<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7-a.7'-->
<!--Jetpack_Sitemap_Buffer_Image_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//anchorpoint.blog/image-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://anchorpoint.blog/anchor-point-data-services-6998ebf4e21ca/</loc>
  <lastmod>2026-02-20T23:19:19Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/anchor-point-data-services-6998ebf4e21ca.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/anchor-point-data-services-6998ebf5931e2/</loc>
  <lastmod>2026-02-20T23:19:20Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/anchor-point-data-services-6998ebf5931e2.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/site_logo_bsky-anchor-point-data-services-6998ebf9c2b82/</loc>
  <lastmod>2026-02-20T23:19:25Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/site_logo_bsky-anchor-point-data-services-6998ebf9c2b82.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/20/importance-compliant-it-disposal/</loc>
  <lastmod>2026-02-20T23:40:23Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1771628456735_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/20/how-to-validate-data-destruction/</loc>
  <lastmod>2026-02-21T00:19:15Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1771628431422_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/20/how-to-validate-data-destruction/</loc>
  <lastmod>2026-02-21T05:15:30Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1771628431422_image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/21/6-steps-to-a-compliant-data-center-itad-checklist/</loc>
  <lastmod>2026-02-22T06:36:38Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1771742154430_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/24/secure-it-decommissioning-explained/</loc>
  <lastmod>2026-02-24T09:23:24Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1771924954595_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/24/enterprise-itad-checklist-6-essentials/</loc>
  <lastmod>2026-02-24T16:29:01Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1771944273523_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/24/securis-com-alternatives-7/</loc>
  <lastmod>2026-02-25T07:57:36Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1772006183008_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/25/stepwise-asset-disposal-process-secure-itad/</loc>
  <lastmod>2026-02-26T03:58:33Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1772078234683_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/25/stepwise-asset-disposal-process-secure-itad/</loc>
  <lastmod>2026-02-26T05:14:19Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1772078234683_image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/27/data-security-in-itad-explained/</loc>
  <lastmod>2026-02-27T09:19:10Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1772183929248_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/02/28/why-recycle-electronic-waste-security-sustainability/</loc>
  <lastmod>2026-02-28T10:08:15Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/02/1772272994847_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/01/data-destruction-com-alternatives-8/</loc>
  <lastmod>2026-03-01T11:57:38Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772366197829_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/02/secure-data-wiping-nist-800-88-2026/</loc>
  <lastmod>2026-03-02T12:32:28Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772454724566_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/03/what-is-it-asset-inventory-auditing-24-accuracy-boost/</loc>
  <lastmod>2026-03-03T13:21:55Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772544073725_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/04/compliant-asset-disposition-process-2026/</loc>
  <lastmod>2026-03-04T11:21:11Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772623222093_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/05/datacomusa-net-alternatives-4/</loc>
  <lastmod>2026-03-05T13:43:21Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772718148961_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/06/what-is-sensitive-data-erasure-2026-compliance-guide/</loc>
  <lastmod>2026-03-06T16:57:35Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772816185938_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/07/role-of-reporting-in-data-destruction-compliance-2026/</loc>
  <lastmod>2026-03-07T12:59:02Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772888316969_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/08/asset-recovery-itad-secure-process-guide-2026/</loc>
  <lastmod>2026-03-08T10:42:41Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1772966533262_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/09/why-prioritize-data-security-asset-disposal-2026/</loc>
  <lastmod>2026-03-09T10:42:37Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773052929167_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/10/information-destruction-policy-guide-it-managers-2026/</loc>
  <lastmod>2026-03-10T13:28:14Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773149281270_IT-manager-reviews-information-destruction-policy.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/11/itad-best-practices-2026-secure-asset-disposition/</loc>
  <lastmod>2026-03-11T15:46:20Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773243908834_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/12/master-enterprise-it-asset-disposition-workflow/</loc>
  <lastmod>2026-03-12T12:53:49Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773319943923_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/13/secure-it-asset-disposal-benefits-enterprises/</loc>
  <lastmod>2026-03-13T18:50:25Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773427797342_IT-manager-supervises-secure-asset-boxing.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/13/compliant-data-destruction-secure-methods-standards/</loc>
  <lastmod>2026-03-14T06:58:08Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773471474088_IT-manager-preparing-secure-data-destruction-in-office.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/14/role-it-operations-itad-secure-asset-disposition/</loc>
  <lastmod>2026-03-15T04:53:19Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773550387830_IT-manager-logging-asset-IDs-in-office.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/16/itad-meaning-secure-it-asset-disposition-guide-2026/</loc>
  <lastmod>2026-03-16T07:17:54Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773645413672_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/16/what-is-data-sanitization-nist-guide-it-managers/</loc>
  <lastmod>2026-03-17T06:04:46Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773727384402_IT-manager-reviews-data-sanitization-documents.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/17/top-5-secure-destruction-advantages-it-security-2026/</loc>
  <lastmod>2026-03-18T03:04:48Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773802946422_image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/17/top-5-secure-destruction-advantages-it-security-2026/</loc>
  <lastmod>2026-03-18T05:07:44Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773802946422_image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/19/end-of-life-asset-management-it-security-2026/</loc>
  <lastmod>2026-03-19T14:22:43Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773930045529_IT-manager-checking-old-computers-in-server-room.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/20/essential-itad-documentation-secure-data-destruction/</loc>
  <lastmod>2026-03-20T07:48:49Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1773992907168_IT-manager-reviewing-data-destruction-certificate.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/20/secure-it-asset-tracking-enterprise-compliance-guide/</loc>
  <lastmod>2026-03-21T02:26:51Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1774059996803_IT-manager-tracking-assets-in-corner-office.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/21/optimize-it-asset-remarketing-process-securely/</loc>
  <lastmod>2026-03-22T02:28:08Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1774146475744_IT-manager-auditing-inventory-checklist.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/21/optimize-it-asset-remarketing-process-securely/</loc>
  <lastmod>2026-03-22T05:11:21Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1774146475744_IT-manager-auditing-inventory-checklist-1.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://anchorpoint.blog/2026/03/22/what-is-enterprise-itad-secure-it-asset-disposition-explained/</loc>
  <lastmod>2026-03-23T05:50:13Z</lastmod>
  <image:image>
   <image:loc>https://anchorpoint.blog/wp-content/uploads/2026/03/1774244994290_IT-manager-processing-old-office-equipment.jpeg</image:loc>
  </image:image>
 </url>
</urlset>
