<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-for-small-businesses-in-burton-upon-trent-vKqS8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1768334131543-ZEWQYR7ITGJRVX8NYESX/unsplash-image-hkJNx0EDbjE.jpg</image:loc>
      <image:title>The Cyber Compass - Cyber Security for Small Businesses in Burton upon Trent - Why Cyber Risk Looks Different for Local Businesses</image:title>
      <image:caption>Burton upon Trent has a strong industrial base. Many businesses depend on: Production or processing systems Warehousing and logistics platforms Long-established technology environments External IT support and suppliers These characteristics do not imply poor practice. They simply mean that availability is often prioritised over change, which can create unseen cyber risk. Cyber criminals look for leverage rather than sophistication. In operational businesses, disruption itself creates that leverage.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-for-business-directors-in-burton-upon-trent-what-reasonable-steps-really-look-like</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1768336128820-0KLODKSUDA8ULCQT6AX5/unsplash-image-hkJNx0EDbjE.jpg</image:loc>
      <image:title>The Cyber Compass - Cyber Security for Business Directors in Burton upon Trent: What “Reasonable Steps” Really Look Like - Why Cyber Risk Is a Director-Level Responsibility</image:title>
      <image:caption>Under UK law and regulation, directors are expected to: Protect company data and systems Understand material business risks Demonstrate proportionate controls Provide assurance to insurers, customers, and regulators Relying solely on an IT provider’s reassurance is no longer sufficient. Most IT providers manage systems — they don’t independently assess risk or formally evidence security posture. When something goes wrong, the question will be: “What independent assurance did you have?”</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-risks-facing-manufacturing-and-small-businesses-in-burton-upon-trent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1768333421269-Z1VZV9WTG407SPZG8Z1J/unsplash-image-ZlOlRnWk8zU.jpg</image:loc>
      <image:title>The Cyber Compass - Cyber Security Risks Facing Manufacturing and Small Businesses in Burton upon Trent - Burton upon Trent has a strong concentration of manufacturing, processing, logistics, and industrial supply-chain businesses.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/partnering-with-msps-in-derby-amp-nottingham-how-censor-security-boosts-cybersecurity-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759836168868-PX3N752STKGCEDIF7R2P/cyber-security-msp-partnership</image:loc>
      <image:title>The Cyber Compass - Partnering With MSPs in Derby &amp;amp; Nottingham: How Censor Security Boosts Cybersecurity Services</image:title>
      <image:caption>What the MSP Partnership Offers Censor Security provides a flexible outsourced cybersecurity solution, allowing MSPs in Derby and Nottingham to expand their offerings efficiently. Through our partnership model, MSPs can: Offer Audits and Security Reviews – Identify vulnerabilities, compliance gaps, and security weaknesses for local businesses. Deliver Cybersecurity Training – Equip client staff with knowledge to prevent threats. Conduct Vulnerability Scanning – Proactively identify potential security risks. Support Cyber Essentials Certification – Assist clients in achieving recognised cyber standards. By leveraging Censor Security’s expertise, MSPs can enhance client relationships, increase revenue, and strengthen service portfolios in Derby, Nottingham, and surrounding areas.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/phishing-amp-social-engineering-threats-in-2025-what-derby-businesses-must-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759833873118-M7HSKTO210Z7BJ028AOF/simple+cyber+security+training+derby</image:loc>
      <image:title>The Cyber Compass - Phishing &amp;amp; Social Engineering Threats in 2025: What Derby Businesses Must Know</image:title>
      <image:caption>Final Thought Cyber attackers are only getting smarter. Investing in staff awareness and regular cyber audits is the most cost-effective way to prevent data breaches. Censor Security provides phishing prevention, training, and cyber attack support to businesses across Derby and Nottingham.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-strategy-for-school-leaders-aligning-with-dfe-and-rpa-standards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759835826558-XIVQO7YGL01NHY1HI7S8/working+with+school+auditors</image:loc>
      <image:title>The Cyber Compass - Cyber Security Strategy for School Leaders: Aligning With DfE and RPA Standards - Working in Partnership with Education Trusts</image:title>
      <image:caption>Working With Auditors Independent audits provide an external perspective, highlighting vulnerabilities your internal IT team may not see. This approach: Complements existing IT provision Validates controls and mitigations Provides evidence for trustees, governors, and auditors</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/how-independent-cyber-security-audits-protect-schools-from-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759835643497-4ESMI03TSYWJKS3GKEHK/why+school+cyber+matters</image:loc>
      <image:title>The Cyber Compass - How Independent Cyber Security Audits Protect Schools From Risk</image:title>
      <image:caption>⚠️ Why It Matters Without external oversight, schools may overlook vulnerabilities that could result in: Data breaches or loss of sensitive student information Non-compliance with RPA or DfE expectations Financial penalties, reputational damage, or operational disruption</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/is-your-business-still-running-end-of-life-software-hidden-risks-for-derby-smes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759833603803-U4WPOKCYX4JB5XMQ8VT4/risks+of+end+of+life+software</image:loc>
      <image:title>The Cyber Compass - Is Your Business Still Running End-of-Life Software? Hidden Risks for Derby SMEs</image:title>
      <image:caption>⚠️ The Risks of Ignoring EOL Systems No Security Updates → easy entry point for ransomware. Compliance Failures → breaches Cyber Essentials, GDPR, and insurance requirements. Operational Downtime → unsupported software often breaks when connected to modern systems. Cybercriminals actively scan for known vulnerabilities — meaning once support ends, those systems are high-value targets.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-governance-in-schools-a-guide-for-leaders</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/f852c892-4715-4b2a-8726-871f30c62009/school+audit+benefits</image:loc>
      <image:title>The Cyber Compass - Cyber Security Governance in Schools: A Guide for Leaders</image:title>
      <image:caption>Benefits of Governance-Focused Audits Independent audits provide tangible evidence for board meetings, supporting risk-based decision-making, and demonstrating due diligence to trustees, insurers, and regulators.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/how-to-prepare-for-a-cyber-security-audit-derby-business-checklist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759833372242-KPSCURVEPULW5IP9QET5/it+security+audit+derby</image:loc>
      <image:title>The Cyber Compass - How to Prepare for a Cyber Security Audit: Derby Business Checklist</image:title>
      <image:caption>What Is a Cyber Security Audit? A cyber security audit is a full review of your IT systems, policies, and security measures. It checks how well your business is protected against current threats and identifies gaps that could lead to data loss, ransomware, or compliance breaches. At Censor Security, we benchmark every audit against Cyber Essentials — the UK government-backed framework for cyber hygiene.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-in-schools-why-independent-audits-are-now-essential</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759834618221-ESPEOWJC93H2OHTR2Z30/cyber+security+in+education</image:loc>
      <image:title>The Cyber Compass - Cyber Security in Schools: Why Independent Audits Are Now Essential - Cyber Security in Education</image:title>
      <image:caption>The Role of a Cyber Security Audit in Education A cyber security audit provides an independent, detailed review of your school or trust’s IT infrastructure, security controls, and governance processes. It benchmarks your current posture against DfE Cyber Standards and RPA cyber requirements, identifying where risks exist and where improvements are needed. For schools and trusts, this goes far beyond ticking a compliance box — it’s about ensuring you can protect learning continuity, data integrity, and community trust.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759834805589-ZCQORJKJZYF0K5IO7CQS/board+level+cyber+security</image:loc>
      <image:title>The Cyber Compass - Cyber Security in Schools: Why Independent Audits Are Now Essential - Demonstrating Compliance and Assurance</image:title>
      <image:caption>For trust boards and leadership teams, quality audits provide tangible proof that cyber security is being managed effectively. Independent reporting supports: Internal scrutiny and assurance frameworks Audit committee oversight Governance and compliance reporting to DfE or Ofsted Demonstration of proactive cyber risk management to insurers This level of transparency helps reassure governors, parents, and regulatory bodies that the school is doing everything possible to protect its data and systems.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/affordable-it-security-for-smes-in-derby-amp-nottingham-where-to-start</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759833122909-3V9ZGKNP8V0EZW2I6UBU/local+cyber+security+derby</image:loc>
      <image:title>The Cyber Compass - Affordable IT Security for SMEs in Derby &amp;amp; Nottingham – Where to Start</image:title>
      <image:caption>Why Work with a Local Partner Censor Security supports SMEs across Derby and Nottingham with affordable cyber audits, training, and compliance support. We focus on practical, scalable protection — not expensive, over-engineered solutions.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/windows-10-end-of-life-what-it-means-for-your-business-and-why-you-should-act-now</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759832406441-TRITBQ4NA1EN6XZXVJSZ/unsplash-image--jCY4oEMA3o.jpg</image:loc>
      <image:title>The Cyber Compass - Windows 10 End of Life: What It Means for Your Business (and Why You Should Act Now) -  Your Options</image:title>
      <image:caption>Upgrade to Windows 11 If your hardware meets the minimum system requirements, upgrading now is the most secure and future-proof choice. It ensures ongoing protection and compatibility with modern security features such as TPM 2.0 and Secure Boot. Purchase Extended Security Updates (ESU) For devices that can’t upgrade, Microsoft is offering Extended Security Updates (ESU) until 13 October 2026, priced at around £25 per device. This gives businesses extra time to plan hardware replacements while staying protected from critical vulnerabilities.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/rising-cyber-attacks-in-the-headlines-how-businesses-in-derby-and-nottingham-can-protect-themselves</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759481129633-00OCRR8YDL4F4ITQA19I/local-cyber-protection-for-small-business.jpg</image:loc>
      <image:title>The Cyber Compass - Rising Cyber Attacks in the Headlines – How Businesses in Derby and Nottingham Can Protect Themselves - Why Cyber Security Protection Matters for Local Businesses</image:title>
      <image:caption>Cyber security protection in Derby and Nottingham is becoming a critical investment, not a luxury. Criminals are constantly scanning for weaknesses, and SMEs are increasingly in their sights. The reasons are simple: smaller businesses often lack the in-house expertise to defend themselves, making them easier targets. Cyber attacks don’t just cost money – they erode customer trust. Whether you run a nursery, a retail shop, or a professional services firm, customers expect their data to be safe. A single breach can undo years of hard work.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1759481334183-MGUCJ2SS07QFJTBJ8BNJ/cyber-attack-support.jpg</image:loc>
      <image:title>The Cyber Compass - Rising Cyber Attacks in the Headlines – How Businesses in Derby and Nottingham Can Protect Themselves - Trusted Cyber Attack Prevention Specialists</image:title>
      <image:caption>We are trusted by Managed Service Providers (MSPs) to deliver cyber attack support across the region. Whether you’re a small business owner looking for cyber protection in Derby, or an organisation in Nottingham seeking reliable cyber attack prevention specialists, our team provides tailored solutions to keep your systems safe. With more and more businesses hitting the headlines due to data breaches and ransomware, now is the time to take action.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/uncover-your-digital-weaknesses-before-attackers-do-the-power-of-a-cyber-security-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1746786676450-CYO7KZQ02KCE0ULDPWX1/unsplash-image-qL0t5zNGFVQ.jpg</image:loc>
      <image:title>The Cyber Compass - Uncover Your Digital Weaknesses Before Attackers Do: The Power of a Cyber Security Risk Assessment - Make it stand out</image:title>
      <image:caption>The Stark Reality: Finding Weaknesses Before the Attackers Imagine two businesses operating in the same sector. Business A neglects regular cyber security checks. Their firewall hasn't been updated in years, a critical software vulnerability remains unpatched, and staff haven't received any recent security awareness training. One day, a sophisticated ransomware attack exploits the known software flaw, encrypting their vital customer data and crippling their operations. The cost of recovery, including downtime, data loss, and reputational damage, is substantial.   Business B, on the other hand, proactively invests in regular cyber security risk assessments. Their latest assessment identified the outdated firewall and the unpatched software vulnerability. They promptly implemented the necessary updates and conducted targeted training for their staff on identifying phishing emails. When a similar ransomware attack targets their sector, their updated systems and vigilant employees successfully thwart the attempt. Business B experiences minimal disruption and avoids significant financial and reputational losses. This real-life comparison starkly illustrates the advantage of a proactive approach. Identifying and addressing vulnerabilities before an attacker does can be the difference between business continuity and a potentially catastrophic cyber incident.v</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-risk-assessment-advantages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/strengthening-your-defences-why-a-cyber-security-risk-assessment-is-vital-for-derby-nottingham-businesses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741350079677-TLOVBO9P42TPAUN7T50J/unsplash-image-BDIFIT1ILDs.jpg</image:loc>
      <image:title>The Cyber Compass - Strengthening Your Defences: Why a Cyber Security Risk Assessment is Vital for Derby &amp;amp; Nottingham Businesses</image:title>
      <image:caption>Why a Risk Assessment? Let's Talk Practicalities. A risk assessment goes beyond a simple checklist. It provides a clear understanding of your security posture, identifying potential weak points that cybercriminals might exploit. Pinpointing Vulnerabilities: An examination of systems – software, networks, and infrastructure – reveals potential gaps. Common issues identified include outdated software and weak passwords. Process Analysis: Beyond technology, internal processes are evaluated. Employee awareness of phishing and data handling procedures are assessed to identify potential human error points. Understanding Unique Threats: Derby and Nottingham businesses, like any region face specific risks. Assessments are tailored to these, ensuring preparedness for relevant threats. Strategic Security Investment: Prioritising security needs ensures efficient resource allocation. Compliance Alignment: Aligning assessments with regulations like UK GDPR and Cyber Essentials helps businesses avoid penalties and demonstrate commitment to security. Protecting Business Reputation: Preventing data breaches through robust security measures builds trust with customers.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/unmasking-your-vulnerabilities-the-power-of-a-cybersecurity-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740165254420-YBR8PGMD0GCWVACL9DCM/unsplash-image-HJgaV1qjHS0.jpg</image:loc>
      <image:title>The Cyber Compass - Unmasking Your Vulnerabilities: The Power of a Cybersecurity Risk Assessment - Empowering Your IT Team Our risk assessment service focuses on providing you with the insights you need. This empowers your existing IT team to take ownership of the solutions. They're the experts on your systems, and by giving them the information they need, you're enabling them to implement the most effective fixes. This collaborative approach ensures that the solutions are tailored to your specific environment and integrated seamlessly with your existing infrastructure.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-essentials-a-solid-foundation-but-we-build-stronger-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739905086810-34EXZFD5M16PV7PELL9W/unsplash-image-Lzfxzip-pNI.jpg</image:loc>
      <image:title>The Cyber Compass - Cyber Essentials: A Solid Foundation, But We Build Stronger Cyber Security</image:title>
      <image:caption>Think of it this way: Cyber Essentials is like laying the concrete slab for your house. Essential, absolutely. But you wouldn't live on just the slab, would you? You need walls, a roof, plumbing, electrics – a complete structure. Similarly, your business needs a comprehensive cybersecurity strategy that goes beyond the basics to address the full spectrum of threats. Here's why a more thorough approach is essential, and how our services complement and enhance Cyber Essentials:</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/understanding-firewalls-protecting-your-business-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739808062930-I6KPGBRI01YR5I0XPPA1/unsplash-image-gKyv6-Ev_TE.jpg</image:loc>
      <image:title>The Cyber Compass - Understanding Firewalls: Protecting Your Business Online - Make it stand out</image:title>
      <image:caption>Firewall! Blocking access where its needed!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cybersecurity-for-schools-protecting-pupils-data-and-your-reputation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739808965597-N1QUB2O53KY7FZ8B0ZVU/unsplash-image-9o8YdYGTT64.jpg</image:loc>
      <image:title>The Cyber Compass - Cybersecurity for Schools: Protecting Pupils, Data, and Your Reputation - Make it stand out</image:title>
      <image:caption>Why Cybersecurity Matters for Schools: Schools hold a treasure trove of sensitive data, including student records, medical information, staff details, and financial data. This information is valuable to cybercriminals. Beyond data protection, robust cybersecurity is crucial for: Safeguarding Students: Protecting children from online predators, cyberbullying, and inappropriate content. Maintaining Trust: Preserving the trust of parents, students, and the community. Ensuring Business Continuity: Preventing disruptions to learning and administrative operations. Meeting Compliance Requirements: Adhering to data protection regulations like GDPR and local education authority guidelines.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-security-on-a-budget-derby</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739806807872-PHR1XAUD11DPO4AH9N6N/cyber-security-derby-help.jpg</image:loc>
      <image:title>The Cyber Compass - Cybersecurity on a Budget: How a Security Review Can Save Your Derby Business Money - Here's how a security review saves your Derby business money:</image:title>
      <image:caption>Prevents Costly Attacks: Stops cyberattacks before they happen, saving you from ransomware, phishing, and data breaches. Prevention is key. Prioritises Spending: Helps you focus on critical areas, getting the best value for your money. Avoids Fines: Helps you meet regulations like GDPR, avoiding costly penalties. Reduces IT Costs: A more secure system means fewer problems and lower IT support bills. Boosts Efficiency: It can uncover IT inefficiencies, improve productivity, and save on operational costs.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/cyber-essentials-in-derby-your-guide-to-achieving-certification-with-a-security-review</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/9a80aa5f-3ad0-42f2-8608-391848215876/Cyber-Essentials-Logo-1.png</image:loc>
      <image:title>The Cyber Compass - Cyber Essentials in Derby: Your Guide to Achieving Certification with a Security Review - Make it stand out</image:title>
      <image:caption>Why is Cyber Essentials important? Improved Security: The core benefit is enhanced cybersecurity. Implementing the Cyber Essentials controls makes your business much harder to target. Demonstrates Commitment: Certification shows your clients and partners that you prioritise cybersecurity. This can be a significant competitive advantage. Meets Procurement Requirements: Many organisations, especially in the public sector, require their suppliers to have Cyber Essentials certification. Reduces Insurance Premiums: Some cyber insurance providers offer discounts to businesses with Cyber Essentials certification. Provides a Foundation: Cyber Essentials can be a stepping stone towards more advanced cybersecurity frameworks like Cyber Essentials Plus and ISO 27001.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/category/Derby</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/category/Cyber+Review</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/the-cyber-compass/tag/cyber+essentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739469241247-WNQLLE3DBZW164O8FK3H/contact-censor-security.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/a83c24c9-9041-4264-8b50-29b03129a2e4/logo1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739020151559-V0BCOA2ZVMLLZT5QK7TP/unsplash-image-TamMbr4okv4.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1324b44a-f472-45a9-9cac-0c5b71106a95/me1-2.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/b565ff29-d350-4119-aa9b-0953d23f3a5f/p1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/cyber-security-services-supporting-sme-it-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740161763389-YWE4AUC03670HOBFRNUD/unsplash-image-rRWiVQzLm7k.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740162240488-YRPZLQ0UTJGE7V8XW7CA/unsplash-image-mcSDtbWXUZU.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740162297354-OWQIMIWG6T7W7L0W82DF/unsplash-image-P3-YKLS2VKA.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740162363506-49MDLU8Y2BXXMQ7MDR95/unsplash-image-4-EeTnaC1S4.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740163433016-JGJZENG53Y3519RKOVX3/unsplash-image-ISG-rUel0Uw.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740163468073-HRF0P9A7GHCK7ZJHE1WU/unsplash-image-8bghKxNU1j0.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740163502511-66CPEXSUPIO6W58TP2RR/unsplash-image-JKUTrJ4vK00.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740163620106-BH53VWKS7QH57GSTSA7G/unsplash-image-lVF2HLzjopw.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1740164134394-C9PJO1XXRP0LUAEOJVVU/unsplash-image-b3AYk8HKCl0.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-05-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739467695432-YWBJ5FB6T8OCQAFF9PKZ/unsplash-image-bTulpIPKxGg.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/c085f22f-47ce-4cf7-9e0b-97a379e9a31f/EP.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/169b4640-9d51-45b6-8e94-fb35196304e6/microsoft-gold-menu.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/4ca9e845-b1a5-45e0-832e-d3d6c365482f/IASME.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/f7e9783a-f15a-473d-911a-6a61b5c493fd/Cyber-Essentials-Logo-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/education-trusts-and-school-cyber-security-audit-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739293936637-OJT3QK3037RQ62SSM1M8/school-cyber-security-working-to-imporve-security.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739461146050-R3191DR302CGPJ4KRQBE/why+school+cyber+security+matters.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739294417799-Q9R93GKGF66DJVMQL1OY/unsplash-image-744oGeqpxPQ.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739462757259-3RHEQHU11X8QWWSDE0DE/censor+security+case+studies+-+school+cyber+security.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/cyber-security-for-business-risk-assessments</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739912182121-RVPWUZJNJDT3XFDPXKWI/what-are-the-cyber-risks-to-my-business.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739912280710-SND9BFPJ2RBVMOB5285Z/why+is+it+security+important.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739812477271-7PUDORTXZI6NAY1LC65F/unsplash-image-CPs2X8JYmS8.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/cyber-risks-in-schools-school-cyber-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739458738199-4IEJY787JOQB59LODW89/unsplash-image-OP2EQ5g-Zkw.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459074843-7GPBB0W8MS8Y4LA0F1TT/unsplash-image-RLw-UC03Gwc.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459191511-VBX6BPEB3E5KIUWACPSZ/unsplash-image-pf1fMYwrEgg.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459265350-44B65G5XS91LM2N4P1GP/unsplash-image-OqtafYT5kTw.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459366162-AOJ3242RDC78H36W6537/unsplash-image-M5tzZtFCOfs.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459438690-H2L6TQ93OTPW13KHA245/unsplash-image-QuusekRfTI8.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459526530-132D64HSIWVKT8RPNBAR/unsplash-image-R54V69BN0MI.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459668757-1Q8NP7OI29K80ZN9FAW7/unsplash-image-RMIsZlv8qv4.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739459793242-ZUKWJ7B4S3992GI5GF9R/unsplash-image-4-EeTnaC1S4.jpg</image:loc>
      <image:title>Key Cyber Risks In Schools</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/reducing-school-cyber-risk-assessment-safeguarding-data</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739464297514-GPM1M9PVJP87ZWEGM76M/reducing+cyber+risks+in+schools.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/msp-partnership-for-cyber-security-sass</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739801938757-JOCKXA31BO5M55RZRG51/unsplash-image-goFBjlQiZFU.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739805359798-AL5ZOWUMYCSCQB1TVLIK/outsourced-it-security.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739805508884-BK3LCB4CGWOCWX4QSR2F/cyber-security-partnership.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1739805572812-40BZRHOLB51ZRMDYHOVZ/advantages-cyber-partnership.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/-cyber-risks-within-small-medium-business</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618497259178-6XJGK9GR6YAVBQL5L519/20140301_Trade-151_012-2.jpg</image:loc>
      <image:title>Cyber Risk Business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1607694583486-2PQT0LQ193RL7MCB6DX4/20140228_Trade+151_0046.jpg</image:loc>
      <image:title>Cyber Risk Business</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/cyber-security-service-support-near-me</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.censorsecurity.co.uk/business-impact-cyber-threats-data-loss-prevention</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741095075749-Z9S9TRUWV6TZ83UURFEN/data-breach-small-business.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741095148836-H4EZWFBITSLOFD1GJRP4/ransomware-attack.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741095224937-BNZDBZLYC6HD2GTGLPBC/financial-loss-cyber-attack.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741095267326-399HJ0YCJ1NIRA9TQOX5/reputation-damage-cyber-attack.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741095302202-UI9SPLO6UM7AWQXPRLQM/cyber-attack-legal-problems.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67a624322de7e3170cba258d/1741095338503-9JSKLPD4MX16DJSXQ1FJ/business-closure-after-attack.jpg</image:loc>
    </image:image>
  </url>
</urlset>

