<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap.xsl"?>
<!--Generated by the Simple XML Sitemap Drupal module: https://drupal.org/project/simple_sitemap.-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://www.protontechs.com/</loc>
  <lastmod>2026-02-13T21:01:23+00:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>1.0</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/services/it-management</loc>
  <lastmod>2025-11-17T20:18:36+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/services/cybersecurity</loc>
  <lastmod>2026-01-28T16:07:11+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/services/compliance</loc>
  <lastmod>2025-11-18T13:37:01+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/add-ons/incident-response</loc>
  <lastmod>2026-02-20T14:36:31+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/add-ons/account-shield</loc>
  <lastmod>2025-11-18T13:37:25+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/add-ons/vcio</loc>
  <lastmod>2025-11-18T13:39:08+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/cyber-score</loc>
  <lastmod>2025-11-17T20:23:41+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog</loc>
  <lastmod>2025-12-10T19:14:14+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources</loc>
  <lastmod>2025-11-17T20:25:41+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/soc</loc>
  <lastmod>2026-02-13T21:02:22+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/company/submit-a-ticket</loc>
  <lastmod>2026-03-04T19:19:20+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/company/contact-us</loc>
  <lastmod>2026-03-30T17:21:23+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/company/careers</loc>
  <lastmod>2025-10-24T19:26:45+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/cp/the-state-of-cybersecurity-2025</loc>
  <lastmod>2026-03-05T13:43:53+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/cp/cyberattack</loc>
  <lastmod>2026-01-26T16:24:29+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/cp/dont-feed-the-phish</loc>
  <lastmod>2026-03-13T18:40:46+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/comparing-dealership-privacy-vs-security</loc>
  <lastmod>2025-10-07T23:09:20+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/why-are-dealerships-targeted</loc>
  <lastmod>2025-10-30T20:54:37+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/timeline-ransomware-attack</loc>
  <lastmod>2025-10-30T19:56:06+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/whats-your-network-process</loc>
  <lastmod>2025-10-31T13:18:10+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/breaking-down-compliance</loc>
  <lastmod>2025-10-07T22:58:58+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/keeping-it-simple</loc>
  <lastmod>2025-10-07T23:29:34+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/would-you-feed-phish</loc>
  <lastmod>2025-10-30T20:57:11+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-cyberattack</loc>
  <lastmod>2025-10-30T20:46:52+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/value-cybersecurity-control</loc>
  <lastmod>2025-10-30T20:07:52+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/growing-threat-business-email-compromise</loc>
  <lastmod>2025-10-30T18:52:16+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/fake-captcha-rise</loc>
  <lastmod>2025-10-07T23:17:32+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/shadow-it-vs-shadow-data</loc>
  <lastmod>2025-10-07T23:46:09+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/service-spotlight-vcio</loc>
  <lastmod>2025-10-07T23:44:10+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/reducing-your-attack-surface</loc>
  <lastmod>2025-10-07T23:40:51+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/looking-ahead-nada-2025</loc>
  <lastmod>2025-10-07T23:32:20+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/ai-changing-game-cyberattacks</loc>
  <lastmod>2025-10-07T22:57:09+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-create-incident-response-plan</loc>
  <lastmod>2025-10-07T23:20:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/shining-light-shadow-data</loc>
  <lastmod>2025-10-07T23:47:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/5-it-best-practices-every-dealership-should-implement</loc>
  <lastmod>2025-10-07T21:23:40+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/understanding-edr-alert-systems-what-do-you-do-when-alarm-goes</loc>
  <lastmod>2025-10-30T20:20:31+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/fortifying-your-digital-castle-cloud-and-email-security-strategies</loc>
  <lastmod>2025-10-07T23:18:19+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/debunking-3-most-common-training-myths</loc>
  <lastmod>2025-10-07T23:16:27+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/4-cybersecurity-takeaways-amplify-2024</loc>
  <lastmod>2025-10-07T22:55:05+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/3-ways-address-breach-risks</loc>
  <lastmod>2025-10-07T22:52:42+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-create-cybersecurity-culture</loc>
  <lastmod>2025-10-07T23:18:50+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/compliance-vs-cybersecurity-whats-difference</loc>
  <lastmod>2025-10-07T23:10:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/identity-theft-real-or-just-movies</loc>
  <lastmod>2025-10-07T23:27:29+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/practice-makes-perfect-tabletop-exercises-you-can-do-your-team</loc>
  <lastmod>2025-10-07T23:39:14+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/hidden-cost-poor-password-management</loc>
  <lastmod>2025-10-30T19:06:11+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-are-security-conscious-employees-worth</loc>
  <lastmod>2025-10-30T20:37:13+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/ultimate-compliance-checklist</loc>
  <lastmod>2025-10-30T20:00:05+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/basics-hygiene-cyber-not-personal</loc>
  <lastmod>2025-10-07T23:51:56+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/executive-reporting-tips-completing-your-yearly-report</loc>
  <lastmod>2025-10-07T23:16:56+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/cyber-insurance-101</loc>
  <lastmod>2025-10-07T23:13:36+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/new-compliance-portal-features-you-wont-want-miss</loc>
  <lastmod>2025-10-07T23:37:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/nada-recap-combat-cyber-insurance-prices</loc>
  <lastmod>2025-10-07T23:35:04+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/tame-tiger-proton-nada</loc>
  <lastmod>2025-10-07T23:48:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/account-shield-your-new-secret-weapon</loc>
  <lastmod>2025-10-07T21:31:24+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-quishing</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/compliance-wrapped-2023</loc>
  <lastmod>2025-10-07T23:10:45+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/security-operations-center-open-and-here-help</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/latest-ftc-update-what-do-now-and-how-stay-safe</loc>
  <lastmod>2025-10-30T19:12:35+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/amazon-gone-wrong-breach-story</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/conditional-access-key-cyber-success</loc>
  <lastmod>2025-10-07T23:11:26+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-have-we-learned-tips-qi-qi</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/understanding-business-email-compromise</loc>
  <lastmod>2025-10-30T20:12:54+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/dealership-info-isnt-only-data-you-want-protect</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/welcome-compliance-portal</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/between-us-and-proton-we-have-good-future-together</loc>
  <lastmod>2025-09-30T17:22:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/3-ways-you-can-prevent-phishing</loc>
  <lastmod>2025-10-07T22:54:02+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/dealership-cybersecurity-why-proactive-approach-matters</loc>
  <lastmod>2025-10-07T23:14:12+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/why-cybercriminals-target-dealerships</loc>
  <lastmod>2025-10-30T20:56:02+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/cybercrime-automotive-what-you-need-know</loc>
  <lastmod>2025-10-07T23:12:40+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/welcome-new-proton-portal</loc>
  <lastmod>2025-10-30T20:34:30+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/importance-security-awareness-training</loc>
  <lastmod>2025-10-30T19:07:24+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/state-cybersecurity-2025</loc>
  <lastmod>2025-11-12T15:34:08+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-threat-becomes-shutdown</loc>
  <lastmod>2025-11-24T15:31:39+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/moving-windows-10</loc>
  <lastmod>2026-01-29T15:06:28+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/byte-sized-beasts-dealership-sized-threats</loc>
  <lastmod>2026-01-02T15:14:27+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/common-types-phishing</loc>
  <lastmod>2026-01-02T15:13:57+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/keeping-cybersecurity-top-mind</loc>
  <lastmod>2025-12-21T05:00:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/importance-cyber-partnership</loc>
  <lastmod>2026-01-29T15:04:01+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/looking-ahead-nada-2026</loc>
  <lastmod>2026-01-28T19:18:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-submit-ticket</loc>
  <lastmod>2026-02-27T16:13:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/dealership-defense-demonstrated-proton-nada-2026</loc>
  <lastmod>2026-02-27T17:50:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/access-controls-how-secure-your-dealership</loc>
  <lastmod>2026-03-18T18:24:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/do-you-have-security-protocols-ai</loc>
  <lastmod>2026-03-21T12:00:00+00:00</lastmod>
  <priority>0.5</priority>
 </url>
</urlset>
