-CLOUD-BASED-MANAGED-SERVICES-min.png</image:loc>
			<image:caption><![CDATA[PREDICTABLE EXPENSES FOR CLOUD BASED MANAGED SERVICES]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/RESULT-ORIENTED-CLOUD-BASED-MANAGED-SERVICES-min.png</image:loc>
			<image:caption><![CDATA[RESULT ORIENTED CLOUD BASED MANAGED SERVICES]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/FULLY-CUSTOM-AND-HIGHLY-INTEGRATED-CLOUD-BASED-MANAGED-SERVICES-min.png</image:loc>
			<image:caption><![CDATA[FULLY CUSTOM AND HIGHLY INTEGRATED CLOUD BASED MANAGED SERVICES]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/MODIFIED-AND-ROBUST-INFRASTRUCTURE-min.png</image:loc>
			<image:caption><![CDATA[MODIFIED AND ROBUST INFRASTRUCTURE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/COVERAGE-ON-ALL-SERVICE-LEVELS-min.png</image:loc>
			<image:caption><![CDATA[COVERAGE ON ALL SERVICE LEVELS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/DISASTER-RECOVERY-min.png</image:loc>
			<image:caption><![CDATA[DISASTER RECOVERY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/FAST-RESPONSE-TIMES-min.png</image:loc>
			<image:caption><![CDATA[FAST RESPONSE TIMES]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/VENDOR-INTERFACING-min.png</image:loc>
			<image:caption><![CDATA[VENDOR INTERFACING]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/information-risk-management/</loc>
		<lastmod>2020-09-16T15:58:20+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/information_risk_management.jpg</image:loc>
			<image:title><![CDATA[information risk management]]></image:title>
			<image:caption><![CDATA[information risk management]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/WHY-YOU-NEED-TO-UNDERSTAND-THE-IT-RISK-EQUATION.png</image:loc>
			<image:caption><![CDATA[WHY YOU NEED TO UNDERSTAND THE IT RISK EQUATION]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/WHAT-IS-A-THREAT.jpg</image:loc>
			<image:caption><![CDATA[WHAT IS A THREAT]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/WHAT-IS-VULNERABILITY.jpg</image:loc>
			<image:caption><![CDATA[WHAT IS VULNERABILITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/WHAT-ARE-THE-CONSEQUENCES.jpg</image:loc>
			<image:caption><![CDATA[WHAT ARE THE CONSEQUENCES]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/HOW-TO-CONDUCT-INFORMATION-RISK-MANAGEMENT.jpg</image:loc>
			<image:caption><![CDATA[HOW TO CONDUCT INFORMATION RISK MANAGEMENT]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/EVERYONE-IS-RESPONSIBLE.png</image:loc>
			<image:caption><![CDATA[EVERYONE IS RESPONSIBLE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/WHY-YOU-NEED-INFORMATION-RISK-MANAGEMENT.jpg</image:loc>
			<image:caption><![CDATA[WHY YOU NEED INFORMATION RISK MANAGEMENT]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/WHY-CYBER-RISK-MANAGEMENT-MUST-BE-A-PART-OF-INFORMATION-RISK-MANAGEMENT.jpg</image:loc>
			<image:caption><![CDATA[WHY CYBER RISK MANAGEMENT MUST BE A PART OF INFORMATION RISK MANAGEMENT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/infomation-security-audit-checklist/</loc>
		<lastmod>2020-09-16T20:17:32+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/information_security_audit_checklist.jpg</image:loc>
			<image:title><![CDATA[information security audit checklist]]></image:title>
			<image:caption><![CDATA[information security audit checklist]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHAT-IS-AN-INFORMATION-SECURITY-AUDIT-CHECKLIST.png</image:loc>
			<image:caption><![CDATA[WHAT IS AN INFORMATION SECURITY AUDIT CHECKLIST]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/WHY-DO-YOU-NEED-TO-CONDUCT-INFORAMTION-SECURITY-AUDITS.png</image:loc>
			<image:caption><![CDATA[WHY DO YOU NEED TO CONDUCT INFORAMTION SECURITY AUDITS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/lighting.png</image:loc>
			<image:caption><![CDATA[lighting]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/alarm.png</image:loc>
			<image:caption><![CDATA[alarm]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/PHYSICAL-BARRIERS.png</image:loc>
			<image:caption><![CDATA[PHYSICAL BARRIERS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/ACCESS-POINTS.png</image:loc>
			<image:caption><![CDATA[ACCESS POINTS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/CCTV.png</image:loc>
			<image:caption><![CDATA[CCTV]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/GUARD.png</image:loc>
			<image:caption><![CDATA[GUARD]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/ACCESS-METHODS.png</image:loc>
			<image:caption><![CDATA[ACCESS METHODS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/DIGITAL-SECURITY-PERSONNEL-AND-SOFTWARE.png</image:loc>
			<image:caption><![CDATA[DIGITAL SECURITY PERSONNEL AND SOFTWARE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/ACCESS-TO-DATA-AND-EQUIPMENT.png</image:loc>
			<image:caption><![CDATA[ACCESS TO DATA AND EQUIPMENT]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/ENCRYPTION.png</image:loc>
			<image:caption><![CDATA[ENCRYPTION]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/MOBILE-DEVICE-USAGE.png</image:loc>
			<image:caption><![CDATA[MOBILE DEVICE USAGE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/PATCHING.png</image:loc>
			<image:caption><![CDATA[PATCHING]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/CLOUD-USAGE.png</image:loc>
			<image:caption><![CDATA[CLOUD USAGE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/PASSWORDS.png</image:loc>
			<image:caption><![CDATA[PASSWORDS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityx.ca/blog/wp-content/uploads/POLICIES-AND-EMPLOYEE-TRAINING.png</image:loc>
			<image:caption><![CDATA[POLICIES AND EMPLOYEE TRAINING]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/scalability-testing-of-web-applications/</loc>
		<lastmod>2021-10-08T13:04:32+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/Scalability-Testing-Of-Web-Applications-landscape.jpg</image:loc>
			<image:title><![CDATA[Scalability Testing Of Web Applications landscape]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/what-is-a-firewall-how-to-do-firewall-works/</loc>
		<lastmod>2021-10-11T12:29:58+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/What-Is-A-Firewall-How-To-Do-Firewall-Works2.jpg</image:loc>
			<image:title><![CDATA[What-Is-A-Firewall-How-To-Do-Firewall-Works2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/crashed-apis/</loc>
		<lastmod>2021-10-11T12:30:06+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/crashed_apis.jpg</image:loc>
			<image:title><![CDATA[crashed apis]]></image:title>
			<image:caption><![CDATA[crashed apis]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/deep-web-search-engines/</loc>
		<lastmod>2021-10-11T12:30:15+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/deep_web_search_engines.jpg</image:loc>
			<image:title><![CDATA[deep web search engines]]></image:title>
			<image:caption><![CDATA[deep web search engines]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/hotspot-shield-uninstall/</loc>
		<lastmod>2021-10-11T12:30:24+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/uninstall_hotspot_shield.jpg</image:loc>
			<image:title><![CDATA[uninstall hotspot shield]]></image:title>
			<image:caption><![CDATA[uninstall hotspot shield]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/do-fingerprints-change/</loc>
		<lastmod>2021-10-11T12:30:33+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/do_fingerprints_change.jpg</image:loc>
			<image:title><![CDATA[do fingerprints change]]></image:title>
			<image:caption><![CDATA[do fingerprints change]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/DEEPENING-THE-SCIENCE.jpg</image:loc>
			<image:caption><![CDATA[DEEPENING THE SCIENCE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/FINGERPRINT-FLUIDITY.jpg</image:loc>
			<image:caption><![CDATA[FINGERPRINT FLUIDITY]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/AGEING-AND-OUR-FINGERPRINTS.jpg</image:loc>
			<image:caption><![CDATA[AGEING AND OUR FINGERPRINTS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/THE-IMPORTANCE-OF-SEAMLESS-BIOMETRIC-SCANNING.jpg</image:loc>
			<image:caption><![CDATA[THE IMPORTANCE OF SEAMLESS BIOMETRIC SCANNING]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityx.ca/blog/lets-explore-cybersecurity-threats/</loc>
		<lastmod>2021-10-21T09:17:40+00:00</lastmod>
		<image:image>
			<image:loc>http://securityx.ca/blog/wp-content/uploads/Let%E2%80%99s-Explore-CYBERSECURITY-THREATS-securityx-blog.jpg</image:loc>
			<image:title><![CDATA[Let’s Explore CYBERSECURITY THREATS securityx blog]]></image:title>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->