<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/</loc>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/page/Policies</loc>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/HSDEVKB</loc>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH</loc>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2563768341/Welcome+to+the+Cyber+Essentials+Knowledge+Hub</loc>
    <lastmod>2024-01-05</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2563768794/The+Five+Controls</loc>
    <lastmod>2023-11-01</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2563771447/Cyber+Essentials+Application</loc>
    <lastmod>2023-10-06</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2563771649/Operating+System+Support</loc>
    <lastmod>2023-11-23</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2563833959/Cyber+Essentials+Knowledge+Hub+Home</loc>
    <lastmod>2024-01-05</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2568487004/Tech+and+Cyber+Basics</loc>
    <lastmod>2023-11-30</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2575663247/Control+%3A+User+Access</loc>
    <lastmod>2023-12-12</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2575925382/Control+%3A+Malware+Protection</loc>
    <lastmod>2023-12-12</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576023683/Scope</loc>
    <lastmod>2023-12-12</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576252995/Control+%3A+Security+Update+Management</loc>
    <lastmod>2023-12-12</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576253017/Control+%3A+Secure+Configuration</loc>
    <lastmod>2023-12-12</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576351257/Control+%3A+Firewalls</loc>
    <lastmod>2023-12-12</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576482421/Secure+Configuration+%3A+Blogs</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576515115/Firewalls+%3A+Blogs</loc>
    <lastmod>2023-11-20</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576548002/Security+Update+Management+%3A+Videos</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576580905/User+Access+Control+%3A+Blogs</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576581003/Malware+Protection+%3A+Videos</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576646245/Firewalls+%3A+Videos</loc>
    <lastmod>2023-11-20</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576646401/Security+Update+Management+%3A+Resources</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576646422/User+Access+Control+%3A+FAQ</loc>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576679042/Secure+Configuration+%3A+Guidance</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576679105/User+Access+Control+%3A+Guidance</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576712031/Scope+%3A+Videos</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576810036/Firewalls+-+Guidance</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576842897/Secure+Configuration+-+FAQ</loc>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576842966/Security+Update+Management+%3A+FAQ</loc>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576843022/User+Access+Control+%3A+Videos</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576875823/Security+Update+Management+%3A+Blogs</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576941241/Secure+Configuration+%3A+Videos</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576973926/User+Access+Control+%3A+Resources</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2576974115/Scope+%3A+FAQ</loc>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577006760/Security+Update+Management+%3A+Guidance</loc>
    <lastmod>2023-12-15</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577039481/Firewalls+%3A+Resources</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577039502/Secure+Configuration+%3A+Resources</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577301558/Malware+Protection+%3A+Guidance</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577399906/Scope+%3A+Guidance</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577432658/Scope+%3A+Resources</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577465407/Scope+%3A+Blogs</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577498118/Malware+Protection+%3A+FAQ</loc>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577530912/Malware+Protection+%3A+Blogs</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577596460/Malware+Protection+%3A+Resources</loc>
    <lastmod>2023-11-21</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2577891329/Cyber+Essentials+Glossary</loc>
    <lastmod>2023-11-30</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2602172507/Advisories</loc>
    <lastmod>2023-10-13</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643034306/Windows+10</loc>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643198173/ChromeOS</loc>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643329155/Apple+MacOS+-+Laptops+and+Desktops</loc>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643460242/Android</loc>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643591475/Apple+iOS+-+Tablets+and+Smartphones</loc>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643591499/Windows+Server</loc>
    <lastmod>2023-12-07</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2643689659/Windows+11</loc>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2644607074/Firewalls+%3A+FAQ</loc>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2645917697/Sector%2FSize</loc>
    <lastmod>2023-11-23</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2645917753/Single+Person+Companies</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2645917767/Charity</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2645917781/Accountancy</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2646180087/Education</loc>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2646212870/Legal</loc>
    <lastmod>2023-11-24</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2646344292/Malware+Protection</loc>
    <lastmod>2023-12-15</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2647523445/Navigating+the+pitfalls+of+legacy+software</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2650538068/Securing+your+cloud+services</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2650701913/Explaining+the+shared+responsibility+model</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2651324512/What+is+a+VPN%3F</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2651521157/How+and+where+to+buy+software</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2651652226/Guidance+to+BYOD</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2651783327/Applying+MFA+to+access+cloud+services</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2651783351/About+asset+management</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2651914317/Guide+to+remote+working</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2652045481/Bulletproof+your+passwords+-+additional+authentication+methods</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660368607/How+to+create+a+subset</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660401698/About+2+factor+authentication</loc>
    <lastmod>2023-12-15</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660401728/Removing+unnecessary+software</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660467054/About+Firewalls</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660467121/About+password+creation</loc>
    <lastmod>2023-12-15</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660565169/About+size+of+your+school</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660565407/Firewalls</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660597805/Guidance+on+Bring+Your+Own+Device+(BYOD)+for+Charities</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660597928/Cyber+security+threats+for+the+accounting+sector</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660663323/User+Access+-+Just+Enough+or+Just+in+Time%3F</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660663837/User+Access+Control</loc>
    <lastmod>2023-12-15</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660696088/Who+has+a+copy+of+your+key%3F</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660696116/Applying+the+five+controls+to+cloud+services+-for+charities</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660794668/About+Routers</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660892893/Guidance+on+Remote+Working%C2%A0for+Charities</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2660893185/Secure+configuration</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2661023987/About+scope+for+schools</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2663481470/Cyber+Essentials+and+Cyber+Essentials+Plus+-+what+is+the+difference%3F</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2663645238/Secure+access+to+your+online+accounts</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2667053093/Security+Update+Management</loc>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2667347998/About+Scope</loc>
    <lastmod>2023-12-19</lastmod>
  </url>
  <url>
    <loc>https://ncsc-knowledge-hub.iasme.co.uk/space/CEKH/2672558114/Scheme+Advisories</loc>
    <lastmod>2023-12-20</lastmod>
  </url>
</urlset>