<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap.xsl"?>
<!--Generated by the Simple XML Sitemap Drupal module: https://drupal.org/project/simple_sitemap.-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://www.protontechs.com/</loc>
  <lastmod>2026-02-13T16:01:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>1.0</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/services/it-management</loc>
  <lastmod>2025-11-17T15:18:36-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/services/cybersecurity</loc>
  <lastmod>2026-01-28T11:07:11-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/services/compliance</loc>
  <lastmod>2025-11-18T08:37:01-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/add-ons/incident-response</loc>
  <lastmod>2026-02-20T09:36:31-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/add-ons/account-shield</loc>
  <lastmod>2025-11-18T08:37:25-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/add-ons/vcio</loc>
  <lastmod>2025-11-18T08:39:08-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/cyber-score</loc>
  <lastmod>2025-11-17T15:23:41-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog</loc>
  <lastmod>2025-12-10T14:14:14-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources</loc>
  <lastmod>2025-11-17T15:25:41-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/soc</loc>
  <lastmod>2026-02-13T16:02:22-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/company/submit-a-ticket</loc>
  <lastmod>2026-03-04T14:19:20-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/company/contact-us</loc>
  <lastmod>2026-03-30T13:21:23-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/company/careers</loc>
  <lastmod>2025-10-24T15:26:45-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/cp/the-state-of-cybersecurity-2025</loc>
  <lastmod>2026-03-05T08:43:53-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/cp/cyberattack</loc>
  <lastmod>2026-01-26T11:24:29-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/cp/dont-feed-the-phish</loc>
  <lastmod>2026-03-13T14:40:46-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/comparing-dealership-privacy-vs-security</loc>
  <lastmod>2025-10-07T19:09:20-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/why-are-dealerships-targeted</loc>
  <lastmod>2025-10-30T16:54:37-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/timeline-ransomware-attack</loc>
  <lastmod>2025-10-30T15:56:06-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/whats-your-network-process</loc>
  <lastmod>2025-10-31T09:18:10-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/breaking-down-compliance</loc>
  <lastmod>2025-10-07T18:58:58-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/keeping-it-simple</loc>
  <lastmod>2025-10-07T19:29:34-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/would-you-feed-phish</loc>
  <lastmod>2025-10-30T16:57:11-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-cyberattack</loc>
  <lastmod>2025-10-30T16:46:52-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/value-cybersecurity-control</loc>
  <lastmod>2025-10-30T16:07:52-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/growing-threat-business-email-compromise</loc>
  <lastmod>2025-10-30T14:52:16-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/fake-captcha-rise</loc>
  <lastmod>2025-10-07T19:17:32-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/shadow-it-vs-shadow-data</loc>
  <lastmod>2025-10-07T19:46:09-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/service-spotlight-vcio</loc>
  <lastmod>2025-10-07T19:44:10-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/reducing-your-attack-surface</loc>
  <lastmod>2025-10-07T19:40:51-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/looking-ahead-nada-2025</loc>
  <lastmod>2025-10-07T19:32:20-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/ai-changing-game-cyberattacks</loc>
  <lastmod>2025-10-07T18:57:09-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-create-incident-response-plan</loc>
  <lastmod>2025-10-07T19:20:00-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/shining-light-shadow-data</loc>
  <lastmod>2025-10-07T19:47:00-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/5-it-best-practices-every-dealership-should-implement</loc>
  <lastmod>2025-10-07T17:23:40-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/understanding-edr-alert-systems-what-do-you-do-when-alarm-goes</loc>
  <lastmod>2025-10-30T16:20:31-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/fortifying-your-digital-castle-cloud-and-email-security-strategies</loc>
  <lastmod>2025-10-07T19:18:19-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/debunking-3-most-common-training-myths</loc>
  <lastmod>2025-10-07T19:16:27-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/4-cybersecurity-takeaways-amplify-2024</loc>
  <lastmod>2025-10-07T18:55:05-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/3-ways-address-breach-risks</loc>
  <lastmod>2025-10-07T18:52:42-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-create-cybersecurity-culture</loc>
  <lastmod>2025-10-07T19:18:50-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/compliance-vs-cybersecurity-whats-difference</loc>
  <lastmod>2025-10-07T19:10:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/identity-theft-real-or-just-movies</loc>
  <lastmod>2025-10-07T19:27:29-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/practice-makes-perfect-tabletop-exercises-you-can-do-your-team</loc>
  <lastmod>2025-10-07T19:39:14-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/hidden-cost-poor-password-management</loc>
  <lastmod>2025-10-30T15:06:11-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-are-security-conscious-employees-worth</loc>
  <lastmod>2025-10-30T16:37:13-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/ultimate-compliance-checklist</loc>
  <lastmod>2025-10-30T16:00:05-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/basics-hygiene-cyber-not-personal</loc>
  <lastmod>2025-10-07T19:51:56-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/executive-reporting-tips-completing-your-yearly-report</loc>
  <lastmod>2025-10-07T19:16:56-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/cyber-insurance-101</loc>
  <lastmod>2025-10-07T19:13:36-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/new-compliance-portal-features-you-wont-want-miss</loc>
  <lastmod>2025-10-07T19:37:00-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/nada-recap-combat-cyber-insurance-prices</loc>
  <lastmod>2025-10-07T19:35:04-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/tame-tiger-proton-nada</loc>
  <lastmod>2025-10-07T19:48:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/account-shield-your-new-secret-weapon</loc>
  <lastmod>2025-10-07T17:31:24-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-quishing</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/compliance-wrapped-2023</loc>
  <lastmod>2025-10-07T19:10:45-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/security-operations-center-open-and-here-help</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/latest-ftc-update-what-do-now-and-how-stay-safe</loc>
  <lastmod>2025-10-30T15:12:35-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/amazon-gone-wrong-breach-story</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/conditional-access-key-cyber-success</loc>
  <lastmod>2025-10-07T19:11:26-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/what-have-we-learned-tips-qi-qi</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/understanding-business-email-compromise</loc>
  <lastmod>2025-10-30T16:12:54-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/dealership-info-isnt-only-data-you-want-protect</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/welcome-compliance-portal</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/between-us-and-proton-we-have-good-future-together</loc>
  <lastmod>2025-09-30T13:22:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/3-ways-you-can-prevent-phishing</loc>
  <lastmod>2025-10-07T18:54:02-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/dealership-cybersecurity-why-proactive-approach-matters</loc>
  <lastmod>2025-10-07T19:14:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/why-cybercriminals-target-dealerships</loc>
  <lastmod>2025-10-30T16:56:02-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/cybercrime-automotive-what-you-need-know</loc>
  <lastmod>2025-10-07T19:12:40-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/welcome-new-proton-portal</loc>
  <lastmod>2025-10-30T16:34:30-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/importance-security-awareness-training</loc>
  <lastmod>2025-10-30T15:07:24-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/state-cybersecurity-2025</loc>
  <lastmod>2025-11-12T10:34:08-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-threat-becomes-shutdown</loc>
  <lastmod>2025-11-24T10:31:39-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/moving-windows-10</loc>
  <lastmod>2026-01-29T10:06:28-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/byte-sized-beasts-dealership-sized-threats</loc>
  <lastmod>2026-01-02T10:14:27-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/common-types-phishing</loc>
  <lastmod>2026-01-02T10:13:57-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/keeping-cybersecurity-top-mind</loc>
  <lastmod>2025-12-21T00:00:00-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/importance-cyber-partnership</loc>
  <lastmod>2026-01-29T10:04:01-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/looking-ahead-nada-2026</loc>
  <lastmod>2026-01-28T14:18:00-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/how-submit-ticket</loc>
  <lastmod>2026-02-27T11:13:00-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/dealership-defense-demonstrated-proton-nada-2026</loc>
  <lastmod>2026-02-27T12:50:00-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/access-controls-how-secure-your-dealership</loc>
  <lastmod>2026-03-18T14:24:00-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.protontechs.com/resources/blog/do-you-have-security-protocols-ai</loc>
  <lastmod>2026-03-21T08:00:00-04:00</lastmod>
  <priority>0.5</priority>
 </url>
</urlset>
