<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.cybersecurityperth.com.au/articles</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/f8b44419-5ba2-4071-9755-478f03627309/Lead+Gen+-+01+%281%29.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/articles/understanding-essential-8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/04a56cd0-7fd5-412b-8687-a5b48d69afdb/8.png</image:loc>
      <image:title>Articles - Understanding the Essential Eight Framework for Cyber Security - Make it stand out</image:title>
      <image:caption>Photo courtesy of Uber</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/articles/essential-8-for-small-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/f4e24002-6e6c-4f92-acb4-13a0821fe1a3/10.png</image:loc>
      <image:title>Articles - Why the Essential Eight Should Be Every Small Business’s Cybersecurity Starting Point - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/articles/essential-8-faq</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/a866b108-47d8-4e9a-a3ce-caaeb3a46f90/11.png</image:loc>
      <image:title>Articles - FAQs about Cybersecurity for Small Businesses and the Essential Eight - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/our-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/6ef67848-de07-4596-96c8-015cbc2e2121/office+365.png</image:loc>
      <image:title>All Cyber Security Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/3dd9927b-a496-4fbc-83e8-46660b676d9c/3.png</image:loc>
      <image:title>All Cyber Security Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/183d7aa4-1250-4251-b944-36a15adc3865/iso.png</image:loc>
      <image:title>All Cyber Security Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/235e1853-28a8-40b3-a548-bceeeb28fa7b/Untitled+design.png</image:loc>
      <image:title>All Cyber Security Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283898-KDMYERVB3D73432G9CST/shutterstock_2079730666.jpg</image:loc>
      <image:title>All Cyber Security Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/657b5d90-3ff9-4f62-a6b4-a61d4386c504/6.png</image:loc>
      <image:title>All Cyber Security Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/get-in-touch</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/f8b44419-5ba2-4071-9755-478f03627309/Lead+Gen+-+01+%281%29.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/penetration-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228276960-84ZNICGD4LDFJSJ7LZC4/icon-small-tick.png</image:loc>
      <image:title>Penetration Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228276952-IYZQC49U03VPCYPTCCIV/icon-small-tick.png</image:loc>
      <image:title>Penetration Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228276945-4LH5KFG5WWZXJJCNZE6C/icon-small-tick.png</image:loc>
      <image:title>Penetration Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/f8b44419-5ba2-4071-9755-478f03627309/Lead+Gen+-+01+%281%29.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618511387030-5LI1E5QMVTQ2RY9S00A4/20140228_Trade+151_0046+1.jpg</image:loc>
      <image:title>Penetration Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/compliance-audit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618511387030-5LI1E5QMVTQ2RY9S00A4/20140228_Trade+151_0046+1.jpg</image:loc>
      <image:title>Compliance Audit</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/about-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281956-RGFAK423QMRPZ9GCZRQ9/img-aboutus-1.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281968-G20QC9JRU1224K13LJXM/icon-small-tick.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281960-7HRHQF3YW9R3OOICN95E/icon-small-tick.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281965-XXXN48ZNV0F8RC6K7SY7/icon-small-tick.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281979-2Q76DT2JW5T0QGRU2UGQ/img-aboutus-3.jpg</image:loc>
      <image:title>About Us - Approach to your cyber audit.</image:title>
      <image:caption>Detail Reports We cover auditing needs and provide feedback on your current systems standards and recommendations to increase Security.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281983-XN0W6H6Z9IYOBYQOUNU4/img-aboutus-2.jpg</image:loc>
      <image:title>About Us - Approach to your cyber risk level.</image:title>
      <image:caption>Tailored Recommendation. As Cyber Security Perth is not selling products or remediation services, all advice will be for recommendations specifically designed for your business to be handled by your Managed IT or Internal IT.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228281986-R2LK2B3JLCHPWZNG3FR6/img-aboutus-4.jpg</image:loc>
      <image:title>About Us - Why work with us.</image:title>
      <image:caption>Independent Expertise: We are Western Australia's only fully independent cyber security auditors. We focus on protecting your business without selling products or remediation services, so you receive unbiased advice. Tailored Solutions: From detailed reports to specific, actionable insights, we work with your internal IT team or Managed IT provider to support your ongoing cyber security improvements. Unmatched Credentials: Our team of cybersecurity specialists is highly qualified and brings extensive industry experience and a commitment to the highest ethical standards.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283719-92CK1XZVX31YV23KC6CD/icon_development_services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283737-IY5WY2ARSZWB7VOQGR0E/icon-software-integration.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283719-92CK1XZVX31YV23KC6CD/icon_development_services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283728-UMNBKU5URZ8H6WGG6Q14/icon_managed_it_services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283728-UMNBKU5URZ8H6WGG6Q14/icon_managed_it_services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283748-Z8PI2WMVX9L9491TWOLV/image-ourapproach.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283737-IY5WY2ARSZWB7VOQGR0E/icon-software-integration.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283874-WDSWVQCORL3GDG9YGC6U/shutterstock_369899375.jpg</image:loc>
      <image:title>Cyber Security Perth</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283862-AZC48UPYF3EC91BY33U6/shutterstock_746652745.jpg</image:loc>
      <image:title>Cyber Security Perth</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283886-4XS2ZRYQOXNMJ1GSW97H/shutterstock_1145541551.jpg</image:loc>
      <image:title>Cyber Security Perth</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228283898-KDMYERVB3D73432G9CST/shutterstock_2079730666.jpg</image:loc>
      <image:title>Cyber Security Perth</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/235e1853-28a8-40b3-a548-bceeeb28fa7b/Untitled+design.png</image:loc>
      <image:title>Cyber Security Perth</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/faqs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/f8b44419-5ba2-4071-9755-478f03627309/Lead+Gen+-+01+%281%29.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/vulnerability-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287273-M5M8299WKSNG9V15YHAD/icon-small-tick.png</image:loc>
      <image:title>Vulnerability Assessment</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287281-VLYUV9U54MD5RCZUZEKU/icon-small-tick.png</image:loc>
      <image:title>Vulnerability Assessment</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287277-WTIX9VM0AAJVGMI48F13/icon-small-tick.png</image:loc>
      <image:title>Vulnerability Assessment</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618511387030-5LI1E5QMVTQ2RY9S00A4/20140228_Trade+151_0046+1.jpg</image:loc>
      <image:title>Vulnerability Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/disclaimer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/office-365-audit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287281-VLYUV9U54MD5RCZUZEKU/icon-small-tick.png</image:loc>
      <image:title>Office 365 Audit</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287277-WTIX9VM0AAJVGMI48F13/icon-small-tick.png</image:loc>
      <image:title>Office 365 Audit</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287273-M5M8299WKSNG9V15YHAD/icon-small-tick.png</image:loc>
      <image:title>Office 365 Audit</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618511387030-5LI1E5QMVTQ2RY9S00A4/20140228_Trade+151_0046+1.jpg</image:loc>
      <image:title>Office 365 Audit</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cybersecurityperth.com.au/insider-risk-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287277-WTIX9VM0AAJVGMI48F13/icon-small-tick.png</image:loc>
      <image:title>Insider Risk Analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287281-VLYUV9U54MD5RCZUZEKU/icon-small-tick.png</image:loc>
      <image:title>Insider Risk Analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/677cbdaa6e16a447c2fdaecf/1736228287273-M5M8299WKSNG9V15YHAD/icon-small-tick.png</image:loc>
      <image:title>Insider Risk Analysis</image:title>
    </image:image>
  </url>
</urlset>

