<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//blog.backup-technology.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>http://blog.backup-technology.com/11221/big-data-big-decisions/</loc>
		<lastmod>2012-08-15T08:59:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11203/good-backups-at-the-top-of-bruce-schneiers-internet-security-list/</loc>
		<lastmod>2012-08-17T08:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11342/encryption-in-the-cloud/</loc>
		<lastmod>2012-08-24T09:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11360/is-your-backup-provider-iso-certified/</loc>
		<lastmod>2012-08-31T09:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11447/online-backup-common-misconceptions/</loc>
		<lastmod>2012-09-04T08:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11497/data-protection-how-much-do-you-value-your-data/</loc>
		<lastmod>2012-09-12T09:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11484/business-continuity-myths-2/</loc>
		<lastmod>2012-09-14T09:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11563/asigra-level-1-2-training-a-week-in-toronto/</loc>
		<lastmod>2012-09-27T11:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11803/hmrc-commits-to-the-g-cloud/</loc>
		<lastmod>2012-10-04T08:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11939/key-questions-to-ask-your-online-backup-and-disaster-recovery-provider/</loc>
		<lastmod>2012-10-08T09:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12063/personal-data-compromised-after-backup-tapes-lost-in-transit/</loc>
		<lastmod>2012-10-12T10:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12016/the-importance-of-email-and-exchange-backup/</loc>
		<lastmod>2012-10-16T08:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12193/greater-manchester-police-hit-with-fine-after-confidential-data-loss/</loc>
		<lastmod>2012-10-19T08:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12201/hong-kong-immigration-department-suffer-data-loss/</loc>
		<lastmod>2012-10-22T08:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12216/the-disk-vs-tape-ping-pong/</loc>
		<lastmod>2012-11-01T10:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12250/nasa-to-improve-data-security/</loc>
		<lastmod>2012-11-16T10:01:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12275/online-backup-does-your-chosen-provider-offer-the-support-you-need/</loc>
		<lastmod>2012-11-26T09:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12273/the-importance-of-utilising-an-offsite-data-backup-solution/</loc>
		<lastmod>2012-11-27T09:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12261/will-cloud-computing-become-a-regulated-industry/</loc>
		<lastmod>2012-11-28T09:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12285/data-breach-puts-personal-information-at-risk/</loc>
		<lastmod>2012-11-29T08:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12336/legal-concerns-over-cloud-computing/</loc>
		<lastmod>2012-12-11T10:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12318/no-one-wants-their-data-locked-up/</loc>
		<lastmod>2012-12-18T12:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12394/does-the-encryption-and-password-protection-of-laptops-actually-increase-overall-security/</loc>
		<lastmod>2012-12-19T09:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12396/merry-christmas-and-a-happy-new-year/</loc>
		<lastmod>2012-12-21T15:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12426/backup-your-data-the-effectiveness-of-antivirus-products/</loc>
		<lastmod>2013-01-09T09:04:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12427/uk-armed-forces-at-risk-of-cyber-attack/</loc>
		<lastmod>2013-01-09T16:15:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12425/challenges-to-business-continuity-in-2013/</loc>
		<lastmod>2013-01-10T09:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12479/scottish-council-ahead-of-schedule-with-new-data-protection-policy/</loc>
		<lastmod>2013-01-14T09:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12492/data-security-the-perils-of-transporting-unencrypted-data-on-a-portable-hard-drive/</loc>
		<lastmod>2013-01-17T09:14:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12509/are-uk-firms-slow-to-adopt-cloud-computing/</loc>
		<lastmod>2013-01-23T09:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12557/ico-hit-sony-with-250000-fine-after-data-breach/</loc>
		<lastmod>2013-01-25T08:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12576/us-federal-reserve-bank-hacked-by-anonymous/</loc>
		<lastmod>2013-02-08T09:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12644/chinas-prolific-military-hacking-group/</loc>
		<lastmod>2013-02-20T14:04:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12633/cloud-backup-projects-guidelines/</loc>
		<lastmod>2013-02-21T09:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12696/what-price-do-you-place-on-your-data/</loc>
		<lastmod>2013-03-04T09:49:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12697/data-backup-can-you-recover-your-data-after-a-disaster/</loc>
		<lastmod>2013-03-08T09:31:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12681/shopping-for-cloud-backup-services/</loc>
		<lastmod>2013-03-26T09:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12710/data-backup-can-you-successfully-monitor-your-backups/</loc>
		<lastmod>2013-03-28T09:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12749/data-compromised-after-kirkwood-community-college-suffers-data-breach/</loc>
		<lastmod>2013-04-10T10:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12774/backup-technology-partner-with-yorkshire-county-cricket-club/</loc>
		<lastmod>2013-04-10T12:10:35+00:00</lastmod>
		<image:image>
			<image:loc>http://blog.backup-technology.com/wp-content/uploads/2013/04/YCCC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12787/wordpress-powered-websites-targeted-in-major-attack/</loc>
		<lastmod>2013-04-16T08:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12797/spamhaus-ddos-orchestrator-arrested-in-spain/</loc>
		<lastmod>2013-04-30T08:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12819/data-breach-compromises-data-belonging-to-50-million-livingsocial-customers/</loc>
		<lastmod>2013-05-03T09:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12833/data-breach-compromises-creditdebit-card-information-of-mapco-customers/</loc>
		<lastmod>2013-05-08T08:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12843/latin-america-and-caribbean-becoming-haven-for-cybercrime/</loc>
		<lastmod>2013-05-15T08:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12845/replication-does-your-cloud-backup-provider-have-a-replication-system-in-place/</loc>
		<lastmod>2013-05-17T09:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12905/holistic-approach-to-cloud-backups/</loc>
		<lastmod>2013-05-29T08:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12926/disaster-recovery-federal-agencies-unprepared/</loc>
		<lastmod>2013-06-05T08:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12953/data-security-how-quickly-can-you-detect-a-data-breach/</loc>
		<lastmod>2013-06-19T08:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12968/backup-technology-proud-to-sponsor-parliamentary-event-celebrating-150th-anniversary-of-yorkshire-cricket-club/</loc>
		<lastmod>2013-06-19T08:36:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12977/data-backup-the-impact-of-failed-backups/</loc>
		<lastmod>2013-06-21T08:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12984/cyber-security-home-office-invest-4-million-to-help-educate-businesses-and-consumers/</loc>
		<lastmod>2013-06-25T08:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13015/the-performance-based-pricing-revolution/</loc>
		<lastmod>2013-07-15T08:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13052/how-quickly-can-you-restore-your-data/</loc>
		<lastmod>2013-08-16T08:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13055/google-hit-by-unexpected-downtime/</loc>
		<lastmod>2013-08-20T08:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13072/g-cloud/</loc>
		<lastmod>2013-09-11T08:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13115/telstra-warned-overcharging-customers-data-use-abroad/</loc>
		<lastmod>2013-09-17T08:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13122/citizens-advice-bureau-leaks-data-online/</loc>
		<lastmod>2013-09-20T08:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13126/hackers-stole-1-3-million-barclays/</loc>
		<lastmod>2013-09-23T08:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13131/fake-advert-fools-iphone-ipad-owners/</loc>
		<lastmod>2013-09-25T08:31:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13156/microsoft-pays-british-security-researcher-100000/</loc>
		<lastmod>2013-10-11T08:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13160/adobe-suffers-large-security-breach/</loc>
		<lastmod>2013-10-15T08:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13165/handling-confidential-data-whilst-teleworking/</loc>
		<lastmod>2013-10-17T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13172/100-broadband-coverage-across-europe/</loc>
		<lastmod>2013-10-18T08:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13169/will-windows-8-1-improvement/</loc>
		<lastmod>2013-10-25T08:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13190/storm-batters-southern-britain/</loc>
		<lastmod>2013-10-29T10:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13195/samsung-takes-apple/</loc>
		<lastmod>2013-10-30T09:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13204/ipad-work-can-replace-laptop/</loc>
		<lastmod>2013-11-06T09:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13201/mysecurezone-invite-experts-try-crack-email-encryption-system/</loc>
		<lastmod>2013-11-07T09:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13215/uk-isps-ordered-block-pirate-websites/</loc>
		<lastmod>2013-11-15T09:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13325/us-makes-bitcoin-arrests/</loc>
		<lastmod>2014-04-22T14:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13327/israeli-defence-computers-successfully-hacked/</loc>
		<lastmod>2014-04-22T14:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13334/nsa-gchq-target-mobile-apps-gain-personal-data/</loc>
		<lastmod>2014-04-22T14:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13322/lloyds-banking-group-resolve-glitch/</loc>
		<lastmod>2014-04-22T14:05:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13317/record-breaking-pipe-bt-alcatel-lucent/</loc>
		<lastmod>2014-04-22T14:05:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13312/data-breaches-2013-reach-record-high/</loc>
		<lastmod>2014-04-22T14:06:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13304/windows-9-set-april-2015-release/</loc>
		<lastmod>2014-04-22T14:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13298/mobile-apps-money-makers-traffic-drivers/</loc>
		<lastmod>2014-04-22T14:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13295/microsoft-extends-antimalware-support-windows-xp/</loc>
		<lastmod>2014-04-22T14:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13289/scottish-health-boards-suffer-806-data-breaches-last-five-years/</loc>
		<lastmod>2014-04-22T14:07:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13283/mac-user-using-old-version-safari-maybe-time-upgraded/</loc>
		<lastmod>2014-04-22T14:07:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13268/backup-technology-offers-lifeline-symantec-backup-exec-cloud-customers/</loc>
		<lastmod>2014-04-22T14:08:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13278/security-researchers-fail-take-cryptolocker-malware/</loc>
		<lastmod>2014-04-22T14:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13276/technology-firms-demand-change-surveillance-reform/</loc>
		<lastmod>2014-04-22T14:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13270/google-doodle-pays-homage-legendary-computer-scientist-grace-hopper/</loc>
		<lastmod>2014-04-22T14:08:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13256/windows-phone-picking-momentum-us/</loc>
		<lastmod>2014-04-22T14:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13251/data-breach-affects-90000-uw-medicine-patients/</loc>
		<lastmod>2014-04-22T14:09:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13239/virtualisation-agile-exposing-businesses-data-loss/</loc>
		<lastmod>2014-04-22T14:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13237/btl-offer-backup-exec-cloud-customers-lifeline/</loc>
		<lastmod>2014-04-22T14:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13604/symantec-set-pull-backup-exec-cloud/</loc>
		<lastmod>2014-04-22T14:09:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13151/backup-technology-acquired-publicly-listed-leading-uk-cloud-company/</loc>
		<lastmod>2014-04-22T15:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/9822/backup-technology-launch-their-apprenticeship-scheme/</loc>
		<lastmod>2014-04-22T15:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/9811/the-london-riots-being-prepared-for-the-unpredictable/</loc>
		<lastmod>2014-04-22T15:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/9802/backup-technology-launches-v2-0-of-free-online-backup-for-wordpress-plugin/</loc>
		<lastmod>2014-04-22T15:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/5790/the-internet-group-partners-with-leading-online-backup-provider/</loc>
		<lastmod>2014-04-22T15:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/5443/backup-technology-and-terian-solutions-merge/</loc>
		<lastmod>2014-04-22T15:07:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11471/backup-technology-s-online-backup-for-word-press-plugin-exceeds-100000-downloads/</loc>
		<lastmod>2014-04-22T15:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13065/l-k-bennett-selects-backup-technology-to-provide-their-asigra-cloud-backup-and-recovery-solution/</loc>
		<lastmod>2014-04-22T15:09:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/12743/backup-technologys-wordpress-backup-plugin-makes-top-10/</loc>
		<lastmod>2014-04-22T15:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13002/backup-technology-release-version-3-of-their-free-online-backup-for-wordpress-plugin/</loc>
		<lastmod>2014-04-22T15:11:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/11660/sentrum-colo-joins-forces-with-btl/</loc>
		<lastmod>2014-04-22T15:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/10754/backup-technology-to-present-on-virtual-disaster-recovery-at-storage-networking-world-2012-in-dallas/</loc>
		<lastmod>2014-04-22T15:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/10704/asigra-and-backup-technology-present-in-business-continuity-and-disaster-recovery-summit/</loc>
		<lastmod>2014-04-22T15:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/10628/asigra-named-searchstorages-backup-disaster-recovery-product-of-the-year/</loc>
		<lastmod>2014-04-22T15:15:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/10229/backup-technology-launch-new-website-and-monitoring-portal/</loc>
		<lastmod>2014-04-22T15:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13644/programming-error-costs-co-op-bank-110m/</loc>
		<lastmod>2014-04-23T08:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13628/scammer-swoop-windows-xp-end-support/</loc>
		<lastmod>2014-04-23T08:25:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13641/windows-xp-end-life/</loc>
		<lastmod>2014-04-23T08:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13643/heartbleed-may-decrease-internet-speeds-2/</loc>
		<lastmod>2014-04-23T08:26:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13640/yahoo-data-centre-traffic-now-encrypted/</loc>
		<lastmod>2014-04-23T08:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13639/linkedin-email-addresses-exposed-plugin/</loc>
		<lastmod>2014-04-23T08:27:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13564/california-dmv-investigate-possible-data-breach/</loc>
		<lastmod>2014-04-23T08:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13557/human-resources-skills-development-canada-failed-follow-policies/</loc>
		<lastmod>2014-04-23T08:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13547/mtgox-locate-stolen-bitcoins/</loc>
		<lastmod>2014-04-23T08:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13532/nsa-use-tool-record-100-countrys-phone-calls/</loc>
		<lastmod>2014-04-23T08:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13534/hack-attacks-battled-nets-timekeepers/</loc>
		<lastmod>2014-04-23T08:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13529/car-batteries-help-power-data-centres/</loc>
		<lastmod>2014-04-23T08:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13527/sally-beauty-hit-data-breach/</loc>
		<lastmod>2014-04-23T08:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13524/nato-websites-suffer-downtime-cyber-attack/</loc>
		<lastmod>2014-04-23T08:29:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13521/morrisons-suffer-pay-roll-data-theft/</loc>
		<lastmod>2014-04-23T08:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13499/ukraine-outsourcing-industry-risk-crisis/</loc>
		<lastmod>2014-04-23T08:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13492/plans-open-north-east-lancashire-cyber-security-business-park-proposed/</loc>
		<lastmod>2014-04-23T08:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13445/bt-subsidies-sky-talktalk/</loc>
		<lastmod>2014-04-23T08:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13437/sears-suffered-data-breach/</loc>
		<lastmod>2014-04-23T08:31:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13435/boeing-release-self-destructing-smartphone/</loc>
		<lastmod>2014-04-23T08:31:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13427/apple-fix-os-x-security-hole/</loc>
		<lastmod>2014-04-23T08:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13418/microsoft-windows-8-1-rumoured-price-drop/</loc>
		<lastmod>2014-04-23T08:31:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13415/southern-district-health-board-suffers-data-loss/</loc>
		<lastmod>2014-04-23T08:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13399/s-korea-unveil-measures-personal-data-protection-month/</loc>
		<lastmod>2014-04-23T08:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13392/data-roaming-charges-result-european-visitors-turning-phones/</loc>
		<lastmod>2014-04-23T08:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13390/cyber-thieves-target-tesco/</loc>
		<lastmod>2014-04-23T08:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13375/bitcoin-exchange-halts-withdrawals-cyber-attack/</loc>
		<lastmod>2014-04-23T08:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13379/changing-production-environments-match-backup-software-capabilities/</loc>
		<lastmod>2014-04-23T08:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13366/ni-department-justice-fined-ico-data-breach/</loc>
		<lastmod>2014-04-23T08:32:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13363/use-encryption-increase/</loc>
		<lastmod>2014-04-23T08:33:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13359/barclays-start-investigation-data-breach/</loc>
		<lastmod>2014-04-23T08:33:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13356/identity-theft-increase/</loc>
		<lastmod>2014-04-23T08:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13353/high-school-students-hack-teachers-computers/</loc>
		<lastmod>2014-04-23T08:33:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13351/nhs-website-sent-users-malware-site/</loc>
		<lastmod>2014-04-23T08:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13755/major-financer-states-industry-must-adapt-cloud-computing-2/</loc>
		<lastmod>2014-04-23T08:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13349/hackers-successfully-target-white-lodging/</loc>
		<lastmod>2014-04-23T09:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13344/south-korea-fine-google-illegal-data-gathering/</loc>
		<lastmod>2014-04-23T09:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13341/global-smartphone-shipments-set-new-records-2013/</loc>
		<lastmod>2014-04-23T09:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13638/derisory-backup-methods-results-data-loss/</loc>
		<lastmod>2014-04-23T10:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13605/microsoft-office-released-ipad/</loc>
		<lastmod>2014-04-23T10:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13760/chinese-government-continue-using-windows-xp/</loc>
		<lastmod>2014-04-24T10:28:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13762/slowest-broadband-streets-named/</loc>
		<lastmod>2014-04-25T09:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13567/papworth-trust-case-study/</loc>
		<lastmod>2014-04-25T11:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13769/backup-technology-nominated-2014-storage-awards/</loc>
		<lastmod>2014-04-28T08:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13767/hackers-bank-england/</loc>
		<lastmod>2014-04-29T10:25:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13771/microsoft-release-windows-xp-update/</loc>
		<lastmod>2014-05-06T08:33:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13773/nsa-recruit-via-twitter/</loc>
		<lastmod>2014-05-07T08:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13776/future-held-antivirus-software/</loc>
		<lastmod>2014-05-08T08:05:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13778/china-counters-us-claims-charges-cyber-espionage/</loc>
		<lastmod>2014-05-21T08:26:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13780/blackshade-malware-takedown/</loc>
		<lastmod>2014-05-22T08:11:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13784/backup-technology-parent-company-iomart-announces-37-rise-pre-tax-profits/</loc>
		<lastmod>2014-05-28T13:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13794/hackers-successfully-target-spotify/</loc>
		<lastmod>2014-05-29T08:38:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13796/gameoverzeus-cryptolocker-data-protected/</loc>
		<lastmod>2014-06-04T08:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13808/uk-home-secretary-opens-newly-expanded-data-centre/</loc>
		<lastmod>2014-06-09T15:06:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13812/cybercrime-loots-compete-global-drugs-trade/</loc>
		<lastmod>2014-06-12T08:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13814/awards-double-backup-technology/</loc>
		<lastmod>2014-06-18T10:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13816/chinese-smartphones-sold-spyware-installed/</loc>
		<lastmod>2014-06-19T09:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13818/backup-technology-attend-annual-asigra-partner-summit-awards/</loc>
		<lastmod>2014-06-19T09:18:24+00:00</lastmod>
		<image:image>
			<image:loc>http://blog.backup-technology.com/wp-content/uploads/BTLasigra1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13822/blackmailers-triumph-nokia-lose-millions-euros/</loc>
		<lastmod>2014-06-20T08:09:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13828/cloud-backup-security-concerns/</loc>
		<lastmod>2014-07-09T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13840/asos-saved-effective-disaster-recovery/</loc>
		<lastmod>2014-07-10T09:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13834/users-rank-asigra-best-backup-application/</loc>
		<lastmod>2014-07-10T10:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13848/weeks-work-experience-backup-technology/</loc>
		<lastmod>2014-07-11T08:11:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13854/british-government-propose-new-data-access-law/</loc>
		<lastmod>2014-07-14T08:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13866/mobile-internet-banking-transactions-total-1bn-day/</loc>
		<lastmod>2014-07-15T08:04:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13870/app-released-enabling-brain-control-google-glass/</loc>
		<lastmod>2014-07-16T08:19:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13874/catchoftheday-finally-notify-customers-data-breach/</loc>
		<lastmod>2014-07-22T08:15:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13878/goodwill-industries-investigate-possible-data-breach/</loc>
		<lastmod>2014-07-24T08:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13882/nasty-malware-antivirus-cant-detect/</loc>
		<lastmod>2014-08-05T08:21:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13894/cyber-security-challenge-uk-searching-best-hackers-uk/</loc>
		<lastmod>2014-08-06T07:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13898/lifeline-cryptolocker-victims/</loc>
		<lastmod>2014-08-07T08:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13906/nca-launch-another-cyber-safety-campaign/</loc>
		<lastmod>2014-08-15T08:01:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13912/microsoft-urges-users-uninstall-bsod-update/</loc>
		<lastmod>2014-08-19T08:44:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13934/centrelink-investigated-sensitive-data-compromised/</loc>
		<lastmod>2014-08-20T08:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13938/ups-customer-data-compromised/</loc>
		<lastmod>2014-08-22T08:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13944/ministry-justice-fined-ico/</loc>
		<lastmod>2014-08-27T08:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13953/twitter-offer-bug-bounty-rewards/</loc>
		<lastmod>2014-09-05T08:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13971/gmail-addresses-passwords-posted-online/</loc>
		<lastmod>2014-09-12T08:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13977/backup-technology-nominated-uk-industry-award/</loc>
		<lastmod>2014-09-15T12:10:07+00:00</lastmod>
		<image:image>
			<image:loc>http://blog.backup-technology.com/wp-content/uploads/Awards-600x485.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13999/ebay-targeted-cyber-thieves/</loc>
		<lastmod>2014-09-19T08:27:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14021/google-apple-introduce-encryption-default/</loc>
		<lastmod>2014-09-23T08:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14031/jpmorgan-chase-hit-data-breach/</loc>
		<lastmod>2014-10-06T09:09:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14055/call-social-media-websites-provide-data/</loc>
		<lastmod>2014-11-04T10:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14061/data-breaches-rise-california/</loc>
		<lastmod>2014-11-05T10:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14027/apple-withdraw-ios8-update/</loc>
		<lastmod>2014-11-05T10:31:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13967/home-depot-confirm-data-breach/</loc>
		<lastmod>2014-11-05T10:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14041/kmart-suffers-data-breach/</loc>
		<lastmod>2014-11-05T10:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13947/home-depot-investigate-possible-data-breach/</loc>
		<lastmod>2014-11-05T10:33:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13902/vodafone-ranked-last-rural-calls/</loc>
		<lastmod>2014-11-05T10:33:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/13961/apple-iphones-targeted-thieves/</loc>
		<lastmod>2014-11-05T10:36:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14087/essex-county-fire-rescue-service-procures-cloud-backup-via-g-cloud/</loc>
		<lastmod>2014-11-10T13:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14091/online-privacy-achievable/</loc>
		<lastmod>2014-11-11T10:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14099/backup-technology-attend-bcs-computing-uk-industry-awards-evening/</loc>
		<lastmod>2014-11-12T16:56:02+00:00</lastmod>
		<image:image>
			<image:loc>http://blog.backup-technology.com/wp-content/uploads/finalist-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14119/flexible-computing-cloud-advantages/</loc>
		<lastmod>2014-12-03T09:12:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14131/disaster-recovery-backed-virtual-physical-machines/</loc>
		<lastmod>2014-12-08T09:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14137/streamlining-workflows-healthcare-cloud-computing/</loc>
		<lastmod>2014-12-10T09:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14143/virtualisation-basics-cloud-commuters/</loc>
		<lastmod>2014-12-12T09:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14123/layered-authentication-cloud-security/</loc>
		<lastmod>2014-12-05T09:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14153/add-value-public-clouds/</loc>
		<lastmod>2014-12-17T09:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14157/management-oversight-cloud-tools/</loc>
		<lastmod>2014-12-19T09:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14161/get-scalable-storage/</loc>
		<lastmod>2015-01-05T09:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14165/integrate-systems-moving-cloud/</loc>
		<lastmod>2015-01-07T09:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14149/cloud-service-closures-one-deal/</loc>
		<lastmod>2014-12-17T17:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14209/mobile-device-management-cloud-era/</loc>
		<lastmod>2015-01-19T09:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14213/actionable-network-intelligence-cloud-computing-need-hour/</loc>
		<lastmod>2015-01-21T09:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14219/vmware-cloud-computing/</loc>
		<lastmod>2015-01-23T09:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14175/testing-cloud-trials-free-part-ii/</loc>
		<lastmod>2015-01-12T09:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14229/hybridisation-business-advantage/</loc>
		<lastmod>2015-01-26T09:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14233/poised-breakout-hosted-unified-communications/</loc>
		<lastmod>2015-01-28T09:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14241/advantages-hosted-email-service/</loc>
		<lastmod>2015-01-30T09:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14247/cloud-collaboration-important/</loc>
		<lastmod>2015-02-02T09:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14171/test-cloud-trials-free-part/</loc>
		<lastmod>2015-01-12T09:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14183/versioning-cloud-computing-part-ii/</loc>
		<lastmod>2015-01-16T09:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14179/versioning-cloud-computing-part/</loc>
		<lastmod>2015-01-16T13:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14253/integration-myths-victim/</loc>
		<lastmod>2015-02-04T09:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14277/recognising-cloud-risks-dealing/</loc>
		<lastmod>2015-02-06T09:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14281/render-faster-service-cloud/</loc>
		<lastmod>2015-02-09T09:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14285/logic-versioning/</loc>
		<lastmod>2015-02-11T09:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14291/business-process-re-engineering-cloud-computing/</loc>
		<lastmod>2015-02-13T09:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14297/getting-smarter-cloud-computing/</loc>
		<lastmod>2015-02-16T09:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14301/predictive-process-analytics-cloud-computing/</loc>
		<lastmod>2015-02-18T09:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14305/intelligent-processes-cloud-computing/</loc>
		<lastmod>2015-02-20T09:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14311/understanding-cloud-risks-mitigate/</loc>
		<lastmod>2015-02-23T09:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14317/data-protection-virtual-machines-concepts/</loc>
		<lastmod>2015-02-25T09:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14323/rationalising-vm-backup-cloud-computing/</loc>
		<lastmod>2015-02-27T09:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14331/iomart-btl-accredited-uk-government-g-cloud-6/</loc>
		<lastmod>2015-02-03T17:11:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14341/cloud-services-guarantee-high-availability/</loc>
		<lastmod>2015-03-02T09:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14345/black-swan-events-cloud-computing/</loc>
		<lastmod>2015-03-04T09:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14349/cloud-based-data-vs-unmanaged-local-data-one-insecure/</loc>
		<lastmod>2015-03-06T09:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14355/backup-recovery-roi/</loc>
		<lastmod>2015-03-09T09:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14361/creating-high-capacity-networks-almost-no-investment/</loc>
		<lastmod>2015-03-11T09:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14367/duplication-de-duplication/</loc>
		<lastmod>2015-03-13T09:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14371/new-business-paradigm-cloud-networking/</loc>
		<lastmod>2015-03-16T09:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14377/conceptualising-cloud-based-mis/</loc>
		<lastmod>2015-03-18T09:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14381/selecting-right-mis-cloud-model/</loc>
		<lastmod>2015-03-20T09:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14387/saving-space-money-data-de-duplication/</loc>
		<lastmod>2015-03-23T09:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14393/mis-saves-data-lost-forever/</loc>
		<lastmod>2015-03-25T09:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14397/opening-doors-innovation/</loc>
		<lastmod>2015-03-27T09:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14403/avoid-bad-backups/</loc>
		<lastmod>2015-03-30T08:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14407/right-cloud-services-identification-problem/</loc>
		<lastmod>2015-04-01T08:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14413/keeping-costs-control/</loc>
		<lastmod>2015-04-08T08:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14419/functionality-quality-price-evaluation-parameters-cloud/</loc>
		<lastmod>2015-04-10T08:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14427/real-time-transaction-monitoring-cloud/</loc>
		<lastmod>2015-04-13T08:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14433/efficient-stable-de-duplicating-processes/</loc>
		<lastmod>2015-04-15T08:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14447/businesses-move-cloud-part-ii/</loc>
		<lastmod>2015-04-20T08:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14439/businesses-move-cloud-part/</loc>
		<lastmod>2015-04-20T08:33:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14459/mitigating-avoiding-downtime-part-ii/</loc>
		<lastmod>2015-04-24T08:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14485/establishing-successful-cloud-computing-services/</loc>
		<lastmod>2015-05-01T08:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14491/behind-real-innovations-clouds/</loc>
		<lastmod>2015-05-06T08:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14453/mitigating-avoiding-downtime-part/</loc>
		<lastmod>2015-04-24T08:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14477/top-ten-reasons-leave-cloud-backup-service-provider-part-ii/</loc>
		<lastmod>2015-04-29T08:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14471/top-ten-reasons-leave-cloud-backup-service-provider-part/</loc>
		<lastmod>2015-04-29T08:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14499/benefits-cloud-collaboration/</loc>
		<lastmod>2015-05-08T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14513/challenges-cloud-computing-overcome/</loc>
		<lastmod>2015-05-11T08:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14519/role-cloud-brokers-cloud/</loc>
		<lastmod>2015-05-13T08:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14523/privacy-cloud/</loc>
		<lastmod>2015-05-15T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14527/cloud-standardised/</loc>
		<lastmod>2015-05-18T08:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14533/healthcare-professionals-healthcare-service-providers-use-cloud-storing-patient-data/</loc>
		<lastmod>2015-05-20T08:10:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14537/smartphones-cloud-marriage-made-heaven/</loc>
		<lastmod>2015-05-22T08:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14549/companies-professionals-reluctant-use-cloud/</loc>
		<lastmod>2015-05-27T09:10:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14553/four-vs-cloud-computing/</loc>
		<lastmod>2015-05-29T08:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14565/cloud-change-way-business/</loc>
		<lastmod>2015-06-01T08:26:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14575/attractive-features-cloud/</loc>
		<lastmod>2015-06-03T08:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14579/prevent-data-failure-effective-data-storage-cloud/</loc>
		<lastmod>2015-06-05T09:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14585/benefits-cloud-based-email/</loc>
		<lastmod>2015-06-08T08:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14589/cloud-can-help-new-businesses/</loc>
		<lastmod>2015-06-10T08:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14595/cloud-become-integral-part-companys-business-strategy/</loc>
		<lastmod>2015-06-12T08:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14599/cloud-helps-companies-reach-mobile-customers-employees-go/</loc>
		<lastmod>2015-06-15T09:12:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14603/empowering-collaboration/</loc>
		<lastmod>2015-06-17T08:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14609/understanding-architecture-management-chargeback-issues/</loc>
		<lastmod>2015-06-19T08:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14615/holding-back-investing-cloud/</loc>
		<lastmod>2015-06-22T08:11:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14623/security-threats-changing-strategies/</loc>
		<lastmod>2015-06-24T09:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14627/saas-ready/</loc>
		<lastmod>2015-06-26T08:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14633/ediscovery-fulfilling-legal-mandates/</loc>
		<lastmod>2015-06-29T08:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14637/unpatched-software-give-way-data-breaches/</loc>
		<lastmod>2015-07-03T08:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14641/virtualization-storage-performance-raid-levels/</loc>
		<lastmod>2015-07-06T08:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14647/online-backup-recovering-data/</loc>
		<lastmod>2015-07-08T08:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14653/role-cloud-backup-services-disaster-recovery/</loc>
		<lastmod>2015-07-10T09:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14663/significant-software-features-cloud-backup/</loc>
		<lastmod>2015-07-15T08:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14667/smbs-examine-cloud-storage-options/</loc>
		<lastmod>2015-07-16T08:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14671/exchange-server-virtualization-cost-effective-solution/</loc>
		<lastmod>2015-07-17T08:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14675/fundamentals-managed-business-continuity-disaster-recovery-services/</loc>
		<lastmod>2015-07-20T08:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14679/facts-raid-strategies-data-protection/</loc>
		<lastmod>2015-07-22T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14683/cloud-computing-data-protection-healthcare-industry/</loc>
		<lastmod>2015-07-24T08:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14687/backup-technology-powers-iij-europes-enterprise-cloud-iij-gio/</loc>
		<lastmod>2015-07-15T08:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14691/compliance-affects-data-protection-strategies/</loc>
		<lastmod>2015-07-27T08:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14697/tips-effective-backup-recovery-testing/</loc>
		<lastmod>2015-07-30T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14701/services-play-influential-role-legal-industry/</loc>
		<lastmod>2015-07-31T08:56:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14707/malware-one-common-reasons-disaster/</loc>
		<lastmod>2015-08-03T08:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14715/characteristics-advanced-data-archiving-software/</loc>
		<lastmod>2015-08-05T08:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14721/cloud-computing-virtualization-counterpart-information-technology/</loc>
		<lastmod>2015-08-07T08:19:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14727/data-protection-strategies-important-msps/</loc>
		<lastmod>2015-08-10T10:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14733/high-traffic-environments-backing-server-cloud/</loc>
		<lastmod>2015-08-14T07:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14741/cloud-can-cover-needs-healthcare-industry/</loc>
		<lastmod>2015-08-17T08:17:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14747/guidelines-managing-software-audits/</loc>
		<lastmod>2015-08-24T08:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14753/managed-disaster-recovery-fundamentals-significant-business-continuity-vendors/</loc>
		<lastmod>2015-08-26T08:36:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14757/things-consider-re-purposing-workstations/</loc>
		<lastmod>2015-08-28T08:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14761/four-tier-system-define-data-centre-standards/</loc>
		<lastmod>2015-09-03T08:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14765/key-points-convince-clients-software-hardware-upgrades/</loc>
		<lastmod>2015-09-04T08:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14769/managed-service-providers-hipaa-misconceptions/</loc>
		<lastmod>2015-09-07T09:07:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14775/importance-reliable-help-desk-system-managed-service-provider-business/</loc>
		<lastmod>2015-09-09T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14779/significant-linux-backup-practices-helpful-administrators/</loc>
		<lastmod>2015-09-11T08:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14783/best-open-source-tools-perfect-linux-administrators/</loc>
		<lastmod>2015-09-14T08:21:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14789/standardization-inclusive-backup-solution-disaster-recovery/</loc>
		<lastmod>2015-09-17T08:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14795/distributed-denial-service-attack/</loc>
		<lastmod>2015-09-18T08:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14799/facts-behind-re-purposing-outdated-hardware/</loc>
		<lastmod>2015-09-21T08:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14805/backup-storage-hardware-requirements-considering-saas/</loc>
		<lastmod>2015-09-23T08:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14809/environmental-standards-data-centre/</loc>
		<lastmod>2015-09-25T08:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14815/avoid-data-based-cyber-crimes/</loc>
		<lastmod>2015-09-28T08:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14821/role-telco-companies-cloud/</loc>
		<lastmod>2015-09-30T08:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14833/power-activity-logs-cloud-backup-services/</loc>
		<lastmod>2015-10-05T08:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14827/points-note-bare-metal-restore/</loc>
		<lastmod>2015-10-05T08:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14839/making-use-sox-regulatory-intervention/</loc>
		<lastmod>2015-10-07T08:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14845/effects-bandwidth-cloud-computing/</loc>
		<lastmod>2015-10-09T08:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14851/cloud-computing-compliance-industry-standards/</loc>
		<lastmod>2015-10-12T08:03:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14855/pre-process-de-duplication/</loc>
		<lastmod>2015-10-14T08:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14859/post-process-de-duplication/</loc>
		<lastmod>2015-10-16T08:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14863/training-trainers-preparing-disaster-situations/</loc>
		<lastmod>2015-10-19T08:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14867/effective-business-case-tiered-cloud-storage/</loc>
		<lastmod>2015-10-21T08:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14871/facts-suitable-cloud-strategies/</loc>
		<lastmod>2015-10-26T09:17:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14879/asigra-best-cloud-backup-software-powers-btl/</loc>
		<lastmod>2015-10-28T09:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14887/making-administration-compliance-easy/</loc>
		<lastmod>2015-10-30T09:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14893/backup-technology-choose-partner-asigra/</loc>
		<lastmod>2015-11-02T09:51:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14897/assess-cloud-storage-services-actually-using/</loc>
		<lastmod>2015-11-04T09:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14901/can-overcome-storage-management-challenges/</loc>
		<lastmod>2015-11-06T09:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14905/reduce-operational-costs-modernising-data-centre/</loc>
		<lastmod>2015-11-09T09:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14915/technical-support-levels-small-medium-enterprise-businesses/</loc>
		<lastmod>2015-11-10T09:01:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14929/non-compliance-expensive/</loc>
		<lastmod>2015-11-16T09:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14923/roles-third-party-companies-data-protection/</loc>
		<lastmod>2015-11-13T09:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14933/protect-company-data-found-laptops/</loc>
		<lastmod>2015-11-18T10:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14939/managed-service-providers-cloud-data-backup-recovery/</loc>
		<lastmod>2015-11-20T13:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14943/asigra-partner-engagement-levels/</loc>
		<lastmod>2015-11-23T09:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14947/solar-storms-cause-data-disasters/</loc>
		<lastmod>2015-11-25T09:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14957/importance-support-levels-partnership/</loc>
		<lastmod>2015-11-30T09:16:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14951/uks-ico-data-protection-act/</loc>
		<lastmod>2015-12-01T09:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14969/factors-affecting-data-centre-transformation/</loc>
		<lastmod>2015-12-02T13:36:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14981/linking-mobile-devices-data-consolidation/</loc>
		<lastmod>2015-12-08T09:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14985/asigra-reliable-cloud-backup-software-solution/</loc>
		<lastmod>2015-12-10T10:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14995/managing-data-mobile-devices-todays-mobile-world/</loc>
		<lastmod>2015-12-16T14:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14973/making-data-centres-lean-mean/</loc>
		<lastmod>2015-12-15T10:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/14989/shall-replace-upgrade-company-server/</loc>
		<lastmod>2015-12-15T10:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15003/increasing-backup-storage-capacity-mobility-drives/</loc>
		<lastmod>2015-12-18T11:15:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15007/employee-termination-role-preserving-sensitive-data/</loc>
		<lastmod>2015-12-21T09:20:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15013/file-sharing-services-strategies-enterprises-avoid-security-lapse/</loc>
		<lastmod>2016-01-04T10:37:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15017/another-month-another-office-365-outage/</loc>
		<lastmod>2016-01-26T13:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15023/backup-technology-launches-cloudraas-one-click-disaster-recovery-service/</loc>
		<lastmod>2016-03-07T12:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15029/businesses-fail-adopt-disaster-recovery-service/</loc>
		<lastmod>2016-03-08T11:16:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15035/3-reasons-business-adopt-draas/</loc>
		<lastmod>2016-03-21T11:06:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15048/financial-stability-cloud-service-providers-big-factor-selection-process/</loc>
		<lastmod>2016-06-02T08:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15050/understanding-archiving-logic-data-tiering/</loc>
		<lastmod>2016-06-06T09:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15052/importance-cloud-application-programming-interface-api/</loc>
		<lastmod>2016-06-08T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15054/factors-affecting-backup-consolidation-laptops-servers-endpoints/</loc>
		<lastmod>2016-06-10T14:38:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15056/communicating-data-breaches-employees/</loc>
		<lastmod>2016-06-16T09:35:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15058/handling-data-explosion-intelligently/</loc>
		<lastmod>2016-06-17T11:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15060/seven-things-consider-choosing-cloud-backup-service-provider/</loc>
		<lastmod>2016-06-22T14:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15064/role-wan-accelerators-cloud-backups/</loc>
		<lastmod>2016-06-27T08:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15066/mitigating-security-risks-cloud/</loc>
		<lastmod>2016-07-01T08:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15068/five-points-improved-backups/</loc>
		<lastmod>2016-07-04T08:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15071/safer-backup-data-cloud/</loc>
		<lastmod>2016-07-11T09:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15073/disaster-recovery-service-draas-vs-traditional-disaster-recovery-dr/</loc>
		<lastmod>2016-07-13T08:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15075/best-practices-avoid-data-breaches/</loc>
		<lastmod>2016-07-18T11:02:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15084/points-consider-selecting-best-cloud-backup-provider/</loc>
		<lastmod>2016-08-04T09:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15079/best-practises-protect-recover-data-part-2/</loc>
		<lastmod>2016-08-08T16:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15081/best-practises-protect-recover-data-part-ii-2/</loc>
		<lastmod>2016-08-08T16:19:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15092/role-alerts-automatic-cloud-backup-systems/</loc>
		<lastmod>2016-08-19T15:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15094/cloudraas-techtrade-yorkshire/</loc>
		<lastmod>2016-08-23T11:51:28+00:00</lastmod>
		<image:image>
			<image:loc>http://blog.backup-technology.com/wp-content/uploads/techtrade-yorkshire1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15097/message-level-restore-advantageous/</loc>
		<lastmod>2016-08-30T13:03:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15099/share-files-online-securely/</loc>
		<lastmod>2016-08-31T13:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15102/can-earn-carbon-credits/</loc>
		<lastmod>2016-09-02T08:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15104/finding-balance-value-cost-data-protection/</loc>
		<lastmod>2016-09-04T08:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15106/tips-follow-transferring-data-cloud-part/</loc>
		<lastmod>2016-09-07T08:39:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15108/tips-follow-transferring-data-cloud-part-ii/</loc>
		<lastmod>2016-09-08T08:41:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15111/btls-cloud-backup-outperforms-competition/</loc>
		<lastmod>2016-09-28T08:09:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15113/theory-constraints-cloud-backup/</loc>
		<lastmod>2016-09-29T08:09:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15115/accessing-data-anywhere-anytime/</loc>
		<lastmod>2016-10-05T14:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15117/trust-data-cloud/</loc>
		<lastmod>2016-10-06T14:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15119/transisioning-legacy-systems-cloud/</loc>
		<lastmod>2016-10-17T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15128/btl-cloud-backup-product-features-part-ii-2/</loc>
		<lastmod>2016-11-01T15:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15125/btl-cloud-backup-product-features-part-2/</loc>
		<lastmod>2016-11-01T15:07:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15135/continuous-cloud-backup-many-advantages-part-ii/</loc>
		<lastmod>2016-11-03T15:21:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15133/continuous-cloud-backup-many-advantages-part/</loc>
		<lastmod>2016-11-03T15:19:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15139/disaster-recovery-planning-cloud-backup-part/</loc>
		<lastmod>2016-11-28T14:58:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15141/disaster-recovery-planning-cloud-backup-part-ii/</loc>
		<lastmod>2016-11-28T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15144/controlling-cloud-data-face-outages/</loc>
		<lastmod>2016-11-29T14:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15146/cloud-backup-distributed-enterprise-made-easy-btl/</loc>
		<lastmod>2016-11-30T15:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15153/cloud-collaboration-important-part-ii/</loc>
		<lastmod>2017-01-19T09:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15152/cloud-collaboration-important-part/</loc>
		<lastmod>2017-01-19T08:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15156/using-file-versioning-recover-lost-files/</loc>
		<lastmod>2017-01-20T09:13:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15158/marketing-mistakes-every-msp-must-avoid/</loc>
		<lastmod>2017-01-21T09:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15160/influencing-quality-services-focusing-service-level-agreements/</loc>
		<lastmod>2017-03-20T09:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15162/really-need-antivirus-software-today/</loc>
		<lastmod>2017-03-21T09:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15164/using-smart-goals-evaluate-website-part/</loc>
		<lastmod>2017-03-22T09:54:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15166/using-smart-goals-evaluate-website-part-ii/</loc>
		<lastmod>2017-03-22T09:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15168/shoud-use-cloud-based-phone-systems/</loc>
		<lastmod>2017-03-23T09:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://blog.backup-technology.com/15170/five-tested-ways-improve-vendor-relationships/</loc>
		<lastmod>2017-03-24T10:00:51+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->