<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cybersikkerhedslex.dk</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/trusler</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/beskyttelse</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/standarder</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/guides</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/artikler</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/om</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/trusler/malware</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/trusler/phishing</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/trusler/ransomware</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/trusler/ddos-angreb</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/trusler/social-engineering</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/beskyttelse/firewall</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/beskyttelse/multi-faktor-autentificering</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/beskyttelse/vpn</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/beskyttelse/kryptering</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/standarder/iso-27001</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/standarder/nis2-direktivet</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/standarder/nist-framework</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/standarder/cis-controls</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/guides/sikkerhedspolitik</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/guides/incident-response</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/guides/penetrationstest</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/guides/awareness-traening</loc>
<lastmod>2026-03-30T15:31:54.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/artikler/cybertrusler-2026</loc>
<lastmod>2026-03-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/artikler/password-best-practices</loc>
<lastmod>2026-02-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cybersikkerhedslex.dk/artikler/zero-trust-arkitektur</loc>
<lastmod>2026-01-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
