<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="https://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="https://www.sitemaps.org/schemas/sitemap/0.9 https://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
  <url>
    <loc>https://informationsecurity.iu.edu/index.html</loc>
    <lastmod>2026-02-13T02:54:24Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/about/glossary-of-terms.html</loc>
    <lastmod>2025-07-22T02:09:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/about/index.html</loc>
    <lastmod>2025-06-30T08:55:23Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/about/trustees-resolution.html</loc>
    <lastmod>2025-06-30T08:55:19Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/contact/index.html</loc>
    <lastmod>2026-02-18T10:59:28Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/data.html</loc>
    <lastmod>2025-06-30T08:57:27Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/disclosure-guidance.html</loc>
    <lastmod>2026-02-18T02:48:03Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/email-phishing.html</loc>
    <lastmod>2025-10-23T06:34:02Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/identity.html</loc>
    <lastmod>2025-06-30T08:57:09Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/index.html</loc>
    <lastmod>2025-06-30T08:57:12Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/passphrases.html</loc>
    <lastmod>2026-03-02T02:24:43Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/phishing-halloween.html</loc>
    <lastmod>2025-06-30T08:57:07Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/privileges.html</loc>
    <lastmod>2025-06-30T08:57:05Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/remote-desktop.html</loc>
    <lastmod>2025-06-30T08:57:25Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/web-privacy.html</loc>
    <lastmod>2025-06-30T08:56:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/file-sharing/contesting-violations.html</loc>
    <lastmod>2025-06-30T08:57:01Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/file-sharing/disable.html</loc>
    <lastmod>2025-06-30T08:57:03Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/file-sharing/heoa-bl.html</loc>
    <lastmod>2025-06-30T08:56:58Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/file-sharing/index.html</loc>
    <lastmod>2025-06-30T08:56:54Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/file-sharing/tutorial.html</loc>
    <lastmod>2025-06-30T08:56:52Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/file-sharing/violations.html</loc>
    <lastmod>2025-06-30T08:56:56Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/hardware-software/index.html</loc>
    <lastmod>2025-06-30T08:57:14Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/hardware-software/laptop-mobile-device-security.html</loc>
    <lastmod>2025-06-30T08:57:21Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/hardware-software/malware-scareware-ransomware.html</loc>
    <lastmod>2025-06-30T08:57:18Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/hardware-software/survey-software.html</loc>
    <lastmod>2025-06-30T08:57:23Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/personal-preparedness/hardware-software/wearable-tech.html</loc>
    <lastmod>2025-06-30T08:57:16Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/acceptable-use.html</loc>
    <lastmod>2025-06-30T08:58:21Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/cyber-risk-mitigation.html</loc>
    <lastmod>2025-06-30T08:58:10Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/hierarchy.html</loc>
    <lastmod>2025-06-30T08:58:18Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/index.html</loc>
    <lastmod>2025-07-31T12:09:21Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/ispp24faq.html</loc>
    <lastmod>2025-06-30T08:58:12Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/it07faq.html</loc>
    <lastmod>2025-08-15T03:40:59Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/privacy-policies.html</loc>
    <lastmod>2025-06-30T08:58:16Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/process.html</loc>
    <lastmod>2025-12-12T02:47:46Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/index.html</loc>
    <lastmod>2025-12-18T05:12:06Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-ac.html</loc>
    <lastmod>2026-03-13T03:27:24Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-at.html</loc>
    <lastmod>2026-02-18T11:54:04Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-au.html</loc>
    <lastmod>2026-02-18T11:57:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-cm.html</loc>
    <lastmod>2026-02-18T11:59:29Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-cp.html</loc>
    <lastmod>2026-02-18T12:05:14Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-ia.html</loc>
    <lastmod>2026-02-18T12:04:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-ir.html</loc>
    <lastmod>2026-02-18T02:05:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-ma.html</loc>
    <lastmod>2026-02-18T02:08:16Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-mp.html</loc>
    <lastmod>2026-02-18T02:11:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-pe.html</loc>
    <lastmod>2026-02-18T02:13:24Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-pl.html</loc>
    <lastmod>2026-02-18T02:14:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-ps.html</loc>
    <lastmod>2026-02-18T02:17:04Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-ra.html</loc>
    <lastmod>2026-02-18T03:03:39Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-sa.html</loc>
    <lastmod>2026-02-18T02:23:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-sc.html</loc>
    <lastmod>2026-02-18T02:25:19Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it-12-si.html</loc>
    <lastmod>2026-02-18T02:26:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it12-procedure.html</loc>
    <lastmod>2026-02-18T02:28:29Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/it121.html</loc>
    <lastmod>2025-08-01T07:12:59Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/policies/standards/ssp-template.html</loc>
    <lastmod>2025-09-18T12:53:52Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/privacy/index.html</loc>
    <lastmod>2025-07-10T03:05:57Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/charter.html</loc>
    <lastmod>2025-06-30T08:58:48Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/goals.html</loc>
    <lastmod>2025-06-30T08:59:22Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/governance.html</loc>
    <lastmod>2025-06-30T08:59:24Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/index.html</loc>
    <lastmod>2025-06-30T08:58:50Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/principles.html</loc>
    <lastmod>2025-06-30T08:59:26Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/scope.html</loc>
    <lastmod>2025-06-30T08:59:28Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/tools-resources.html</loc>
    <lastmod>2025-06-30T08:59:30Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/administering-policies.html</loc>
    <lastmod>2025-06-30T08:58:59Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/assessing-risk.html</loc>
    <lastmod>2026-02-18T02:39:55Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/compliance.html</loc>
    <lastmod>2025-06-30T08:59:18Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/human-resources.html</loc>
    <lastmod>2025-06-30T08:59:02Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/identity-access.html</loc>
    <lastmod>2025-06-30T08:59:11Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/index.html</loc>
    <lastmod>2025-06-30T08:58:55Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/information-systems.html</loc>
    <lastmod>2026-02-18T10:53:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/managing-assets.html</loc>
    <lastmod>2025-06-30T08:59:20Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/managing-business-continuity.html</loc>
    <lastmod>2025-06-30T08:58:52Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/managing-communication-operations.html</loc>
    <lastmod>2025-06-30T08:59:07Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/managing-incidents.html</loc>
    <lastmod>2025-06-30T08:59:09Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/organizational-structure.html</loc>
    <lastmod>2025-06-30T08:59:13Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/program/safeguards/securing-physical-environment.html</loc>
    <lastmod>2025-06-30T08:59:16Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/protect-data/gdpr.html</loc>
    <lastmod>2025-07-10T03:08:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/protect-data/sensitive-data/guidelines.html</loc>
    <lastmod>2026-02-18T02:36:34Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/protect-data/sensitive-data/index.html</loc>
    <lastmod>2025-07-10T03:08:51Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/assistance.html</loc>
    <lastmod>2026-02-18T03:01:48Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/emergency-it-incidents.html</loc>
    <lastmod>2026-03-13T03:26:08Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/hipaa-violation.html</loc>
    <lastmod>2025-06-30T08:59:26Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/identity-theft.html</loc>
    <lastmod>2025-06-30T08:59:32Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/index.html</loc>
    <lastmod>2025-12-10T04:28:07Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/managing-incidents.html</loc>
    <lastmod>2025-06-30T08:59:34Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/report-incident/sensitive-data-breaches.html</loc>
    <lastmod>2025-12-10T03:54:38Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/audits-requirements.html</loc>
    <lastmod>2025-06-30T07:53:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/backing-up-data.html</loc>
    <lastmod>2025-06-30T07:53:54Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/best-practices.html</loc>
    <lastmod>2025-06-30T07:53:59Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/cis-benchmarks.html</loc>
    <lastmod>2025-06-30T07:54:00Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/cloud.html</loc>
    <lastmod>2026-03-05T10:42:09Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/disaster-recovery-planning.html</loc>
    <lastmod>2025-06-30T11:44:56Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/employee-data.html</loc>
    <lastmod>2026-02-18T11:27:43Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/encryption.html</loc>
    <lastmod>2025-06-30T07:54:19Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/fda-guidelines.html</loc>
    <lastmod>2025-06-30T07:54:29Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/index.html</loc>
    <lastmod>2026-02-18T02:50:54Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/information-risk-assessments.html</loc>
    <lastmod>2026-03-05T10:45:35Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/media-disposal-guide.html</loc>
    <lastmod>2025-06-30T07:54:39Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/policy-manual.html</loc>
    <lastmod>2025-08-01T07:01:24Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/securemyresearch.html</loc>
    <lastmod>2025-08-27T10:45:40Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/ssl-certificates.html</loc>
    <lastmod>2026-02-06T04:24:34Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/transferring-data.html</loc>
    <lastmod>2025-06-30T07:54:59Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/using-ssh.html</loc>
    <lastmod>2025-06-30T07:55:05Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/additional-resources/cloud-instrutions.html</loc>
    <lastmod>2025-06-30T07:53:30Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/additional-resources/incident-response-web.html</loc>
    <lastmod>2025-06-30T07:53:30Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/additional-resources/index.html</loc>
    <lastmod>2025-06-30T07:53:40Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/resources-professionals/additional-resources/privacy-notice-generator.html</loc>
    <lastmod>2025-06-30T07:53:45Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/search/index.html</loc>
    <lastmod>2025-06-30T07:52:19Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/1-4-meltdown-spectre.html</loc>
    <lastmod>2025-06-30T07:47:55Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/12-11-adobe-updates.html</loc>
    <lastmod>2025-06-30T07:47:55Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/12-11-microsoft-updates.html</loc>
    <lastmod>2025-06-30T07:48:05Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/2017-11-29-highsierraroot.html</loc>
    <lastmod>2025-06-30T07:48:05Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/6-4-microsoft-security-updates.html</loc>
    <lastmod>2025-06-30T07:48:14Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2016-12-1-mozilla-firefox-zero-day.html</loc>
    <lastmod>2025-06-30T07:48:14Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2016-2-16-gnu-c-library.html</loc>
    <lastmod>2025-06-30T07:48:20Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2017-05-08-intel-amt-exploit.html</loc>
    <lastmod>2025-06-30T07:48:20Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2017-06-14-critical-ms-security-patches.html</loc>
    <lastmod>2025-06-30T07:48:29Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2017-09-06-apache-struts-exploit.html</loc>
    <lastmod>2025-06-30T07:48:29Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2017-09-13-blueborn-vulnerabilities.html</loc>
    <lastmod>2025-06-30T07:48:40Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2017-10-16-vulnerability-in-wifi-security.html</loc>
    <lastmod>2025-06-30T07:48:40Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2021-07-02-vulnerability-in-print-spooler.html</loc>
    <lastmod>2025-06-30T07:48:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2021-08-20-securing-remote-machines1.html</loc>
    <lastmod>2025-06-30T07:48:49Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2021-09-10-mshtml-zero-day.html</loc>
    <lastmod>2025-06-30T07:48:54Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2022-09-14-vulnerability-in-clfs.html</loc>
    <lastmod>2025-06-30T07:49:00Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2023-01-11-lastpass-breach.html</loc>
    <lastmod>2025-06-30T07:49:05Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2023-03-21-outlook-windows-vuln.html</loc>
    <lastmod>2025-06-30T07:49:09Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2024-08-14-remote-code-executon-windows-vuln.html</loc>
    <lastmod>2025-06-30T07:49:14Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-2026-02-0-notepad-vuln.html</loc>
    <lastmod>2026-02-13T02:53:44Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/bulletins-apple-cve-2022-32894.html</loc>
    <lastmod>2025-06-30T07:49:19Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/duo-phish.html</loc>
    <lastmod>2025-06-30T07:49:24Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/index.html</loc>
    <lastmod>2026-02-13T02:54:00Z</lastmod>
  </url>
  <url>
    <loc>https://informationsecurity.iu.edu/security-bulletins/smart-devices-best-practices.html</loc>
    <lastmod>2025-06-30T07:49:29Z</lastmod>
  </url>
</urlset>