<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Website Maintenance on Sort It Web Design</title>
    <link>https://www.sortitweb.co.nz/tags/website-maintenance/</link>
    <description>Recent content in Website Maintenance on Sort It Web Design</description>
    <generator>Hugo</generator>
    <language>en-nz</language>
    <lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.sortitweb.co.nz/tags/website-maintenance/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How Website Migration Actually Works</title>
      <link>https://www.sortitweb.co.nz/blog/how-website-migration-actually-works/</link>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.sortitweb.co.nz/blog/how-website-migration-actually-works/</guid>
      <description>Website migration feels risky. Your current site works, and you&amp;rsquo;ve heard horror stories — lost data, broken functionality, extended downtime, technical complications that take weeks to resolve.&#xA;The fear of migration often keeps businesses stuck with poor hosting, even when they know they need better service.&#xA;There&amp;rsquo;s a professional way to do this that eliminates those risks.&#xA;What Actually Happens 1. We Analyse Your Setup Before touching anything, we review your current website, email, and hosting configuration.</description>
    </item>
    <item>
      <title>Is Your Website a Target for Hackers?</title>
      <link>https://www.sortitweb.co.nz/blog/is-your-website-a-target-for-hackers/</link>
      <pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.sortitweb.co.nz/blog/is-your-website-a-target-for-hackers/</guid>
      <description>Hackers target small business websites because they&amp;rsquo;re often poorly protected but contain valuable customer data, payment information, and business details.&#xA;A successful attack can destroy your reputation, compromise customer trust, and cost thousands in recovery. Many business owners discover breaches weeks or months after they occur — when the damage is already extensive.&#xA;The good news: professional security prevents the vast majority of attacks.&#xA;Common Threats Malware Infections Malicious code injected into your site that steals data, corrupts files, or turns your website into a source of infection for your visitors.</description>
    </item>
  </channel>
</rss>
