<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <!-- Main Site -->
  <url>
    <loc>https://blacktowercyber.com/</loc>
    <changefreq>monthly</changefreq>
    <priority>1.0</priority>
  </url>

  <!-- Landing Pages -->
  <url>
    <loc>https://blacktowercyber.com/incident-response/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/business-email-compromise/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/microsoft-365-security-assessment/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/law-firm-cybersecurity/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/ransomware-response/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/aws-security/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/cloud-hardening/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/google-workspace-security/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/managed-detection/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <!-- Tower Zero -->
  <url>
    <loc>https://blacktowercyber.com/tower-zero/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <!-- Blog Index -->
  <url>
    <loc>https://blacktowercyber.com/blog/</loc>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>

  <!-- Blog Posts -->
  <url>
    <loc>https://blacktowercyber.com/blog/how-account-takeovers-happen/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/m365-exposed/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/security-assessments/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/cyber-incident-step-by-step/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/why-m365-account-takeovers-go-undetected/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/your-it-company-is-not-your-incident-responder/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/first-24-hours-microsoft-365-breach/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/what-is-business-email-compromise/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/real-cost-of-cyber-incident-small-business/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/five-m365-misconfigurations-attackers-look-for/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/aws-security/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blacktowercyber.com/blog/google-workspace-security/</loc>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>

</urlset>
