<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 1:09 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://timbuktech.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>TimbukTech Inc.</title>
		<link><![CDATA[https://timbuktech.com]]></link>
		<description><![CDATA[TimbukTech Inc.]]></description>
		<lastBuildDate><![CDATA[Wed, 14 Jan 2026 16:45:59 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://timbuktech.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://timbuktech.com/2025/06/02/outdated-software-the-hidden-threat-businesses-cant-afford-to-ignore/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/06/02/outdated-software-the-hidden-threat-businesses-cant-afford-to-ignore/]]></link>
			<title>Outdated Software: The Hidden Threat Businesses Can’t Afford to Ignore</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:45:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/]]></guid>
			<link><![CDATA[https://timbuktech.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Wed, 10 Jan 2024 19:52:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2024/11/22/whats-changing-in-password-management/]]></guid>
			<link><![CDATA[https://timbuktech.com/2024/11/22/whats-changing-in-password-management/]]></link>
			<title>What’s Changing in Password Management?</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:46:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/01/08/why-mdr-matters-for-local-businesses/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/01/08/why-mdr-matters-for-local-businesses/]]></link>
			<title>Why Managed Detection and Response (MDR) Matters for Local Businesses</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:46:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/02/13/why-every-small-business-needs-a-cybersecurity-risk-assessment/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/02/13/why-every-small-business-needs-a-cybersecurity-risk-assessment/]]></link>
			<title>Why Every Small Business Needs a Cybersecurity Risk Assessment</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:46:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/03/13/how-ai-is-changing-the-game-for-small-businesses/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/03/13/how-ai-is-changing-the-game-for-small-businesses/]]></link>
			<title>How AI is Changing the Game for Small Businesses: Smarter Workflows, Bigger Impact</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:46:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/05/05/phishing-attacks-how-to-spot-them-and-educate-your-team/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/05/05/phishing-attacks-how-to-spot-them-and-educate-your-team/]]></link>
			<title>Phishing Attacks: How to Spot Them and Educate Your Team</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:46:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/contact-us/]]></guid>
			<link><![CDATA[https://timbuktech.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 05:07:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2026/01/13/password-management-done-right-best-practices-for-small-businesses/]]></guid>
			<link><![CDATA[https://timbuktech.com/2026/01/13/password-management-done-right-best-practices-for-small-businesses/]]></link>
			<title>Password Management Done Right: Best Practices for Small Businesses</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 17:00:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/12/16/tabletop-exercises-why-small-businesses-need-to-practice-their-emergency-plans/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/12/16/tabletop-exercises-why-small-businesses-need-to-practice-their-emergency-plans/]]></link>
			<title>Tabletop Exercises: Why Small Businesses Need to Practice Their Emergency Plans</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 17:00:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/07/03/the-hidden-cost-of-non-compliance-what-smbs-need-to-know/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/07/03/the-hidden-cost-of-non-compliance-what-smbs-need-to-know/]]></link>
			<title>The Hidden Cost of Non-Compliance: What SMBs Need to Know</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:45:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/08/01/why-monitored-matters-more-than-ai-labeled-in-securitieselementor-2612/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/08/01/why-monitored-matters-more-than-ai-labeled-in-securitieselementor-2612/]]></link>
			<title>Why “Monitored” Matters More Than “AI-Labeled” in Securities</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:45:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/09/04/managed-detection-and-response/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/09/04/managed-detection-and-response/]]></link>
			<title>Managed Detection and Response (MDR): The 24/7 Cybersecurity Guardian for Your Small Business</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:45:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/10/03/why-it-isnt-just-support-its-a-growth-strategy/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/10/03/why-it-isnt-just-support-its-a-growth-strategy/]]></link>
			<title>Why IT Isn’t Just Support: It’s a Growth Strategy</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:45:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2025/11/21/the-7-minute-cybersecurity-check-up/]]></guid>
			<link><![CDATA[https://timbuktech.com/2025/11/21/the-7-minute-cybersecurity-check-up/]]></link>
			<title>The 7-Minute Cybersecurity Check-Up</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 16:45:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/careers/]]></guid>
			<link><![CDATA[https://timbuktech.com/careers/]]></link>
			<title>Careers</title>
			<pubDate><![CDATA[Wed, 03 May 2023 14:40:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/smsopt-in/]]></guid>
			<link><![CDATA[https://timbuktech.com/smsopt-in/]]></link>
			<title>SMS Opt-In</title>
			<pubDate><![CDATA[Thu, 14 Aug 2025 15:51:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/blog/]]></guid>
			<link><![CDATA[https://timbuktech.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 25 Nov 2024 11:40:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/privacy-policy/]]></guid>
			<link><![CDATA[https://timbuktech.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 17:02:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2026/02/06/technical-business-planning-why-real-it-strategy-goes-far-beyond-replacement-cycles/]]></guid>
			<link><![CDATA[https://timbuktech.com/2026/02/06/technical-business-planning-why-real-it-strategy-goes-far-beyond-replacement-cycles/]]></link>
			<title>Technical Business Planning: Why Real IT Strategy Goes Far Beyond Replacement Cycles</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 14:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/about-us/]]></guid>
			<link><![CDATA[https://timbuktech.com/about-us/]]></link>
			<title>About Us</title>
			<pubDate><![CDATA[Wed, 03 May 2023 14:37:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/sitemap/]]></guid>
			<link><![CDATA[https://timbuktech.com/sitemap/]]></link>
			<title>Sitemap</title>
			<pubDate><![CDATA[Tue, 27 Dec 2022 10:52:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://timbuktech.com/2026/03/19/internal-vulnerability-scanning-and-compliance-risk-assessments-simplified/]]></guid>
			<link><![CDATA[https://timbuktech.com/2026/03/19/internal-vulnerability-scanning-and-compliance-risk-assessments-simplified/]]></link>
			<title>Internal Vulnerability Scanning and Compliance Risk Assessments, Simplified</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 15:05:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
