<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.nexcess.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.nexcess.com/blog/</loc>
		<lastmod>2026-04-14T21:10:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-modernization/</loc>
		<lastmod>2026-04-07T17:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/testing-intervals.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-modernization.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/iStock-471985618.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/six-cloud-modernization-strategies-1024x632-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-stakeholders.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/testing-intervals.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/hipaa-challenges-hosting/</loc>
		<lastmod>2026-04-07T17:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/istockphoto-2162033406-1024x1024-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/how-to-scale-hipaa-hosting/</loc>
		<lastmod>2026-04-07T17:25:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/growtika-Am6pBe2FpJw-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/healthcare-incident-response/</loc>
		<lastmod>2026-04-07T17:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/ofspace-llc-ZTLUNxoRaPY-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/breach-locations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/data-privacy-healthcare/</loc>
		<lastmod>2026-04-07T18:03:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/national-cancer-institute-NFvdKIhxYlU-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/data-privacy-in-healthcare-edited.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/non-core-infrastructure-management/</loc>
		<lastmod>2026-04-07T18:12:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/The-challenge-institutions-face.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/non-core-systems-support.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/role-of-first-class-infrastructure-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/Introducing-an-intentional-architecture-model-pullquote.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/how-healthcare-organizations-support-hipaa-outside-the-ehr/</loc>
		<lastmod>2026-04-07T18:22:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/HC-orgs-support-HIPAA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/Screenshot-2026-04-03-at-18-41-47-How-healthcare-organizations-support-HIPAA-outside-the-EHR-Liquid-Web.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/istockphoto-2162033406-1024x1024-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-environment-for-healthcare/</loc>
		<lastmod>2026-04-07T23:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/HC-reducing-risk-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/web-server-compliance-liability/</loc>
		<lastmod>2026-04-09T22:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/olena-kholina-CHisgnotgwk-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/improve-data-privacy-know-secure-business/</loc>
		<lastmod>2026-04-13T19:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-inline-enterprise-cloud-security-guide-challenges.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/data-backup-recovery/</loc>
		<lastmod>2026-04-13T19:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-what_is_data_backup_recovery_why_important.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/automatic-failover/</loc>
		<lastmod>2026-04-13T19:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/image-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/security-as-a-service-secaas/</loc>
		<lastmod>2026-04-13T19:40:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-outsourcing-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/outsourcing-security/</loc>
		<lastmod>2026-04-13T19:43:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-outsourcing-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/what-is-cloud-security/</loc>
		<lastmod>2026-04-13T19:46:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/growtika-k5AxNUn4c5o-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/disaster-recovery-as-a-service/</loc>
		<lastmod>2026-04-13T20:11:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/disaster_recovery_as_a_service.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-inline-disasters-a-draas-solution-mitigates-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/aws-vs-azure/</loc>
		<lastmod>2026-04-13T20:14:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid_web_blog_aws_vs_azure.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/enterprise-cloud-security-guide/</loc>
		<lastmod>2026-04-13T20:54:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-enterprise-cloud-security-cloud-based-apps-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/how-to-prevent-enterprise-data-breaches/</loc>
		<lastmod>2026-04-13T21:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-outsourcing-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/managed-it-services/</loc>
		<lastmod>2026-04-13T21:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/image4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/private-cloud-providers/</loc>
		<lastmod>2026-04-13T21:11:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/Best-Private-Cloud-Providers-of-2024-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-vmware-1024x600-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-aws-1024x383-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-azure-1024x423-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-google-cloud-1-1024x607-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-oracle-1024x331-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-openstack-1024x479-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-ibm-cloud-1024x534-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-citrix-1024x429-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-cisco-cloud-1024x502-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/private-cloud-providers-alibaba-cloud-1024x438-1.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-security-compliance/</loc>
		<lastmod>2026-04-13T21:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-frameworks-best-practices-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-csa-1024x592-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-fedramp-1024x360-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-iso-1024x411-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-vmware-1024x364-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-nist.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-soc-1024x318-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-hipaa-1024x345-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cloud-security-compliance-pci-dss-1024x490-1.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/core-vs-non-core-vs-specialty-cloud/</loc>
		<lastmod>2026-04-13T21:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/sajad-nori-21mJd5NUGZU-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-environment-core-systems/</loc>
		<lastmod>2026-04-13T21:21:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/intentional-separation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/woman-green-jacket.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-environment-ownership/</loc>
		<lastmod>2026-04-13T21:23:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/responsibility-models.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/core-vs-non-core/</loc>
		<lastmod>2026-04-13T21:24:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/non-core-systems-support.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/non-core-systems-support.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/mission-critical-pullquote.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/infrastructure-decisions-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/non-core-mission-critical-cloud/</loc>
		<lastmod>2026-04-13T21:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/infrastructure-decisions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-infrastructure-for-customer-facing-systems/</loc>
		<lastmod>2026-04-13T21:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/non-core-high-priority-cloud/</loc>
		<lastmod>2026-04-13T21:39:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/confrence-meeting-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/when-the-environment-starts-working-against-you/</loc>
		<lastmod>2026-04-13T21:46:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/HC-reducing-risk.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/Screenshot-2026-04-03-at-18-23-08-When-the-environment-starts-working-against-you-Liquid-Web.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/istockphoto-2162033406-1024x1024-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/isolating-healthcare-workloads/</loc>
		<lastmod>2026-04-13T21:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/clarity-before-confidence-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/istockphoto-2162033406-1024x1024-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/Screenshot-2026-04-03-at-18-30-06-Isolating-Healthcare-Workloads-Performance-Without-Core-System-Risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/healthcare-it-infrastrcture/</loc>
		<lastmod>2026-04-13T21:52:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/diagnosing-pain-feature-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/cloud-environment-structure/</loc>
		<lastmod>2026-04-14T19:11:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/answers-are-clear-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/doctor-working.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/future-financial-services/</loc>
		<lastmod>2026-04-14T19:50:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/sajad-nori-oPRU2Cne0Pw-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/cio-finance-future-edited-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/pci-compliance-levels/</loc>
		<lastmod>2026-04-14T19:53:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/pci-compliance-guide-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/pci-compliance-levels-edited.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/enterprise-data-security-guide/</loc>
		<lastmod>2026-04-14T19:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid_web_blog_enterprise_data_security-1-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/pci-dss-compliance-web-hosting/</loc>
		<lastmod>2026-04-14T20:21:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/confrence-meeting.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/Incident-response-plan-edited.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/enterprise-network-security/</loc>
		<lastmod>2026-04-14T20:33:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/scott-rodgerson-PSpf_XgOM5w-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/server-migration-steps/</loc>
		<lastmod>2026-04-14T20:34:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/infrastructure-decisions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/enterprise-web-hosting/</loc>
		<lastmod>2026-04-14T20:36:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/image4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/data-privacy-your-business/</loc>
		<lastmod>2026-04-14T20:37:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid_web_blog_enterprise_data_security-1-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/choose-best-hosting-provider-financial-services/</loc>
		<lastmod>2026-04-14T21:01:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/woman-green-jacket.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.nexcess.com/blog/private-cloud-for-banks/</loc>
		<lastmod>2026-04-14T21:10:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.nexcess.com/wp-content/uploads/2026/04/liquid-web-blog-inline-enterprise-cloud-security-guide-challenges.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->
<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: www.nexcess.com @ 2026-04-14 19:48:49 by W3 Total Cache
-->