<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.mbtime.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.mbtime.com/news/mancano-i-modelli-di-sicurezza-informatica-aziendale/</loc>
		<lastmod>2020-12-05T15:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/open-space.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/man-with-glasses-student-computer-science-class-person-uses-computer_1157-42314.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/come-proteggersi-dagli-hacker/</loc>
		<lastmod>2020-12-05T16:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/hacker-man-on-laptop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/riunione-aziendale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cyber-security-o-sicurezza-delle-informazioni-quale-la-differenza/</loc>
		<lastmod>2020-12-05T16:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/manager.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cose-la-cyber-security-ecco-una-definizione-chiara/</loc>
		<lastmod>2020-12-05T16:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/cybersecurity1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/hacker-man-laptop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/voucher-4-0-ccm-modena/</loc>
		<lastmod>2020-12-22T15:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/scan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/scan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/transizione-4-0/</loc>
		<lastmod>2021-01-26T15:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2021/01/tarnsizione40.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/bloccare-il-ransomware-si-puo/</loc>
		<lastmod>2021-01-28T17:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2021/01/digital-crime-by-an-anonymous-hacker-e1611855342337.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-rete-sicurezza-switch-cisco-r-b-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-22T17:22:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2013/09/RB1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-della-centrale-telefonica-tecnologia-ip-b-b-g-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-22T18:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/BBG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/infrastruttura-rete-sicurezza-govoni-srl-crevalcore-bologna/</loc>
		<lastmod>2022-11-26T17:20:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/migrazione-della-posta-elettronica-exchange-2010-microsoft-exchange-2013-carrozzeria-imperiale-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:20:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/infrastrutture-rete-sicurezza-tpm-sistemi-medolla-modena/</loc>
		<lastmod>2022-11-26T17:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-infrastruttura-centralizzata-della-posta-elettronica-microsoft-exchange-abl-srl-cavezzo-modena/</loc>
		<lastmod>2022-11-26T17:21:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/progetto-di-server-tower-con-tecnologia-di-virtualizzazione-vmware-per-rinnai-srl-di-carpi-modena/</loc>
		<lastmod>2022-11-26T17:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/configurazione-un-server-tower-cooperativa-muratori-san-felice-sul-panaro-modena/</loc>
		<lastmod>2022-11-26T17:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/COOPSANFEL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-configurazione-un-server-rack-imva-srl-san-prospero-modena/</loc>
		<lastmod>2022-11-26T17:24:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/centralizzazione-della-posta-elettronica-gemitech-italia-camposanto-modena/</loc>
		<lastmod>2022-11-26T17:24:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-dellinfrastruttura-rete-orm-srl-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-configurazioni-vpn-dinamiche-iumex-modena/</loc>
		<lastmod>2022-11-26T17:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-vpn-dinamiche-gestire-la-sicurezza-carpinet-carpi-modena/</loc>
		<lastmod>2022-11-26T17:26:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/integrazione-sistema-backup-acronis-ascari-business-consulting-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/bilanciamento-backup-2-linee-connettivita-adsl-hdsl-tessilgraf-carpi-modena/</loc>
		<lastmod>2022-11-26T17:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-configurazioni-vpn-dinamiche-valmatic-san-prospero-modena/</loc>
		<lastmod>2022-11-26T17:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/infrastruttura-rete-sicurezza-sam-meccanica-novi-modena/</loc>
		<lastmod>2022-11-26T17:29:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-configurazioni-vpn-dinamiche-sarmat-carpi-modena/</loc>
		<lastmod>2022-11-26T17:29:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-vpn-dinamiche-bp-control-carpi-modena/</loc>
		<lastmod>2022-11-26T17:30:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/infrastruttura-centralizzata-della-posta-elettronica-per-b-emme-di-cavezzo-modena/</loc>
		<lastmod>2022-11-26T17:31:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/implementazione-ambito-disaster-recovery-due-soluzioni-backup-veeam-acronis-arte-costruzioni-san-prospero-modena/</loc>
		<lastmod>2022-11-26T17:35:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/progetto-disaster-recovery-backup-time-machine-rs2-architetti-carpi-modena/</loc>
		<lastmod>2022-11-26T17:36:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/progetto-centralizzazione-dei-backup-dati-foto-studio-immagini-concordia-sulla-secchia-modena/</loc>
		<lastmod>2022-11-26T17:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-un-server-tower-tecnologia-virtualizzazione-vmware-apvd-srl-carpi-modena/</loc>
		<lastmod>2022-11-26T17:38:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/soluzione-backup-dei-dati-rete-via-nas-ad99-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/Logo_AD99_web_130px.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/configurazione-vpn-dinamiche-giorgio-bormac-s-r-l/</loc>
		<lastmod>2022-11-26T17:39:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2013/09/BORMAC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/firewall-controllo-sicurezza-reti-studio-geom-luciano-venturini-gisberto-lugli-san-felice-sul-panaro-modena/</loc>
		<lastmod>2022-11-26T17:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/tecnologie-virtualizzazione-server-rack-mgi-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:48:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-un-server-rack-gestione-centralizzata-della-posta-martinelli-leopoldo-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:48:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/MARTINELLI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/infrastruttura-rete-posta-centralizzata-studio-laura-dott-ssa-marazzi-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:49:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/server-tower-posta-centralizzata-exchange-lavorazione-meccanica-md-cavezzo-modena/</loc>
		<lastmod>2022-11-26T17:51:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/LAVMECMD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/progettazione-configurazione-un-server-tower-mekoil-oleodinamica-s-r-l-carpi-modena/</loc>
		<lastmod>2022-11-26T17:52:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/MEKOIL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/progettazione-realizzazione-server-rack-emotec-s-r-l-medolla-modena/</loc>
		<lastmod>2022-11-26T17:52:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/EMOTEC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/realizzazione-server-ridondanze-fisiche-astarte-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:53:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/ASTARTE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/configurazione-server-rack-centralizzazione-della-posta-meccanica-pico-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:53:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/MECPICO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/posta-centralizzata-exchange-gruppo-rpm-s-r-l-mirandola-modena/</loc>
		<lastmod>2022-11-26T17:54:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/11/assistenza-informatica-oriz2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.mbtime.com/wp-content/uploads/2013/09/RADIOPICO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/online-il-nuovo-sito/</loc>
		<lastmod>2023-01-25T16:08:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/01/sito-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/01/sito-web-mackup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/fondo-perduto-pari-al-40-per-le-imprese-artigiane/</loc>
		<lastmod>2023-01-25T16:10:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2021/03/sede-regione.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/mb-time-a-rem-tech-ferrara/</loc>
		<lastmod>2023-01-31T12:16:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/01/mb-time-remtech.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/attacchi-hacker-in-tutto-il-mondo/</loc>
		<lastmod>2023-02-06T06:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2020/12/hacker-man-laptop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/massiccio-attacco-hacker-a-livello-globale/</loc>
		<lastmod>2023-02-08T18:19:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/02/Attacco_Hacker-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/02/hacker3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/25-campagne-cybercrime-la-scorsa-settimana/</loc>
		<lastmod>2023-02-19T07:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/02/certagid-certpa-cybersecurity-italia-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/ancora-hacker-in-azione-sul-territorio-italiano/</loc>
		<lastmod>2023-02-23T18:16:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/02/attacco-hacker2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/clienti-bper-sotto-il-tiro-delle-campagne-di-phishing/</loc>
		<lastmod>2023-03-05T17:07:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/03/ioca_2023-03-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/03/phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cybersecurity-aziende-troppo-reattive-e-poco-proattive-secondo-forrester-consulting/</loc>
		<lastmod>2023-04-05T09:52:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/04/cyber-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/chi-rischia-di-piu-gli-hacker-russi-mettono-sotto-scacco-litalia/</loc>
		<lastmod>2023-04-21T13:56:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/04/hacker21-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/asl-dellaquila-sotto-attacco/</loc>
		<lastmod>2023-05-06T15:27:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/05/laquila.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/hacker-ultima-frontiera-lintelligenza-artificiale/</loc>
		<lastmod>2023-05-06T15:37:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/05/chatgpt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/capacita-cyber-dellit-un-valore-per-la-sicurezza-aziendale/</loc>
		<lastmod>2023-05-23T15:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/05/IT-MANAGER-1000-x-600.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cybersecurity-le-aziende-sostengono-costi-doppi-per-i-ransomware/</loc>
		<lastmod>2023-06-07T07:33:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/06/cyber2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/destano-preoccupazione-i-nuovi-domini-zip/</loc>
		<lastmod>2023-06-13T17:20:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/06/zip.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/2022-italia-boom-di-attacchi-hacker/</loc>
		<lastmod>2023-06-20T05:54:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/06/Frattasi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/a-como-hacker-pandemia-e-personale-fanno-perdere-2500-screening-tumorali/</loc>
		<lastmod>2023-07-06T07:28:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/07/ATS-como.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/attacco-hacker-manda-in-tilt-i-servizi-it-comunali-a-ferrara/</loc>
		<lastmod>2023-07-15T15:27:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/07/Ferrara_-_Palazzo_del_Municipio_2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/emilia-romagna-e-polizia-postale-patto-contro-gli-hacker/</loc>
		<lastmod>2023-07-24T16:42:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/07/regioneER.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/attacco-hacker-ai-siti-di-sei-banche-italiane/</loc>
		<lastmod>2023-08-02T17:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2022/10/immagine-home-mbtime-oriz-test2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cybersecurity-vittime-di-ransomware-a-77-nellultimo-anno/</loc>
		<lastmod>2023-08-22T09:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/08/ransomware-70.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/finding-a-traditional-wife-where-to-look-for-it/</loc>
		<lastmod>2023-09-01T09:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/trasparenza-sul-web-lue-indica-6-guardiani-per-far-rispettare-le-norme/</loc>
		<lastmod>2023-09-08T16:59:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/09/internet.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/locations-for-mail-orderbrides/</loc>
		<lastmod>2023-09-11T03:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/ci-siamo-rifatti-il-look/</loc>
		<lastmod>2023-09-19T15:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/09/Raggruppa-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/in-azione-gli-hacker-degli-hotel/</loc>
		<lastmod>2023-09-26T10:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/09/reception-hackr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/arrivano-le-false-fatture-col-ransomware-knight/</loc>
		<lastmod>2023-10-07T16:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/10/1_email_knight-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/rapporto-exprivia-hacker-sempre-piu-bravi-raddoppiano-attacchi-riusciti/</loc>
		<lastmod>2023-10-20T15:10:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/10/cyber8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/what-are-the-best-mattress-types-available/</loc>
		<lastmod>2023-10-26T09:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-colpito-il-sistema-informatico-dellazienda-ospedaliera-di-verona/</loc>
		<lastmod>2023-10-27T09:31:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/10/immagine-verona-960-%C3%97-600-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/direttiva-nis2-a-che-punto-siamo/</loc>
		<lastmod>2023-11-25T11:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/11/NIS2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/asl-sanzionata-per-misure-di-sicurezza-inadeguate/</loc>
		<lastmod>2023-11-25T11:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/11/privacy_gdpr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/limportanza-della-formazione-le-violazioni-da-parte-dei-dipendenti-danneggiano-quanto-gli-attacchi-hacker/</loc>
		<lastmod>2023-11-25T12:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/11/dipendenti-mbtime-oriz-960-%C3%97-600-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/si-rialza-la-santita-modenese-dopo-lattaco-hacker/</loc>
		<lastmod>2023-12-07T15:05:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/12/immagine-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/attacco-hacker-pubblicati-12-milioni-di-documenti-privati-modenesi/</loc>
		<lastmod>2023-12-15T12:06:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/12/direzione_generale-ausl.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/auguri-di-buon-natale-e-felice-2024/</loc>
		<lastmod>2023-12-21T17:19:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/12/Buon-Natale.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/prospettive-sulla-cybersecurity-2024-dal-ransomware-allintelligenza-artificiale/</loc>
		<lastmod>2024-01-04T15:19:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/01/ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/report-cert-agid-sulle-campagne-malevole-che-hanno-interessato-litalia-nel-2023/</loc>
		<lastmod>2024-01-13T17:44:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/01/image-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/microsoft-vittima-cyberattacco-da-un-gruppo-filorusso/</loc>
		<lastmod>2024-01-20T16:39:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/01/microsoft-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/ia-generativa-la-principale-minaccia-per-la-cybersecurity-per-trend-micro/</loc>
		<lastmod>2024-02-03T17:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/02/IntelligenzaArtificiale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/facebook-microsoft-e-credit-agricole-le-piu-colpite-dal-phishing/</loc>
		<lastmod>2024-02-17T16:40:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/02/facebook-pishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/sms-dallazienda-ospedaliera-veronese-per-spiegare-le-conseguenze-dellattacco-hacker/</loc>
		<lastmod>2024-02-24T15:52:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/02/sms.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/record-cybercrime-gli-attacchi-gravi-in-italia-saliti-del-65/</loc>
		<lastmod>2024-03-07T18:46:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/03/hacker-oriz-960-%C3%97-600-px-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/falsi-assicuratori-inviano-qr-code-per-il-pagamento/</loc>
		<lastmod>2024-03-16T10:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/03/polizia-postale-mette-in-guardia-dalle-truffe-online.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/assintel-confcommercio-184-di-attacchi-hacker-pmi-nel-mirino/</loc>
		<lastmod>2024-03-25T12:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/03/assitel-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/gruppo-benetton-sotto-attacco-hacker/</loc>
		<lastmod>2024-04-06T16:16:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/04/benetton-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/webinar-scopri-quali-sono-le-differenze-di-sophos-nella-lotta-contro-i-ransomware/</loc>
		<lastmod>2024-04-17T14:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/04/sophos-generic-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/04/sophos-webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-a-synlab-italia/</loc>
		<lastmod>2024-04-26T17:22:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/04/synlab-620x420-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/assistenza-informatica/webinar-sei-in-grado-di-rispondere-alle-cyberminacce-mentre-dormi/</loc>
		<lastmod>2024-05-06T10:18:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/05/sphos-mentre-dormi-mbtime-oriz-960-%C3%97-600-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/pubblicati-nel-darkweb-i-dati-dei-pazienti-synlab/</loc>
		<lastmod>2024-05-16T15:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/05/synlab.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/aumentano-gli-attacchi-cyber-nel-settore-energy-utilities/</loc>
		<lastmod>2024-05-31T14:30:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/05/rinnovabili.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/microsoft-ammette-le-falle-nella-cybersecurity/</loc>
		<lastmod>2024-06-14T17:20:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/06/Brad-Smith-Microsoft.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/approvata-la-legge-sulla-cybersecurity/</loc>
		<lastmod>2024-06-20T14:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/06/cybersecuritu-legge-oriz-960-%C3%97-600-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/la-direttiva-nis2-e-la-sicurezza-informatica-cosa-cambia-per-le-aziende-italiane/</loc>
		<lastmod>2024-06-24T10:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/06/sala-server-mbtime-oriz-960-%C3%97-600-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/i-dati-rubati-a-tea-mantova-finiscono-sul-dark-web/</loc>
		<lastmod>2024-07-05T14:25:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/07/tea-mantova.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/legge-cybersecurity-i-nuovi-obblighi-su-notifica-incidenti-referenti-pa-e-contratti-pubblici/</loc>
		<lastmod>2024-07-15T17:16:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/07/cybersecurity-legge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacchi-ransomware-pressione-degli-hacker-su-chi-non-paga/</loc>
		<lastmod>2024-08-08T08:11:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/08/ransomware-70.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/crescono-gli-attacchi-allautenticazione-a-piu-fattori/</loc>
		<lastmod>2024-09-12T07:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/09/cybersecurity-a-2-piu-fattori.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/ospedali-nel-mirino-degli-hacker-il-2024-vede-un-aumento-degli-attacchi-alla-sanita/</loc>
		<lastmod>2024-09-21T14:44:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/09/attacchi2023-2024.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/smeg-attacco-hacker-si-blocca-la-produzione/</loc>
		<lastmod>2024-09-28T16:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/09/smeg-guastalla.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/allarme-cybersecurity-per-le-piccole-imprese-il-monito-della-direttrice-di-cna-mantova/</loc>
		<lastmod>2024-10-06T07:07:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/10/ELISA-RODIGHIERO-CNA-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/ottobre-il-mese-della-consapevolezza-sulla-cybersecurity/</loc>
		<lastmod>2024-10-15T11:01:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/10/ottobre-mese-cybersecurirty.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/aumento-record-degli-attacchi-informatici-nel-terzo-trimestre-2024-allarme-globale/</loc>
		<lastmod>2024-10-26T07:40:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/10/hacker-3-trimestre-2024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/sophos-cybersecurity-day-2024/</loc>
		<lastmod>2024-11-15T15:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/04/sophos-generic-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/attacco-hacker-a-inps-servizi/</loc>
		<lastmod>2024-11-23T16:42:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/11/Screenshot-2024-11-23-174055.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-al-bologna-fc-rubati-documenti-sensibili-e-dati-bancari/</loc>
		<lastmod>2024-11-29T15:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/11/bologna-sede.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cybercrime-2025-lintelligenza-artificiale-e-le-nuove-frontiere-della-sicurezza-informatica/</loc>
		<lastmod>2024-12-12T17:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/06/cyber2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/chiusura-festivita-natalizie-e-ritorno-a-villafranca/</loc>
		<lastmod>2024-12-18T09:32:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/12/newsletter2024-natale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/nel-2024-truffe-online-per-181-milioni-di-euro/</loc>
		<lastmod>2025-01-05T15:04:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/01/poliziapostaleedellecomunicazioni.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/conad-sotto-attacco-ransomware-la-cyber-gang-lynx-rivendica-lazione/</loc>
		<lastmod>2025-01-15T16:47:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/01/Conad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/vi-aspettiamo-al-sophos-cybersecurity-day-a-bologna/</loc>
		<lastmod>2025-01-25T17:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/01/bologna-sophos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cybersecurity-2025-le-10-nuove-minacce-e-le-strategie-di-difesa/</loc>
		<lastmod>2025-02-18T09:46:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/02/top-ten-2025-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/il-governo-britannico-vuole-vietare-il-pagamento-dei-riscatti-ransomware/</loc>
		<lastmod>2025-02-26T15:04:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/02/immagine_articolo-MBTime-26022025.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/rapporto-clusit-2025-aumentano-gli-attacchi-informatici-italia-tra-i-paesi-piu-colpiti/</loc>
		<lastmod>2025-03-26T18:37:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/03/Security-Summit-Clusit-2025.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/03/clusit205.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cybersecurity-accordo-strategico-per-la-transizione-digitale-delle-imprese/</loc>
		<lastmod>2025-04-10T06:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/04/ACN_protocollo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/scadenza-vicina-per-il-bando-sulla-transizione-digitale-delle-imprese-in-emilia-romagna/</loc>
		<lastmod>2025-04-10T09:26:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/07/regioneER.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/progetti-realizzati/nuovo-dpcm-cyber-le-regole-che-rivoluzionano-gli-appalti-it-della-pubblica-amministrazione/</loc>
		<lastmod>2025-05-13T16:29:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/05/articolo-MBTime-13052025-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/la-relazione-al-parlamento-dellanno-2024-dalla-agenzia-per-la-cybersicurezza-nazionale/</loc>
		<lastmod>2025-05-21T10:59:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/05/Rel-annuale2024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/microsoft-lancia-lo-european-security-program/</loc>
		<lastmod>2025-06-11T08:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/5823107-OMG-FY25-Q4-PA-European-Cyber-Commitments-V3-HEADER-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacchi-cyber-alle-aziende-cosa-sapere-e-come-affrontarli/</loc>
		<lastmod>2025-06-11T09:04:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/WhatsApp-Image-2025-05-22-at-11.07.49-e1749632639307.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/mb-time-inaugura-la-nuova-sede-a-medolla/</loc>
		<lastmod>2025-06-16T07:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/WhatsApp-Image-2025-05-29-at-13.39.07.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/microsoft-decreta-la-fine-del-supporto-per-windows-10/</loc>
		<lastmod>2025-06-17T07:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/padrao-49-1080x720-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/bando-cooperazione-5-0-opportunita-cybersecurity/</loc>
		<lastmod>2025-06-17T09:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/bando-cooperazione-5.0-e1750152910800.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cybersecurity-e-credito-un-binomio-sempre-piu-strategico-per-le-imprese/</loc>
		<lastmod>2025-06-18T16:39:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/credito-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-informatico-alla-provincia-di-bolzano-chiesto-un-riscatto-nessun-dato-personale-violato/</loc>
		<lastmod>2025-06-25T14:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/06/Palais_Widmann_in_Bozen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/intelligenza-artificiale-nei-security-operations-center-una-svolta-epocale-per-la-cybersecurity/</loc>
		<lastmod>2025-07-08T14:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/07/Ai-antivirus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/due-torinesi-coinvolti-nella-rete-degli-hacker-russi-noname/</loc>
		<lastmod>2025-07-19T09:34:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/07/articolo-MBTime-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-globale-contro-microsoft-sharepoint-agenzie-governative-e-aziende-sotto-assedio/</loc>
		<lastmod>2025-07-21T13:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/07/sharepoint.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/hacker-rubano-migliaia-di-documenti-dagli-alberghi-italiani-e-li-vendono-nel-dark-web/</loc>
		<lastmod>2025-08-13T15:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/08/reception-hackr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/indagine-confartigianato-imprese-nel-mirino-degli-hacker-45-di-reati-informatici-in-4-anni/</loc>
		<lastmod>2025-08-19T15:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/08/MarcoGranelli-750x480-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-a-gmail-truffe-in-tutto-il-mondo/</loc>
		<lastmod>2025-08-29T17:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/08/gmail.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/jaguar-e-land-rover-colpite-da-un-cyberattacco-stop-a-produzioni-e-vendite/</loc>
		<lastmod>2025-09-10T14:28:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/09/Tata_logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/hacker-colpiscono-ancora-la-moda-nel-mirino-il-gruppo-kering/</loc>
		<lastmod>2025-09-17T17:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/09/kering-gruppo-e1758129204445.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cyber-security-nellultimo-anno-poste-italiane-ha-fermato-17-milioni-di-attacchi/</loc>
		<lastmod>2025-09-26T15:45:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/09/poste-cert@1x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/al-via-la-nuova-campagna-sulla-sicurezza-informatica/</loc>
		<lastmod>2025-10-04T15:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/10/i-navigati-evidenza-e1759591222589.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/cisco-2025-le-pmi-italiane-nel-mirino-dei-cybercriminali/</loc>
		<lastmod>2025-10-17T15:38:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/10/cisco-blade_additional_02-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/attacco-hacker-alla-piattaforma-paziente-consapevole-rubati-i-dati-di-migliaia-di-pazienti-lombardi/</loc>
		<lastmod>2025-10-30T18:01:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2024/06/cybersecuritu-legge-oriz-960-%C3%97-600-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/cyber-security/quando-un-assalto-digitale-diventa-un-terremoto-industriale-il-caso-jaguar/</loc>
		<lastmod>2025-11-03T10:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/11/2024022811392288996.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/password-2025-admin-e-la-piu-usata-in-italia-ed-e-un-enorme-rischio/</loc>
		<lastmod>2025-11-21T17:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/11/password-MBTime.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/in-italia-10-dei-cyberattacks-mondiali/</loc>
		<lastmod>2025-11-26T11:14:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/11/Copertina_Rapporto_Clusit_ottobre_2025_-875x1240-1-e1762527525449.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/truffa-phishing-con-nutella-gift-box-come-funziona/</loc>
		<lastmod>2025-11-29T10:32:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/11/articolo-MBTime-nutella.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-alla-asl-dellaquila-richieste-di-risarcimento-per-25-milioni/</loc>
		<lastmod>2025-12-11T17:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2025/02/top-ten-2025.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-alla-sanita-ligure-bloccato-il-sistema-dei-referti-sanitari/</loc>
		<lastmod>2026-01-05T18:10:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/01/hacker-liguria.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/nel-2025-oltre-9-000-cyber-attacchi-in-italia-lallarme-della-polizia-postale/</loc>
		<lastmod>2026-01-14T12:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/01/foto-poliziadistato-cybersecurity-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/ue-rafforza-la-cybersicurezza-nuovo-pacchetto-contro-le-minacce-informatiche/</loc>
		<lastmod>2026-01-27T16:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/10/cyber8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/incidenti-in-calo-nel-secondo-semestre-2025-cosa-ci-dicono-i-dati-acn/</loc>
		<lastmod>2026-02-09T10:56:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/02/Linkedin_Wide.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/trendai-2026-il-crimine-informatico-diventa-unindustria/</loc>
		<lastmod>2026-02-10T10:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/02/intelligenza-ai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cyberattacco-al-viminale-dati-di-5-000-agenti-digos-finiti-a-hacker-legati-alla-cina/</loc>
		<lastmod>2026-02-20T17:57:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/02/viminale-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/state-of-cybersecurity-recap-2025-piu-attacchi-alle-pmi-e-ai-decisiva-nel-2026/</loc>
		<lastmod>2026-02-28T16:45:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/11/NIS2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cybersecurity-la-nuova-strategia-usa-punta-al-dominio-tecnologico/</loc>
		<lastmod>2026-03-12T15:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/03/cyber-for-america-e1773329442862.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cyber-attacchi-in-crescita-nel-2025-lanalisi-di-anna-vaccarelli-presidente-di-clusit/</loc>
		<lastmod>2026-03-23T14:01:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2023/04/hacker21-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cybersecurity-cosa-cambia-con-la-legge-di-delegazione-europea-2025/</loc>
		<lastmod>2026-03-29T08:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/03/bandiera-europea.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/attacco-hacker-a-booking-rubati-dati-delle-prenotazioni/</loc>
		<lastmod>2026-04-15T04:25:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/04/ITB2016_Booking_Travelarz-scaled-e1776227084274.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mbtime.com/news/cyberattacco-in-trentino-oltre-3-000-clienti-bloccati-e-studi-in-ginocchio/</loc>
		<lastmod>2026-04-23T07:41:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mbtime.com/wp-content/uploads/2026/04/ransomware26.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->