<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//blog.easterlyit.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://blog.easterlyit.com/tag/agentic-ai/</loc>
		<lastmod>2026-02-11T12:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/backup-services/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/business-resilience/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/byod/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/claude/</loc>
		<lastmod>2026-02-11T12:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/cloud/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/copilot/</loc>
		<lastmod>2026-02-11T12:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/cyber-risk/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/cyber-security/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/data-sovereignty/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/intune/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/m365-backup/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/m365-security/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/mdm/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/mobile-phones/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/modern-device-management/</loc>
		<lastmod>2026-02-11T12:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/nas/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/small-business/</loc>
		<lastmod>2026-02-11T12:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.easterlyit.com/tag/use-agentic-ai-to-improve-leverage-your-current-knowledge-base-alongside-your-llm-of-choice-to-improve-your-outcomes/</loc>
		<lastmod>2026-02-11T12:30:14+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->