<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>smb-it-services</Name><Prefix></Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>-26.html</Key><LastModified>2025-01-11T02:45:37.000Z</LastModified><ETag>&quot;5941be6a41f0b299654970adc40964ca&quot;</ETag><Size>95796</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>-4.html</Key><LastModified>2024-12-27T01:08:35.000Z</LastModified><ETag>&quot;16a2d85d90ce1f0c14472bb97fb8ff02&quot;</ETag><Size>95910</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>14-how-to-secure-your-data-with-trusted-it-consulting-services-in-new-york-city.html</Key><LastModified>2024-12-27T01:08:14.000Z</LastModified><ETag>&quot;bac25b76b3f05d2e808b6a10b51d63d6&quot;</ETag><Size>98074</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>15-how-tech-companies-benefit-from-using-a-managed-it-services-provider-nyc.html</Key><LastModified>2024-09-26T21:07:25.000Z</LastModified><ETag>&quot;88bcc82564478cb96740ec9f23ce9280&quot;</ETag><Size>6382</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>15-what-is-remote-it-support-and-how-can-it-benefit-queens-based-companies.html</Key><LastModified>2025-01-11T02:43:35.000Z</LastModified><ETag>&quot;4938078980d7dd9b5325cdf43ce5b8e6&quot;</ETag><Size>98062</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>2025-cloud-compliance-dont-get-left-behind.html</Key><LastModified>2025-05-13T18:41:06.000Z</LastModified><ETag>&quot;9d8e940f3371a98b4a2d9fde9d7f6ff2&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>93244</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>affordable-cybersecurity-advisory-for-every-business.html</Key><LastModified>2025-06-08T19:05:43.000Z</LastModified><ETag>&quot;5de4663a48b2a4c37a91c8724f94c7cb&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94089</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>ai-a-cyber-reputation-brand-protection-evolved.html</Key><LastModified>2025-07-22T19:29:02.000Z</LastModified><ETag>&quot;76d05f6b9390e455c8cf6f0dd0d81c5d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>64890</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>automate-cyber-security-reputation-defense.html</Key><LastModified>2025-07-22T19:26:49.000Z</LastModified><ETag>&quot;020e48c99839b4532d7d7e34c878fc99&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>76979</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>automated-cyber-security-easy-reputation-defense-1.html</Key><LastModified>2025-07-22T19:28:00.000Z</LastModified><ETag>&quot;d789a3aaa71d1ffd893dc1d4ba683301&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>77364</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>benefits-of-hiring-an-it-consultant-for-businesses-in-new-york-1.html</Key><LastModified>2024-12-27T00:40:10.000Z</LastModified><ETag>&quot;bfa114b97f1c2653acbea4d6fd4f3a90&quot;</ETag><Size>94716</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>best-cybersecurity-services-for-reputation-protection.html</Key><LastModified>2025-07-22T19:25:52.000Z</LastModified><ETag>&quot;0cf1ab90e2dc54a68e669f609fe394d7&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>76648</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>best-local-cybersecurity-advisory-experts-near-you.html</Key><LastModified>2025-06-08T19:05:27.000Z</LastModified><ETag>&quot;8bbcfee3995754d58e8fc9b5ca219e18&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97540</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>best-practices-for-managing-vendor-relationships-with-an-outsourced-it-provider.html</Key><LastModified>2024-09-26T20:23:03.000Z</LastModified><ETag>&quot;b796986e445f4957b2ef829397532779&quot;</ETag><Size>5769</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>beyond-compliance-real-security-governance-1.html</Key><LastModified>2025-05-14T16:59:02.000Z</LastModified><ETag>&quot;d99f599558dc554dbaed62abb5a8d6c5&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>88416</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>botnet-prevention-consulting-3.html</Key><LastModified>2025-08-09T20:17:22.000Z</LastModified><ETag>&quot;c248af56405ec79ca105340198441e88&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59709</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>brand-monitoring-your-online-reputation-watchdog.html</Key><LastModified>2025-07-22T19:29:00.000Z</LastModified><ETag>&quot;7e34128b51cd42cba1ada2c56404eb11&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>76253</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>case-studies-of-successful-cybersecurity-solutions-implemented-by-companies.html</Key><LastModified>2024-09-12T01:02:38.000Z</LastModified><ETag>&quot;add3ae53de87c148041a47488d5a2d18&quot;</ETag><Size>31470</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>case-studies-of-successful-it-consulting-projects-in-new-york.html</Key><LastModified>2024-12-27T01:05:34.000Z</LastModified><ETag>&quot;d7177b1be2f712751bfaba8da64a031f&quot;</ETag><Size>91656</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>case-studies-of-successful-it-consulting-projects-in-the-big-apple.html</Key><LastModified>2024-12-27T01:07:00.000Z</LastModified><ETag>&quot;f6fffbf1cd4c3b36aa8a94225adf9f25&quot;</ETag><Size>95485</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>case-studies-showcasing-successful-implementations-of-it-support-services.html</Key><LastModified>2024-12-23T22:28:28.000Z</LastModified><ETag>&quot;f58342ca6cfd62bccc8e3257807a3d00&quot;</ETag><Size>78277</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>case-studies-showcasing-successful-implementations-of-it-support-solutions.html</Key><LastModified>2024-12-23T22:27:09.000Z</LastModified><ETag>&quot;20c997a5c1634c4991838129e2afd09d&quot;</ETag><Size>75635</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-compliance-be-proactive-not-reactive.html</Key><LastModified>2025-05-13T18:39:59.000Z</LastModified><ETag>&quot;da7fe48cda22dd8815babe7d055a4c50&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>96418</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-compliance-empowering-your-security-team.html</Key><LastModified>2025-05-13T18:41:25.000Z</LastModified><ETag>&quot;233d813e53eb647163e25836c162ab89&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94295</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-compliance-regulations-made-easy-1.html</Key><LastModified>2025-05-13T18:41:57.000Z</LastModified><ETag>&quot;31bba246a23d8a9c32fb156e6847e154&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>96946</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-compliance-services-expert-tips-strategies.html</Key><LastModified>2025-05-13T18:38:30.000Z</LastModified><ETag>&quot;96503c42569014a7d3ad4c309480685e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>100449</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-compliance-your-2025-readiness-checklist.html</Key><LastModified>2025-05-13T18:41:21.000Z</LastModified><ETag>&quot;fe92b2a45906d2054e29c098c7c0237a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85296</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-compliance.html</Key><LastModified>2025-05-13T18:39:19.000Z</LastModified><ETag>&quot;1a33f28e155e6e0e5e0a4deb112a387d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94286</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cloud-data-security-the-role-of-secure-coding-consulting.html</Key><LastModified>2025-08-09T20:14:30.000Z</LastModified><ETag>&quot;5dff985344d69dffc04d55c7a91b47cf&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59881</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>code-security-audit-the-ultimate-checklist.html</Key><LastModified>2025-08-09T20:16:53.000Z</LastModified><ETag>&quot;db30851a557d9817c149ec2f063e36bc&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>60499</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>common-cyber-threats-faced-by-businesses-in-nyc-1.html</Key><LastModified>2024-09-12T01:06:42.000Z</LastModified><ETag>&quot;4574d0664ace91a6ac8fb94c9b64b858&quot;</ETag><Size>31302</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-attacks-reputation-damage-control.html</Key><LastModified>2025-07-22T19:27:30.000Z</LastModified><ETag>&quot;bf067e54605ecd53044f7d2587f35887&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>64916</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-breach-response-managing-your-reputation.html</Key><LastModified>2025-07-22T19:26:35.000Z</LastModified><ETag>&quot;06fbdb75f8388a62bfebcbdd59e27950&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>72839</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-incident-plan-your-reputation-lifeline.html</Key><LastModified>2025-07-22T19:27:16.000Z</LastModified><ETag>&quot;fa4cdb62b7b1f730d218f4dac362b3ca&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>65979</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-incident-plan-your-reputations-safety-net.html</Key><LastModified>2025-07-22T19:28:29.000Z</LastModified><ETag>&quot;d1919b79a1bb71ff9abfed882f3c2907&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>74386</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-advisory-the-importance-of-regular-audits.html</Key><LastModified>2025-06-08T19:05:10.000Z</LastModified><ETag>&quot;48ee35ac7ca7952cad3f30d83b966aae&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83483</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-measures-for-businesses-in-nyc.html</Key><LastModified>2025-01-14T01:46:05.000Z</LastModified><ETag>&quot;b338f5d8b58d34fb63263a79bae9fcba&quot;</ETag><Size>84712</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>data-backup-and-disaster-recovery-solutions-for-nyc-businesses.html</Key><LastModified>2025-01-14T01:44:56.000Z</LastModified><ETag>&quot;03ffa30680a0be4a3a3388f874cab988&quot;</ETag><Size>91011</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>data-protection-simplified-expert-cyber-advice.html</Key><LastModified>2025-06-08T19:08:11.000Z</LastModified><ETag>&quot;73352bef3684719f35e3dbab546b4cf3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95118</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>devops-a-secure-coding-consulting-for-automation.html</Key><LastModified>2025-08-09T20:14:43.000Z</LastModified><ETag>&quot;a8d66f83b8b8196add42eaabe0275c6a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59997</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>dont-get-caught-out-sox-compliance-services-guide.html</Key><LastModified>2025-05-28T18:41:39.000Z</LastModified><ETag>&quot;9c1276c03d309a2f485f7e50fb87d365&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>57599</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>feed.xml</Key><LastModified>2024-01-22T14:46:35.000Z</LastModified><ETag>&quot;62bdf3fee3198880ba8291a9d2fc2bf0&quot;</ETag><Size>1028900</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>global-cloud-compliance-regulations-explained-simply.html</Key><LastModified>2025-05-13T18:40:08.000Z</LastModified><ETag>&quot;3502625eb5cdd1f670334f6ee5c34cfb&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84509</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-avoid-common-it-issues-with-professional-support-in-queens-2.html</Key><LastModified>2025-01-11T02:44:20.000Z</LastModified><ETag>&quot;364e2c48d02ac610a2e59507bc3c8c3a&quot;</ETag><Size>88473</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-benefit-from-outsourcing-it-services-with-a-company-in-nyc.html</Key><LastModified>2025-01-14T02:07:12.000Z</LastModified><ETag>&quot;3d08caf3a6dc9f91407f72e06cf8d1ab&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>100850</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-benefit-from-professional-it-consulting-in-new-york.html</Key><LastModified>2024-12-27T01:08:11.000Z</LastModified><ETag>&quot;12ce1cd4f3d4b3323eec5ea1149b63ba&quot;</ETag><Size>93929</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-budget-effectively-for-it-support-and-services-in-your-organization.html</Key><LastModified>2024-12-23T22:29:24.000Z</LastModified><ETag>&quot;07f3effb015a7ee99e407cd37691f3fa&quot;</ETag><Size>82045</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-choose-the-best-cyber-security-services-company-for-your-business-1.html</Key><LastModified>2024-09-12T01:00:21.000Z</LastModified><ETag>&quot;a8fabc81439ffbca682689fdcaf14a22&quot;</ETag><Size>33341</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-choose-the-best-secure-coding-consultant.html</Key><LastModified>2025-08-09T20:15:49.000Z</LastModified><ETag>&quot;a3503e21e9b14837a0d2b1bb49beb3ad&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59838</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-create-a-disaster-recovery-plan-with-it-support-services.html</Key><LastModified>2024-12-23T22:25:37.000Z</LastModified><ETag>&quot;01fe7af5583f83f77f07ad534b814cf4&quot;</ETag><Size>71519</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-enhance-collaboration-within-your-organization-with-managed-it-services-in-ny.html</Key><LastModified>2024-09-26T21:03:14.000Z</LastModified><ETag>&quot;96d2a3066fe80f0a1523d93a78d982dd&quot;</ETag><Size>5673</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-establish-a-strong-reputation-as-an-it-consultant-in-new-york.html</Key><LastModified>2024-12-27T00:38:50.000Z</LastModified><ETag>&quot;8e798cc4f3f2a7ab0118b4748759aa77&quot;</ETag><Size>104363</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-find-reliable-it-consultants-in-new-york.html</Key><LastModified>2024-12-27T01:04:36.000Z</LastModified><ETag>&quot;44ac042d3f2353e7e8420f8324ef6bd5&quot;</ETag><Size>98173</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-find-reliable-managed-it-support-in-nyc.html</Key><LastModified>2024-09-26T20:42:24.000Z</LastModified><ETag>&quot;cb51d57af77ff7b9998fee3bbe0f9d5a&quot;</ETag><Size>5173</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-find-the-best-it-services-in-nyc.html</Key><LastModified>2025-01-14T01:44:35.000Z</LastModified><ETag>&quot;4a51f0810af95aec2c980e6a26f575cd&quot;</ETag><Size>84422</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-identify-your-it-consulting-needs-in-new-york.html</Key><LastModified>2024-12-27T00:39:56.000Z</LastModified><ETag>&quot;7560af6cd6e1cc295bb364bdaf362d6d&quot;</ETag><Size>92789</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-maximize-roi-on-your-investment-in-managed-it-services-in-nyc.html</Key><LastModified>2024-09-26T20:42:31.000Z</LastModified><ETag>&quot;670e6a05dd4a4da94da1679b539592fa&quot;</ETag><Size>5405</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-safeguard-your-business-assets-with-comprehensive-cyber-security-services-offerings.html</Key><LastModified>2024-09-12T01:00:28.000Z</LastModified><ETag>&quot;84478ed3210de6481b864ceaee78dcb7&quot;</ETag><Size>34349</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-safeguard-your-data-and-protect-your-business-from-cyberthreats.html</Key><LastModified>2024-01-22T14:46:45.000Z</LastModified><ETag>&quot;41b3c9a756361fcb3249f9edbfe24a08&quot;</ETag><Size>47191</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-scale-up-your-business-with-scalable-it-solutions.html</Key><LastModified>2024-12-23T22:26:20.000Z</LastModified><ETag>&quot;536373cd21df6164b8bedb063c3feeae&quot;</ETag><Size>82888</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-secure-data-and-networks-with-top-rated-it-consulting-companies-in-nyc.html</Key><LastModified>2025-01-14T02:06:26.000Z</LastModified><ETag>&quot;3b831feb2613c7d1b8ea3d14a5d68c0b&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>106767</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-stay-ahead-of-the-competition-with-managed-it-services-in-ny.html</Key><LastModified>2024-09-26T21:05:37.000Z</LastModified><ETag>&quot;14bfdfbd50fb6cfbea7598a4e0aa19f4&quot;</ETag><Size>5804</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-stay-competitive-in-nyc-with-a-managed-it-service-provider.html</Key><LastModified>2024-09-26T20:41:09.000Z</LastModified><ETag>&quot;948a7d243dda524b056a5db07139e5e0&quot;</ETag><Size>5544</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-streamline-your-business-operations-with-it-support-services-in-queens.html</Key><LastModified>2025-01-11T02:45:05.000Z</LastModified><ETag>&quot;fe32383dea43cd9320da9af68bbceddd&quot;</ETag><Size>92077</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-streamline-your-technology-with-managed-it-services-in-queens.html</Key><LastModified>2025-01-11T02:44:23.000Z</LastModified><ETag>&quot;833ad460be551409a064ae5e31cfeba3&quot;</ETag><Size>92172</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-troubleshoot-common-hardware-problems.html</Key><LastModified>2024-12-23T22:28:24.000Z</LastModified><ETag>&quot;062b53b8994595fcb97560cd8efcaea1&quot;</ETag><Size>79087</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-verify-references-and-testimonials-of-potential-it-consultants-operating-out-of-ny.html</Key><LastModified>2024-12-27T00:38:02.000Z</LastModified><ETag>&quot;c6309f3d26fdaf5c62050526fac95c59&quot;</ETag><Size>102351</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>human-factors-in-security-governance-get-it-right.html</Key><LastModified>2025-05-14T16:56:44.000Z</LastModified><ETag>&quot;a0a6b2cf66f98e8f030017b7f51c1cac&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87486</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>importance-of-cybersecurity-services-for-businesses.html</Key><LastModified>2024-09-12T01:02:00.000Z</LastModified><ETag>&quot;e918aaea41cf65ab76b4893ba297a462&quot;</ETag><Size>32952</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>importance-of-cybersecurity-services-in-nyc.html</Key><LastModified>2024-09-12T00:50:00.000Z</LastModified><ETag>&quot;e94c7ded4832c2df673e8010da75fc57&quot;</ETag><Size>30917</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>importance-of-proactive-it-maintenance-for-businesses-in-queens.html</Key><LastModified>2025-01-11T02:41:49.000Z</LastModified><ETag>&quot;221c0bb5d54399cd0856dec337a7d0f2&quot;</ETag><Size>94371</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>incident-response-and-digital-forensics-services-in-nyc.html</Key><LastModified>2024-09-12T01:10:26.000Z</LastModified><ETag>&quot;13ed9dbb7a575bab7566384aaa1f285e&quot;</ETag><Size>34156</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>latest-trends-in-it-support-services.html</Key><LastModified>2024-12-23T22:25:49.000Z</LastModified><ETag>&quot;55ee08c7f8181ab9d0eade578f30f0e4&quot;</ETag><Size>71000</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>local-code-security-experts-find-consultants-near-you.html</Key><LastModified>2025-08-09T20:17:03.000Z</LastModified><ETag>&quot;78d3018da13961e3266d6e8dfa4a7b3c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59306</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>local-secure-coding-consultants-find-experts-nearby.html</Key><LastModified>2025-08-09T20:14:26.000Z</LastModified><ETag>&quot;c9c85c459ea3af2dc805b10cf2cb5e0d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59280</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>managed-it-services-streamlining-business-operations-for-smbs.html</Key><LastModified>2024-01-22T14:46:55.000Z</LastModified><ETag>&quot;e80e6b4a0544dd3b2a7daa0023c0cd56&quot;</ETag><Size>41210</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>managed-security-services-providers-mssps-in-nyc.html</Key><LastModified>2024-09-12T00:50:38.000Z</LastModified><ETag>&quot;e52f441af48bc9f94db087f17233a43e&quot;</ETag><Size>31452</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>maximize-security-expert-code-consulting-strategies.html</Key><LastModified>2025-08-09T20:17:13.000Z</LastModified><ETag>&quot;58cb2b01d9a0231746f1245fbe8537e1&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58997</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>mentorship-and-networking-building-a-strong-community-for-women-it-consultants-in-queens.html</Key><LastModified>2025-03-31T01:50:24.000Z</LastModified><ETag>&quot;488fdf24aba4f24a2f5f5bc9bf5a6bdc&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>115074</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>network-security-secure-coding-consulting-tips.html</Key><LastModified>2025-08-09T20:16:09.000Z</LastModified><ETag>&quot;f31511ec0f1203bac9d5d426915ba0f2&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59868</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>networking-and-mentorship-building-a-support-system-for-women-in-queens-it.html</Key><LastModified>2025-03-31T01:49:42.000Z</LastModified><ETag>&quot;e67af2558af833464eddd0289eba1f18&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>103614</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>outsourcing-vs-insourcing-deciding-on-the-best-approach-for-managing-your-companys-it-needs.html</Key><LastModified>2024-09-26T20:38:29.000Z</LastModified><ETag>&quot;eb364669515f24aaa68f4ae9cda694c1&quot;</ETag><Size>5904</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>peace-of-mind-guaranteed-with-security-advisory.html</Key><LastModified>2025-06-08T19:06:25.000Z</LastModified><ETag>&quot;1ea6e6b586dc7bd1e9c5b3a2fc0c7ced&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82442</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>privacy-laws-how-they-shape-cyber-reputation-strategies.html</Key><LastModified>2025-07-22T19:27:28.000Z</LastModified><ETag>&quot;fd6e2bbd7a741e70e8d4e46a674daabf&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>65607</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>protect-your-ip-cybersecurity-advisory-solutions-1.html</Key><LastModified>2025-06-08T19:06:27.000Z</LastModified><ETag>&quot;70a4db2321949a1e1bbb3b2eaa0be508&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83320</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>protecting-ip-security-governance-strategies-1.html</Key><LastModified>2025-05-14T16:58:03.000Z</LastModified><ETag>&quot;0c21aa89230dca06adb5b0ff6c50c480&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>98886</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>regular-security-audits-why-theyre-essential-1.html</Key><LastModified>2025-06-08T19:07:52.000Z</LastModified><ETag>&quot;82cc10571b77ff0af82a15d3d54645c4&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83644</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>regulatory-compliance-and-data-protection-considerations-for-businesses-working-with-an-it-consultant-in-new-york.html</Key><LastModified>2024-12-27T00:40:59.000Z</LastModified><ETag>&quot;6de39423f1777bf7edeeb2d6e5beb661&quot;</ETag><Size>94644</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>reputation-and-cyber-a-winning-combination.html</Key><LastModified>2025-07-22T19:26:23.000Z</LastModified><ETag>&quot;c1efc5749713bc43d02019b0988922e5&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>75554</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>role-of-managed-service-providers-msps-in-supporting-the-growth-of-businesses-in-the-competitive-market-environment-of-nyc.html</Key><LastModified>2025-01-14T01:46:19.000Z</LastModified><ETag>&quot;cb7f0e2c55267141e0a54cf308d898bb&quot;</ETag><Size>90581</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>safe-software-the-secret-of-secure-code-consulting.html</Key><LastModified>2025-08-09T20:15:08.000Z</LastModified><ETag>&quot;2247026f18d08eafe261788ade241a2d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>61433</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>secure-code-boost-roi-with-expert-help.html</Key><LastModified>2025-08-09T20:14:59.000Z</LastModified><ETag>&quot;f1ff77a63c5486cbc907834a75438fc7&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59838</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>secure-code-for-startups-essential-consulting-tips.html</Key><LastModified>2025-08-09T20:17:10.000Z</LastModified><ETag>&quot;786b6969761989e61c8ba113e4b4f8fe&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58913</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>secure-coding-consulting-iot-security-and-device-management.html</Key><LastModified>2025-08-09T20:14:17.000Z</LastModified><ETag>&quot;585101e2fd3d5a2d27fee516935f94f0&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>60061</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>secure-coding-consulting-the-roi-you-cant-ignore.html</Key><LastModified>2025-08-09T20:13:58.000Z</LastModified><ETag>&quot;87040ab5434cc76294e70cba86f7b6e8&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>60106</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>secure-your-supply-chain-with-cybersecurity-advisory.html</Key><LastModified>2025-06-08T19:05:48.000Z</LastModified><ETag>&quot;70a1ece9fbabdcb9bf28ceba9c497919&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>93957</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>security-culture-building-it-through-governance.html</Key><LastModified>2025-05-14T16:57:47.000Z</LastModified><ETag>&quot;89cc2844e38eb2a53423bb6d0c1b7f69&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86572</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>security-governance-framework-dont-make-these-mistakes.html</Key><LastModified>2025-05-14T16:55:53.000Z</LastModified><ETag>&quot;7db27908f3e4b88aea1b0078447502f4&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86719</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>security-governance-framework-stay-ahead-of-the-curve-2025.html</Key><LastModified>2025-05-14T16:56:30.000Z</LastModified><ETag>&quot;7034c099307d76f43beb37ec83029245&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87489</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>security-governance-framework-the-importance-of-encryption.html</Key><LastModified>2025-05-14T16:56:23.000Z</LastModified><ETag>&quot;5cd800d74e5649d0001770437ffdfced&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101383</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>security-governance-framework-the-rise-of-decentralized-security.html</Key><LastModified>2025-05-14T16:56:21.000Z</LastModified><ETag>&quot;0920bd48a05ed6b908cddc0940761704&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>100729</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>security-governance-framework-your-2025-survival-guide.html</Key><LastModified>2025-05-14T16:55:48.000Z</LastModified><ETag>&quot;e8b7f12c5f254e2807eeb10955e33d99&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86951</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>social-media-a-cyber-reputation-the-connection.html</Key><LastModified>2025-07-22T19:27:05.000Z</LastModified><ETag>&quot;bd998cd60ac7fb5e7d2fe6ae1bf9d97c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>65688</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>social-media-cyber-reputation-amplifier.html</Key><LastModified>2025-07-22T19:28:55.000Z</LastModified><ETag>&quot;ac5d9a387c42085bf0764b8790f7e1db&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>75228</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-2025-key-regulatory-changes-explained.html</Key><LastModified>2025-05-28T18:43:30.000Z</LastModified><ETag>&quot;f52be614f9910636a0a56453d958c342&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>67942</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-checklist-your-essential-compliance-tool.html</Key><LastModified>2025-05-28T18:43:02.000Z</LastModified><ETag>&quot;67ec90a18f65ddc98ea4712b20faf487&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58098</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-compliance-fueling-sustainable-growth.html</Key><LastModified>2025-05-28T18:42:39.000Z</LastModified><ETag>&quot;6ed8b403e353d1b94ddc66a94332253c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>57584</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-compliance-services-navigate-the-complexities.html</Key><LastModified>2025-05-28T18:41:56.000Z</LastModified><ETag>&quot;d36c86d01c43639599439af98247aad2&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58050</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-compliance-services-the-hidden-benefits.html</Key><LastModified>2025-05-28T18:42:00.000Z</LastModified><ETag>&quot;cea7d0688f9a94dcc04c0c93d9a9f594&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>67342</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-compliance-services-top-10-providers-2025.html</Key><LastModified>2025-05-28T18:41:33.000Z</LastModified><ETag>&quot;23d24100fe41597792acd1e0f703e5d3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>71423</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-compliance-services-whats-new-in-2025.html</Key><LastModified>2025-05-28T18:41:46.000Z</LastModified><ETag>&quot;a81f4f6475ffc962a16f2a7a11c90630&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58397</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-compliance-your-complete-compliance-path.html</Key><LastModified>2025-05-28T18:42:47.000Z</LastModified><ETag>&quot;e2cf8706616a68cb090a9653ce530d47&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>64946</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-deadline-looming-get-compliant-today.html</Key><LastModified>2025-05-28T18:43:43.000Z</LastModified><ETag>&quot;97329903168ce58883fe0e01f4af4a11&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>56687</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-made-easy-simplify-your-compliance.html</Key><LastModified>2025-05-28T18:43:01.000Z</LastModified><ETag>&quot;a3b3f35b44aa4fa547d8d34bd6613ac3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>64080</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-proactive-compliance-stay-ahead-of-the-game.html</Key><LastModified>2025-05-28T18:45:22.000Z</LastModified><ETag>&quot;5069d5d1f8102d9c4bef87cf1cb94ca8&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59073</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-reputation-protect-your-brand-with-compliance.html</Key><LastModified>2025-05-28T18:43:24.000Z</LastModified><ETag>&quot;95773a8a32b13f9b96932ccc50bacf5a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>64873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-savings-smart-compliance-lower-costs.html</Key><LastModified>2025-05-28T18:42:49.000Z</LastModified><ETag>&quot;56795f2bde5c8c5a1250513bd2593220&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>57508</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>sox-success-your-step-by-step-guide.html</Key><LastModified>2025-05-28T18:45:16.000Z</LastModified><ETag>&quot;62f84469fcc90fd94f561f890b4d3853&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>67610</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>stop-data-breaches-secure-your-reputation.html</Key><LastModified>2025-07-22T19:26:39.000Z</LastModified><ETag>&quot;e4f471321cd283ba903dd69cf74057eb&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>74324</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>supply-chain-security-governance-first-steps.html</Key><LastModified>2025-05-14T16:58:30.000Z</LastModified><ETag>&quot;8214966e0be1226e001c2b6efad60e86&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87753</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>test.txt</Key><LastModified>2025-08-09T20:11:06.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>the-benefits-of-outsourcing-it-services-to-consulting-firms-in-ny.html</Key><LastModified>2024-12-27T01:08:17.000Z</LastModified><ETag>&quot;27a80610a4a765b54d8eeb4efc19f86c&quot;</ETag><Size>93643</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>the-impact-of-cloud-computing-on-business-operations-in-queens.html</Key><LastModified>2025-01-11T02:41:51.000Z</LastModified><ETag>&quot;486aa83beea7eb430eef9156ecd7efbc&quot;</ETag><Size>100924</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>the-unique-challenges-and-triumphs-of-women-in-it-consulting-in-queens.html</Key><LastModified>2025-03-31T01:51:04.000Z</LastModified><ETag>&quot;122878f50eff8ac64689067fcd600377&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>117180</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>threat-intel-a-security-the-power-of-expert-advice.html</Key><LastModified>2025-06-08T19:06:45.000Z</LastModified><ETag>&quot;c0a3a03de283564a38d6228e1b16227f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85162</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>top-it-consulting-companies-in-nyc.html</Key><LastModified>2025-01-14T02:05:10.000Z</LastModified><ETag>&quot;b196c527284ef4ce2f6dab62777a8de3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101960</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>training-employees-on-basic-it-troubleshooting-techniques.html</Key><LastModified>2024-12-23T22:27:44.000Z</LastModified><ETag>&quot;cb2db8f9fbfbb932d97cedb8f109885c&quot;</ETag><Size>70136</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>trends-and-challenges-faced-by-it-consultants-in-nyc.html</Key><LastModified>2025-01-14T02:06:30.000Z</LastModified><ETag>&quot;a797a9b11ae217a4c67e1a9b4b0eefb4&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>108399</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>trends-and-developments-in-the-it-consulting-sector-in-nyc.html</Key><LastModified>2025-01-14T02:05:12.000Z</LastModified><ETag>&quot;b09aeb5006cd9857cc2092c9f763248b&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>108013</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>unlock-security-the-power-of-governance-1.html</Key><LastModified>2025-05-14T16:59:32.000Z</LastModified><ETag>&quot;64d105ce5d8e1f70f9e24ca588ad249c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>99002</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-some-best-practices-for-managing-your-companys-it-infrastructure-with-help-from-a-provider-based-out-of-queens.html</Key><LastModified>2025-01-11T02:43:34.000Z</LastModified><ETag>&quot;39cdcdeac5cd7df01c641bcbccbd44b7&quot;</ETag><Size>105342</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-some-common-challenges-faced-by-it-consultants-in-ny.html</Key><LastModified>2024-12-27T01:07:55.000Z</LastModified><ETag>&quot;dba87f1cac1edb38cd05775607096c8c&quot;</ETag><Size>93464</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-some-common-challenges-faced-by-it-consultants-operating-in-the-new-york-area.html</Key><LastModified>2024-12-27T00:37:47.000Z</LastModified><ETag>&quot;03b90fa110e8bd432607a34be86be025&quot;</ETag><Size>93294</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-some-common-challenges-faced-by-it-consulting-companies-operating-in-nyc.html</Key><LastModified>2025-01-14T02:04:50.000Z</LastModified><ETag>&quot;3a87fca1cfcce3bfd38d0d41b3b1f19f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>110315</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-the-key-considerations-when-selecting-an-it-consulting-firm-based-out-of-nyc.html</Key><LastModified>2024-12-27T01:04:31.000Z</LastModified><ETag>&quot;efcc54fb79e5507003f848c8886960a3&quot;</ETag><Size>92351</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-the-latest-trends-in-it-services-for-companies-based-in-nyc.html</Key><LastModified>2025-01-14T01:46:26.000Z</LastModified><ETag>&quot;d8802edf6f849c894ba2ecf10c334658&quot;</ETag><Size>89248</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-the-top-it-consulting-companies-in-nyc-1.html</Key><LastModified>2025-01-14T02:06:53.000Z</LastModified><ETag>&quot;1bc584ae514afbd3e38036edfe838344&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>100267</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-are-the-top-it-service-providers-in-nyc.html</Key><LastModified>2025-01-14T01:45:41.000Z</LastModified><ETag>&quot;41230737101216419e40364e3955c6e8&quot;</ETag><Size>85652</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-certifications-should-an-it-consulting-company-have-to-operate-legally-in-nyc.html</Key><LastModified>2025-01-14T02:04:52.000Z</LastModified><ETag>&quot;6ea432c5298674c88bcd613a99d30d38&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>105658</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-challenges-do-it-managed-service-providers-face-in-nyc.html</Key><LastModified>2024-09-21T01:25:06.000Z</LastModified><ETag>&quot;74219bdaa5c26922fc6ad606d84c2d86&quot;</ETag><Size>18649</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-industries-can-benefit-from-it-consulting-services-in-ny.html</Key><LastModified>2024-12-27T01:05:45.000Z</LastModified><ETag>&quot;f46ad7f28a2d1c35ab3f81f590a01023&quot;</ETag><Size>92410</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-included-in-professional-it-services-in-nyc.html</Key><LastModified>2025-01-14T01:47:38.000Z</LastModified><ETag>&quot;e4e3c9292fba95d893c3a6d3aa58ee65&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>93922</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-it-consulting-queens-2.html</Key><LastModified>2025-03-31T01:51:52.000Z</LastModified><ETag>&quot;778390d3b99620881ce73b5060791a21&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>111122</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-it-support-for-queens.html</Key><LastModified>2025-01-11T02:43:22.000Z</LastModified><ETag>&quot;ffd3d5730b9d7980ed679a74ce80e690&quot;</ETag><Size>93457</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-cost-of-hiring-an-external-it-support-team.html</Key><LastModified>2024-12-23T22:28:38.000Z</LastModified><ETag>&quot;15861343b588501fede44514775ab864&quot;</ETag><Size>79263</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-cost-of-it-services-in-nyc-2.html</Key><LastModified>2025-01-14T01:46:21.000Z</LastModified><ETag>&quot;adbe1bd57f37c1469fc435b9e9352c29&quot;</ETag><Size>91648</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-difference-between-managed-it-services-and-traditional-it-support-in-nyc.html</Key><LastModified>2024-09-26T20:38:31.000Z</LastModified><ETag>&quot;d76bd99c54c6ed2fd741098ae58f33e1&quot;</ETag><Size>5895</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-importance-of-hiring-it-consultants-in-new-york.html</Key><LastModified>2024-12-27T01:07:07.000Z</LastModified><ETag>&quot;0fc4c1a02f7698076e8c6435524a4acc&quot;</ETag><Size>101536</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-importance-of-it-managed-services-in-new-york-1.html</Key><LastModified>2024-09-26T20:23:05.000Z</LastModified><ETag>&quot;b43b49d8d2855e579cc755e9cb0a9e77&quot;</ETag><Size>6852</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-latest-technology-trend-influencing-it-consulting-firms-in-nyc.html</Key><LastModified>2025-01-14T02:04:46.000Z</LastModified><ETag>&quot;a6733c51245831c1a33adda507106897&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>104231</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-process-for-implementing-cybersecurity-solutions-in-nyc-businesses.html</Key><LastModified>2024-09-12T01:10:04.000Z</LastModified><ETag>&quot;6c75aa9e3b6ea0a5268197fc5eb556fd&quot;</ETag><Size>34730</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-role-of-an-it-consultant-in-new-york-5.html</Key><LastModified>2024-12-27T00:41:01.000Z</LastModified><ETag>&quot;0a04968b0c9b5c10b8e9acc36fce3930&quot;</ETag><Size>95093</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-role-of-it-consulting-companies-in-nyc-1.html</Key><LastModified>2025-01-14T02:06:48.000Z</LastModified><ETag>&quot;21a0ec87240aec7abb0c461ba1ff1cb4&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>100547</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-role-of-it-consulting-companies-in-nyc-3.html</Key><LastModified>2025-01-14T02:08:10.000Z</LastModified><ETag>&quot;48413546a7dcce274100d55e1ceb088a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>107251</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-role-of-it-support-in-queens-1.html</Key><LastModified>2025-01-11T02:42:37.000Z</LastModified><ETag>&quot;0e0adaeaf852ad8c542a1ebbe69ea214&quot;</ETag><Size>92342</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-secret-behind-successful-businesses-discover-how-it-services-can-transform-your-companys-growth.html</Key><LastModified>2024-01-22T14:46:34.000Z</LastModified><ETag>&quot;854ecedd3d9b9d1d17efe1ba10ad9068&quot;</ETag><Size>51491</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-significance-of-it-services-in-nyc.html</Key><LastModified>2025-01-14T01:46:59.000Z</LastModified><ETag>&quot;4cadabbce01e69922b61829bf1ec2a7f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>93447</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-new-technologies-are-driving-innovation-for-it-consulting-firms-in-nyc.html</Key><LastModified>2025-01-14T02:08:18.000Z</LastModified><ETag>&quot;061c6216c4e1a243af24e8839a5dcfd4&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>98542</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-qualifications-should-a-professional-providing-it-services-in-nyc-have.html</Key><LastModified>2025-01-14T01:47:08.000Z</LastModified><ETag>&quot;9d77f46615638c4eec8de72c694fd13d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87064</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-qualifications-should-professionals-working-for-it-consulting-companies-in-nyc-have.html</Key><LastModified>2025-01-14T02:07:35.000Z</LastModified><ETag>&quot;8bb2fc0a84ba292ed9b66d7558ca2739&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101129</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-qualifications-should-you-look-for-in-an-it-consulting-company-in-nyc.html</Key><LastModified>2025-01-14T02:06:07.000Z</LastModified><ETag>&quot;7bedcc03c7333b5314032160205ef0d1&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>102382</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>why-secure-coding-consulting-is-vital-in-2025.html</Key><LastModified>2025-08-09T20:14:29.000Z</LastModified><ETag>&quot;0a3854465c2ffb9a57692757ca33a6a9&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>60913</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>your-trusted-security-advisory-partner-is-here.html</Key><LastModified>2025-06-08T19:06:39.000Z</LastModified><ETag>&quot;a2a4f955af928e59ff309244e6d3b7b4&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>92997</Size><StorageClass>STANDARD</StorageClass></Contents></ListBucketResult>