<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.cyberpig.eu.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/dangers-of-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/cyber-insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/awareness-training-blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/vulnerability-management-vs-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/penetration-testing-explained</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/cyber-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/iso-27001-vs-gdpr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/how-smbs-can-secure-their-business-from-cyber-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/nis2-guide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/managed+detection+and+response+for+SMBs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cybersecurity+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cybersecurity+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/incident+response+planning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Information+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Vulnerability+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/SMB+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/phishing+prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/small+business+cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/SMB+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Pentest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Red+Teaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/NIS2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cyber+insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/security+awareness+program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cyber+hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/AI+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/SMB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/CyberPIG</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cyber+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Identity+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cyber+liability+coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Business+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Penetration+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/employee+security+awareness+training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cybersecurity+for+SMBs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cyber+attack+prevention+tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cybersecurity+best+practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/why+cyber+insurance+claims+are+denied</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Risk+management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cybersecurity+awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/IT+Security+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Penetration+test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/endpoint+protection+for+small+businesses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/human+firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/online+security+training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/AI+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/small+business+risk+mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Risk+assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Shadow+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/ISO+27001</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/multi-factor+authentication+%28MFA%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/does+cyber+insurance+cover+ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cyber+insurance+compliance+checklist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cybersecurity+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Digital+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cybersecurity+for+employees</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Mobile+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Medium+business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/cybersecurity+training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Artificial+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/data+breach+prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Ethical+Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Small+business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cyber+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/employee+security+training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Patch+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Cyber+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Prompt+Injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/Security+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/CyberPIG+cybersecurity+services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/NIS2+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/IT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/blog/tag/data+breach+recovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/crsa-tool</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-07</lastmod>
  </url>
  <url>
    <loc>https://www.cyberpig.eu.com/imprint</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-27</lastmod>
  </url>
</urlset>

