<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.cybersafeworkforce.com/2021/05/04/mixing-work-and-personal-devices/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/05/mixing-work-and-personal.png</image:loc><image:title>Mixing Work and Personal</image:title></image:image><lastmod>2021-05-03T02:33:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/04/20/nation-state-cyberattacks/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/04/nation-state-cyberattacks.png</image:loc><image:title>Nation State Cyberattacks</image:title></image:image><lastmod>2021-04-20T02:58:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/04/06/slipping-through-the-filters/</loc><lastmod>2021-04-04T19:38:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/03/23/stimulus-scams-round-3/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/03/stimulus-payments.png</image:loc><image:title>Stimulus Payments</image:title></image:image><lastmod>2021-03-22T16:37:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/03/09/scam-alert-sim-swapping/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/03/beware-of-sim-swapping-1.png</image:loc><image:title>beware of sim swapping</image:title></image:image><lastmod>2021-03-08T04:49:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/03/02/are-you-using-a-password-manager-yet/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/03/password-managers.png</image:loc><image:title>Password Managers</image:title></image:image><lastmod>2021-03-01T04:19:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/02/23/life-online/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/02/lifeonline-1.png</image:loc><image:title>LifeOnline</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/02/lifeonline.png</image:loc><image:title>LifeOnline</image:title></image:image><lastmod>2021-02-22T04:30:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/02/16/the-shift-to-workplace-ransomware/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/02/ransomware-vs.-individual.png</image:loc><image:title>Ransomware vs. Individual</image:title></image:image><lastmod>2021-02-07T19:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/02/02/the-ripple-effect-of-ransomware-attacks/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/02/ransomware-and-insurance.png</image:loc><image:title>Ransomware and Insurance</image:title></image:image><lastmod>2021-01-29T18:51:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/02/09/video-monitoring-services-a-cautionary-tale/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/02/video-monitoring.png</image:loc><image:title>Video Monitoring</image:title></image:image><lastmod>2021-01-28T20:48:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/01/26/covid-19-scams-and-attacks/</loc><lastmod>2021-01-25T18:46:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/01/19/the-rise-in-gift-card-scams/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/01/gift-card-scams.png</image:loc><image:title>Gift Card Scams</image:title></image:image><lastmod>2021-01-18T16:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/01/12/cyber-incidents-in-the-second-half-of-2020/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2021/01/breaches-disruption-and-ransomware.png</image:loc><image:title>Breaches, Disruption and Ransomware</image:title></image:image><lastmod>2021-01-11T15:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/12/29/a-new-year/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/anewyear2.png</image:loc><image:title>anewyear2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/anewyear.png</image:loc><image:title>anewyear</image:title></image:image><lastmod>2020-12-19T19:56:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/12/22/warm-holiday-wishes/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/holiday2.png</image:loc><image:title>holiday2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/holiday1.png</image:loc><image:title>holiday1</image:title></image:image><lastmod>2020-12-19T19:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2021/01/05/not-all-mfa-is-alike/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/mfa-blog.png</image:loc><image:title>MFA blog</image:title></image:image><lastmod>2020-12-17T18:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/12/15/spread-holiday-cheer-not-personal-information/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/elf-blog.png</image:loc><image:title>Elf blog</image:title></image:image><lastmod>2020-12-14T14:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/12/08/identifying-the-domain/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/fbi-blog.png</image:loc><image:title>FBI blog</image:title></image:image><lastmod>2020-12-08T15:20:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/12/01/the-worst-passwords-of-2020/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/12/common-passwords.png</image:loc><image:title>Common passwords</image:title></image:image><lastmod>2020-12-01T03:10:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/11/24/thank-you/</loc><lastmod>2020-11-23T03:21:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/11/17/holiday-shopping-scams/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/11/holiday-scam-3.png</image:loc><image:title>Holiday Scam 3</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/11/holiday-scam-2-1.png</image:loc><image:title>Holiday Scam 2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/11/holiday-scam-2.png</image:loc><image:title>Holiday scam</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/11/holiday-scam-1.png</image:loc><image:title>Holiday scam</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/11/tips-for-online-holiday-shopping.jpg</image:loc><image:title>tips for online holiday shopping</image:title></image:image><lastmod>2020-11-16T20:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/11/10/account-takeover/</loc><lastmod>2020-11-09T18:39:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/11/03/election-related-scams/</loc><lastmod>2020-11-02T18:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/10/27/national-cyber-security-awareness-month-proactive-active-reactive-measures/</loc><lastmod>2020-10-25T21:44:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/10/20/national-cyber-security-awareness-month-key-areas-of-a-cyber-awareness-program/</loc><lastmod>2020-10-18T15:01:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/10/13/national-cyber-security-awareness-month-employee-buy-in/</loc><lastmod>2020-10-13T16:57:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/10/06/national-cyber-security-awareness-month-the-importance-of-cyber-awareness/</loc><lastmod>2020-10-06T14:30:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/09/29/qr-codes/</loc><lastmod>2020-09-29T20:05:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/09/22/the-cost-of-a-data-breach/</loc><lastmod>2020-09-21T20:41:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/09/15/passwords-continue-to-be-the-weak-link/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/09/get-or-guess-a-password.png</image:loc><image:title>Get or guess a password</image:title></image:image><lastmod>2020-09-14T21:41:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/09/08/preparing-electronically-for-a-disaster/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/09/preparing-for-disaster.png</image:loc><image:title>preparing for disaster</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/09/emergency-preparation.jpg</image:loc><image:title>emergency preparation</image:title></image:image><lastmod>2020-09-07T17:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/09/01/sophisticated-social-engineering/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/09/social-engineering-is-people-hacking.png</image:loc><image:title>Social engineering is people hacking</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/08/hackers-use-social-media.png</image:loc><image:title>Hackers Use Social Media</image:title></image:image><lastmod>2020-08-31T17:23:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/08/25/shadow-it/</loc><lastmod>2020-08-24T14:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/08/18/handling-cybersecurity-incidents/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/08/employees-are-a-key-link-in-the-security-chain.png</image:loc><image:title>Employees are a key link in the security chain</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/08/key-link.png</image:loc><image:title>Key link</image:title></image:image><lastmod>2020-08-10T13:46:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/08/11/ransomware-as-a-service/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/08/ransomware2.png</image:loc><image:title>ransomware2</image:title></image:image><lastmod>2020-08-10T13:16:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/08/04/remote-work-challenges/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/07/remote-work-challenges-distraction-1.jpg</image:loc><image:title>Remote work challenges distraction</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/07/remote-work-challenges-distraction.jpg</image:loc><image:title>Remote work challenges distraction</image:title></image:image><lastmod>2020-08-03T12:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/07/21/cyber-roundups-disruptions-disclosures-and-financial-loss-in-the-first-half-of-2020/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/07/roundups2020q1.png</image:loc><image:title>roundups2020q1</image:title></image:image><lastmod>2020-07-20T20:46:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/07/03/happy-4th-of-july-2/</loc><lastmod>2020-07-02T18:17:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/06/30/a-summer-cyber-challenge/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/06/how-many-home-devices-connect-to-the-internet-1-1.png</image:loc><image:title>How many home devices connect to the internet</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/06/how-many-home-devices-connect-to-the-internet-.png</image:loc><image:title>How many home devices connect to the internet</image:title></image:image><lastmod>2020-06-08T18:14:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/06/23/email-safety-and-examining-domains/</loc><lastmod>2020-06-08T17:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/06/16/use-the-news/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/06/share-a-ransomware-or-data-breach-story.png</image:loc><image:title>Share a Ransomware or Data Breach Story</image:title></image:image><lastmod>2020-06-08T17:53:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/06/09/low-tech-reinforcement-of-good-security-behavior/</loc><lastmod>2020-06-08T17:15:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/06/02/password-safety-series-bonus-material/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/06/password-lie-on.png</image:loc><image:title>password-lie-on</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/06/password-recipe-1.png</image:loc><image:title>password recipe 1</image:title></image:image><lastmod>2020-06-01T20:50:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/05/26/password-safety-series-password-protections/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/05/password-account-protections.png</image:loc><image:title>password-account-protections</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/05/password-recipe-phrase.png</image:loc><image:title>password recipe phrase</image:title></image:image><lastmod>2020-05-20T15:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/05/19/password-safety-series-password-related-threats/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/05/password-threats.png</image:loc><image:title>password-threats</image:title></image:image><lastmod>2020-05-19T14:06:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/05/12/teleconferencing-tips/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/05/keep_zoom_links_private.png</image:loc><image:title>keep_zoom_links_private</image:title></image:image><lastmod>2020-05-11T17:18:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/05/05/covid-19-scams-staying-safe/</loc><lastmod>2020-04-24T14:41:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/04/28/covid-19-scams-multiple-scams-and-vectors/</loc><lastmod>2020-04-24T14:39:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/04/21/covid-19-scams-vulnerabilities/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/04/covid19-stressful-1.png</image:loc><image:title>covid19-stressful</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/04/covid19-toogoodtobetrue.png</image:loc><image:title>covid19-toogoodtobetrue</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/04/covid19-couldbeascam.png</image:loc><image:title>covid19-couldbeascam</image:title></image:image><lastmod>2020-04-20T14:41:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/04/14/email-safety-series-recap/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/04/email_safety_rules.png</image:loc><image:title>email_safety_rules</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/03/emailsafetyseriespt6.png</image:loc><image:title>EmailSafetySeriespt6</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/03/emailsafetyseriespt6sender.png</image:loc><image:title>EmailSafetySeriespt6sender</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/03/emailsafetyseriespt6request.png</image:loc><image:title>EmailSafetySeriespt6request</image:title></image:image><lastmod>2020-04-08T14:02:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/04/07/email-safety-series-verification/</loc><lastmod>2020-03-31T14:55:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/03/31/email-safety-series-does-it-involve-money-or-personal-information/</loc><lastmod>2020-03-25T14:36:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/03/24/email-safety-series-was-it-expected/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/03/unexpected-messages-should-make-you-to-pause-and-consider..png</image:loc><image:title>Unexpected messages should make you to pause and consider.</image:title></image:image><lastmod>2020-03-18T14:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/03/17/email-safety-series-who-sent-it/</loc><lastmod>2020-03-10T15:46:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/03/10/email-safety-series-introduction/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/03/scammer-goals-2.png</image:loc><image:title>Scammer Goals</image:title></image:image><lastmod>2020-03-09T15:56:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/03/03/scammers-and-current-events/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/03/check-information-sources.png</image:loc><image:title>Check information sources</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/coronavirus.jpg</image:loc><image:title>coronavirus</image:title></image:image><lastmod>2020-03-02T14:31:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/02/25/cyber-sabotage/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/cyber_sabotage.png</image:loc><image:title>cyber_sabotage</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/sabotage.png</image:loc><image:title>sabotage</image:title></image:image><lastmod>2020-02-24T17:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/02/18/that-new-attack-method-its-working/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/vet-your-vendors-1.png</image:loc><image:title>Vet Your Vendors</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/vet-your-vendors.png</image:loc><image:title>Vet Your Vendors</image:title></image:image><lastmod>2020-02-17T21:59:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/02/11/ransomware-and-taxes-a-dangerous-combination/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/tax-season-dangers.png</image:loc><image:title>Tax Season Dangers</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/tax-scam-alert.png</image:loc><image:title>Tax Scam Alert</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/02/lightbulb.png</image:loc><image:title>lightbulb</image:title></image:image><lastmod>2020-02-10T20:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/02/04/business-email-compromise-hits-portland-public-schools/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/01/bec.png</image:loc><image:title>BEC</image:title></image:image><lastmod>2020-02-03T19:21:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/01/28/ransomware-a-new-method-of-attack/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/01/msp-attack.png</image:loc><image:title>MSP Attack</image:title></image:image><lastmod>2020-01-27T15:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/01/21/stories-of-disruptions-disclosures-and-financial-loss/</loc><lastmod>2020-01-21T16:32:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/01/14/do-you-have-a-hall-pass/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2020/01/whybehindsecurity.png</image:loc><image:title>whybehindsecurity</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/12/do-you-have-a-hall-pass.jpg</image:loc><image:title>Do You Have a Hall Pass</image:title></image:image><lastmod>2020-01-13T13:59:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2020/01/07/was-it-only-a-matter-of-time/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/12/password-recipe-cruise-ship.jpg</image:loc><image:title>password recipe cruise ship</image:title></image:image><lastmod>2020-01-02T18:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/12/17/cyber-threats-in-2020/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/12/if-its-connected.png</image:loc><image:title>If its connected</image:title></image:image><lastmod>2019-12-17T14:09:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/12/31/looking-forward/</loc><lastmod>2019-11-25T02:22:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/12/24/holiday-wishes/</loc><lastmod>2019-11-25T02:22:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/11/26/giving-thanks/</loc><lastmod>2019-11-25T02:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/11/19/the-pitfalls-of-holiday-shopping/</loc><lastmod>2019-11-19T14:28:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/11/12/the-far-reaching-effects-of-password-reuse/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/11/picture1.png</image:loc><image:title>Picture1</image:title></image:image><lastmod>2019-11-12T13:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/11/05/another-successful-phishing-attack/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/another-successful-phishing-attack.jpg</image:loc><image:title>another successful phishing attack</image:title></image:image><lastmod>2019-11-04T18:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/10/29/o-mg-a-physical-threat-to-our-online-space/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/want-to-borrow-my-cable_.png</image:loc><image:title>Want to borrow my cable_</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/unknown-usb.png</image:loc><image:title>unknown usb</image:title></image:image><lastmod>2019-10-28T15:51:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/10/22/vendor-email-compromise/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/confirm-requests-for-payment.png</image:loc><image:title>Confirm requests for payment</image:title></image:image><lastmod>2019-10-21T16:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/10/15/when-the-threat-comes-from-inside/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/insider-threat.jpg</image:loc><image:title>insider threat</image:title></image:image><lastmod>2019-10-14T19:21:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/10/08/doordash-data-breach/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/doordash.jpg</image:loc><image:title>Doordash</image:title></image:image><lastmod>2019-10-07T19:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/10/01/social-engineering/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/social-engineering-1.jpg</image:loc><image:title>Social Engineering</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/10/social-engineering.jpg</image:loc><image:title>social engineering</image:title></image:image><lastmod>2019-09-30T17:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/09/24/the-equifax-breach-scam/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/equifax-data-breach.jpg</image:loc><image:title>equifax data breach</image:title></image:image><lastmod>2019-09-13T16:52:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/09/17/protecting-student-data/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/protecting-student-data.png</image:loc><image:title>protecting student data</image:title></image:image><lastmod>2019-09-13T16:50:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/09/10/business-email-compromise-is-still-going-strong/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/whats-your-process-for-verifying-payment-requests_.png</image:loc><image:title>Whats your process for verifying payment requests_</image:title></image:image><lastmod>2019-09-03T13:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/09/03/who-sent-this/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/p-2017-04.jpg</image:loc><image:title>P-2017-04</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/phishing-is-a-scam.jpg</image:loc><image:title>Phishing is a scam</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/iphone_whosentthis.gif</image:loc><image:title>iphone_whosentthis</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/09/findsender1.gif</image:loc><image:title>FindSender1</image:title></image:image><lastmod>2019-09-02T18:16:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/08/27/ransomware-looms-large/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/08/ransomware.jpg</image:loc><image:title>Ransomware</image:title></image:image><lastmod>2019-08-26T18:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/08/13/cyber-roundups-disruptions-disclosures-and-financial-loss/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/08/roundups2019q1.png</image:loc><image:title>roundups2019q1</image:title></image:image><lastmod>2019-08-13T14:16:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/08/06/summer-cyber-secure-challenge-for-kids-the-internet-is-all-around-us/</loc><lastmod>2019-08-06T20:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/07/30/summer-cyber-secure-challenge-the-great-cleanout/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/the-great-clean-out.jpg</image:loc><image:title>The Great Clean-out</image:title></image:image><lastmod>2019-07-30T13:14:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/07/23/summer-cyber-secure-challenge-put-another-login-step-on-it/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/put-another-login-step-on-it.jpg</image:loc><image:title>Put Another Login Step On It</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/4_apppassword_markup.png</image:loc><image:title>4_apppassword_markup</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/auth_app_markup.jpg</image:loc><image:title>auth_app_markup</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/3_twostep_markup.png</image:loc><image:title>3_twostep_markup</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/2_more_options_markup.png</image:loc><image:title>2_more_options_markup</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/1_view_account_markup.png</image:loc><image:title>1_view_account_markup</image:title></image:image><lastmod>2019-07-19T14:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/07/16/summer-cyber-secure-challenge-home-internet/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/home_internet.jpg</image:loc><image:title>home_internet</image:title></image:image><lastmod>2019-07-15T18:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/07/09/summer-cyber-secure-challenge-part-4-manage-your-passwords/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/manage-your-passwords.jpg</image:loc><image:title>Manage Your Passwords</image:title></image:image><lastmod>2019-07-11T22:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/02/05/spot-suspicious-websites-with-the-help-of-a-browser-extension/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/02/browser-extension-2.png</image:loc><image:title>browser extension</image:title></image:image><lastmod>2019-07-08T13:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/07/04/happy-4th-of-july/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/07/july4.jpg</image:loc><image:title>july4</image:title></image:image><lastmod>2019-07-02T02:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/06/25/summer-cyber-secure-challenge-online-safety-for-family/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/06/discuss-online-safety-with-family.jpg</image:loc><image:title>Discuss Online Safety With Family</image:title></image:image><lastmod>2019-06-24T15:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/06/18/summer-cyber-secure-challenge-social-connection-review/</loc><lastmod>2019-06-17T15:14:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/06/11/summer-cyber-secure-challenge-app-delete/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/06/summer_challenge_app_delete.jpg</image:loc><image:title>summer_challenge_app_delete</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/06/summer_challenge_social_review.jpg</image:loc><image:title>summer_challenge_social_review</image:title></image:image><lastmod>2019-06-10T19:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/05/21/convenience-at-a-cost/</loc><lastmod>2019-05-21T13:37:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/05/28/summer-is-around-the-corner/</loc><lastmod>2019-05-10T14:42:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/05/14/organized-cyber-crime/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/05/great-place-to-stay-or-a-scam_cyberawareness.png</image:loc><image:title>Great place to stay or a scam_CyberAwareness</image:title></image:image><lastmod>2019-04-29T14:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/05/07/a-reminder-about-physical-security/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/05/not-yours_would-you-connect-it_cyberawareness.png</image:loc><image:title>Not yours_Would you connect it_CyberAwareness</image:title></image:image><lastmod>2019-04-29T14:06:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/04/30/you-want-my-password-seriously/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/04/login-with-another-service-3.jpg</image:loc><image:title>Login With Another Service</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/04/email-verification-1.jpg</image:loc><image:title>Email Verification</image:title></image:image><lastmod>2019-04-22T18:16:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/04/23/the-dangers-of-social-media-challenges/</loc><lastmod>2019-04-08T14:52:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/04/16/learning-through-games-and-exercises/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/04/divulging_too_much.jpg</image:loc><image:title>divulging_too_much</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/04/learn-through-games.jpg</image:loc><image:title>Learn Through Games</image:title></image:image><lastmod>2019-04-08T14:42:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/04/09/password-manager-hesitation/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/04/will-it-confuse-users.jpg</image:loc><image:title>will it confuse users</image:title></image:image><lastmod>2019-04-04T15:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/04/02/virtual-schools-a-rich-target-for-data-thieves/</loc><lastmod>2019-04-01T15:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/03/26/password-managers-risks-and-benefits/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/04/youshoulduseapasswordmanager.jpg</image:loc><image:title>youshoulduseapasswordmanager</image:title></image:image><lastmod>2019-03-14T14:56:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/03/19/an-800k-mistake/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/03/an800kmistake.png</image:loc><image:title>an800kmistake</image:title></image:image><lastmod>2019-03-04T15:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/03/12/is-the-internet-your-source-for-news/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/03/disinformation.png</image:loc><image:title>disinformation</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/02/twitter-report.jpg</image:loc><image:title>twitter report</image:title></image:image><lastmod>2019-03-04T15:37:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/03/05/have-you-filed-your-taxes-yet/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/03/cyber-tips-for-tax-season.png</image:loc><image:title>Cyber Tips for Tax Season</image:title></image:image><lastmod>2019-03-04T15:30:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/02/26/the-google-phishing-quiz/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/02/googlephishingquiz_domain.png</image:loc><image:title>googlephishingquiz_domain</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/02/googlephishingquiz.png</image:loc><image:title>googlephishingquiz</image:title></image:image><lastmod>2019-02-25T19:07:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/02/19/a-stronger-password-using-phrases/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/02/pw_phrases.png</image:loc><image:title>pw_phrases</image:title></image:image><lastmod>2019-02-18T16:28:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/02/12/new-phishing-warnings-in-gsuite/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/02/phishing_notification.png</image:loc><image:title>phishing_notification</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/01/email-safety.png</image:loc><image:title>email safety</image:title></image:image><lastmod>2019-02-11T19:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/01/29/the-difference-between-security-and-legitimacy/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/01/security_vs_legitimacy.png</image:loc><image:title>security_vs_legitimacy</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/01/target-link2.png</image:loc><image:title>target link2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/01/target-link.png</image:loc><image:title>target link</image:title></image:image><lastmod>2019-01-23T20:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/01/22/the-latest-in-disruptions-disclosures-and-financial-loss/</loc><lastmod>2019-01-21T12:16:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/01/15/another-k12-data-breach/</loc><lastmod>2019-01-10T23:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/01/08/cyber-security-in-the-new-year/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2019/01/offline-verification-step.jpg</image:loc><image:title>offline-verification-step</image:title></image:image><lastmod>2019-01-08T03:02:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2019/01/01/happy-new-year/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/12/HappyNewYear.png</image:loc><image:title>HappyNewYear</image:title></image:image><lastmod>2018-12-31T16:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/12/21/happy-holidays-2/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/12/happyholidays2018.jpg</image:loc><image:title>happyholidays2018</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/12/happyholidays2018.png</image:loc><image:title>happyholidays2018</image:title></image:image><lastmod>2018-12-21T11:57:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/12/04/those-great-holiday-deals/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/12/great-deal-2.png</image:loc><image:title>Great Deal 2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/12/great-deal-1.png</image:loc><image:title>GREAT DEAL 1</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/11/online-holiday-shopping.jpg</image:loc><image:title>online holiday shopping</image:title></image:image><lastmod>2018-11-29T16:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/11/27/security-and-third-party-apps/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/11/security-and-third-party-apps.png</image:loc><image:title>Security and Third-party Apps</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/11/evaluate-online-services.jpg</image:loc><image:title>evaluate online services</image:title></image:image><lastmod>2018-11-27T15:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/11/20/happy-thanksgiving/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/11/thanksgiving2018.jpg</image:loc><image:title>thanksgiving2018</image:title></image:image><lastmod>2018-11-19T17:27:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/11/06/safe-online-shopping/</loc><lastmod>2018-11-06T22:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/10/23/security-versus-productivity/</loc><lastmod>2018-10-22T16:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/10/09/freeze-your-childrens-credit/</loc><lastmod>2018-09-19T18:56:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/10/02/october-national-cyber-security-awareness-month/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/10/ncsam.jpg</image:loc><image:title>ncsam</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/09/collage.png</image:loc><image:title>collage</image:title></image:image><lastmod>2018-09-17T15:08:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/09/25/combating-foreign-influence-operations/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/09/video_resources.jpg</image:loc><image:title>video_resources</image:title></image:image><lastmod>2018-09-17T15:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/09/18/the-unintelligible-rambling-link-url/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/09/the_unintelligible_rambling_link.jpg</image:loc><image:title>the_unintelligible_rambling_link</image:title></image:image><lastmod>2018-09-17T14:57:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/09/11/handling-email-inquiries/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/09/internet-handshake.jpg</image:loc><image:title>Internet handshake</image:title></image:image><lastmod>2018-09-10T17:12:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/08/28/digital-literacy-around-email-addresses/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/08/mailboxatinternetproperty.jpg</image:loc><image:title>mailboxatinternetproperty</image:title></image:image><lastmod>2018-08-22T14:07:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/08/21/engagement-with-cyber-safety/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/09/engagestaff.jpg</image:loc><image:title>EngageStaff</image:title></image:image><lastmod>2018-08-22T13:50:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/08/07/will-money-change-hands/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/08/ifmoneywillchangehands.jpg</image:loc><image:title>ifmoneywillchangehands</image:title></image:image><lastmod>2018-08-08T12:47:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/07/31/are-you-in/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/07/ct-2018-13-gift-card-scams.jpg</image:loc><image:title>CT-2018-13 gift card scams</image:title></image:image><lastmod>2018-07-30T14:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/07/24/theft-through-email/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/07/theftthroughemail.jpg</image:loc><image:title>theftthroughemail</image:title></image:image><lastmod>2018-07-24T17:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/07/17/disruptions-disclosures-and-loss-oh-my/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/07/roundups2018q1.png</image:loc><image:title>roundups2018q1</image:title></image:image><lastmod>2018-07-16T16:21:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/07/03/awareness-around-insider-threat/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/07/insiderthreat1.jpg</image:loc><image:title>insiderthreat</image:title></image:image><lastmod>2018-06-29T14:49:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/06/26/ftc-advice-for-small-businesses/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/06/protecting-your-business-from-scams.jpg</image:loc><image:title>Protecting your business from scams</image:title></image:image><lastmod>2018-06-25T16:23:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/06/19/how-smart-is-your-virtual-personal-assistant/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/06/smart_assistants2.png</image:loc><image:title>smart_assistants2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/06/smart-assistant.jpg</image:loc><image:title>smart assistant</image:title></image:image><lastmod>2018-06-15T16:14:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/06/05/2017-internet-crime-report/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/06/business-email-compromise-accounted-for.png</image:loc><image:title>Business Email Compromise accounted for</image:title></image:image><lastmod>2018-06-04T15:23:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/06/12/a-student-goes-phishing/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/06/phishing-can-be-used-to-steal-teacher-logins-to-change-grades.png</image:loc><image:title>Phishing can be used to... steal teacher logins to change grades</image:title></image:image><lastmod>2018-06-04T15:19:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/05/29/goals-of-a-security-awareness-program/</loc><lastmod>2018-05-21T15:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/05/22/verizon-data-breach-investigations-report-2018/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/05/verizon-dbir-2018.png</image:loc><image:title>verizon dbir 2018</image:title></image:image><lastmod>2018-05-14T15:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/05/08/ransomwares-real-effects/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/05/pay-up.jpg</image:loc><image:title>pay up</image:title></image:image><lastmod>2018-05-07T16:28:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/05/15/physical-protections-for-cyber-things/</loc><lastmod>2018-05-07T16:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/05/01/trade-offs-in-privacy-and-social-networks/</loc><lastmod>2018-04-30T15:54:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/04/24/password-spraying-is-your-organization-vulnerable/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/04/pwnd.png</image:loc><image:title>pwnd</image:title></image:image><lastmod>2018-04-16T18:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/04/17/higher-learning-hacks/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/04/how-valuable-is-the-info-you-work-with_.png</image:loc><image:title>How valuable is the info you work with_</image:title></image:image><lastmod>2018-04-16T18:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/04/10/national-cyber-attacks-in-the-news/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/04/rethink-workplace-pictures.png</image:loc><image:title>Rethink Workplace Pictures</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/russia-hacking.jpg</image:loc><image:title>Russia Hacking</image:title></image:image><lastmod>2018-04-09T16:03:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/04/03/revisiting-social-media-privacy/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/facebook2.png</image:loc><image:title>facebook2</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/facebook.png</image:loc><image:title>facebook</image:title></image:image><lastmod>2018-04-02T12:40:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/03/27/business-identity-theft-it-could-happen-to-you/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/michelle-interview-screenshot.png</image:loc><image:title>Michelle Interview screenshot</image:title></image:image><lastmod>2018-03-15T14:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/03/20/tax-time-and-irs-communications/</loc><lastmod>2018-03-15T14:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/02/27/online-identity-fraud-and-employee-engagement/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/02/cyberawareness-can-help-you-protect-your-online-identity.png</image:loc><image:title>CyberAwareness can help you protect your online identity</image:title></image:image><lastmod>2018-02-24T17:22:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/03/06/awareness-around-passwords/</loc><lastmod>2018-02-24T17:21:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/03/13/digital-literacy-and-web-addresses/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/five-ideas-for-password-awareness.png</image:loc><image:title>Five Ideas for Password Awareness</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/we-need-digital-literacy-around-web-addresses.png</image:loc><image:title>We need digital literacy around web addresses</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/03/beware-of-irs-impersonators-at-tax-time.png</image:loc><image:title>Beware of IRS impersonators at tax time</image:title></image:image><lastmod>2018-02-24T17:17:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/02/06/announcing-our-phishing-service/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/02/how-many-employees-are-susceptible_.png</image:loc><image:title>How many employees are susceptible_</image:title></image:image><lastmod>2018-01-29T16:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/02/13/phishing-protections-awareness-and-controls/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/02/we-love-these-security-features.png</image:loc><image:title>We love these security features</image:title></image:image><lastmod>2018-01-29T16:27:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/02/20/how-do-you-know-you-test/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/02/free-phishing-susceptibility-test.png</image:loc><image:title>Free Phishing Susceptibility Test</image:title></image:image><lastmod>2018-01-29T16:22:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/01/16/information-handling-for-the-individual-user/</loc><lastmod>2018-01-05T19:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/01/23/incentives/</loc><lastmod>2018-01-05T19:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/01/30/would-you-ask-a-user-for-her-password/</loc><lastmod>2018-01-05T19:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/01/09/organizing-for-the-new-year/</loc><lastmod>2018-01-04T17:39:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2018/01/02/cyber-roundups/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2018/01/06-databreaches.jpg</image:loc><image:title>06-databreaches</image:title></image:image><lastmod>2017-12-29T17:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/12/19/happy-holidays/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/12/happy-holidays-2017.jpg</image:loc><image:title>Happy Holidays 2017</image:title></image:image><lastmod>2017-12-18T14:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/12/05/your-email-is-the-key-to-your-online-identity/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/12/email_is_the_key.jpg</image:loc><image:title>email_is_the_key</image:title></image:image><lastmod>2017-12-04T20:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/12/12/bringing-new-tech-home/</loc><lastmod>2017-11-27T19:15:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/11/28/third-party-sites/</loc><lastmod>2017-11-27T19:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/11/21/thankful-2/</loc><lastmod>2017-11-19T04:45:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/11/14/low-tech-reinforcement-methods/</loc><lastmod>2017-11-14T12:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/10/11/stories-and-resources-to-share/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/10/03-information-hasvalue.jpg</image:loc><image:title>03-information-hasvalue</image:title></image:image><lastmod>2017-10-27T13:14:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/11/07/check-for-password-reuse/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/10/02-hasthispasswordbeenusedelsewhere.jpg</image:loc><image:title>02-hasthispasswordbeenusedelsewhere</image:title></image:image><lastmod>2017-10-27T13:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/10/31/its-ok-to-be-the-one-who-says-security-first/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/10/01-sorrysecurity.jpg</image:loc><image:title>01-sorrysecurity</image:title></image:image><lastmod>2017-10-27T13:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/10/24/need-a-security-awareness-training-policy/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/10/training-policy.jpg</image:loc><image:title>training-policy</image:title></image:image><lastmod>2017-10-16T16:43:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/10/17/social-engineering-scams-by-role/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/10/not_your_avg_resume.png</image:loc><image:title>not_your_avg_resume</image:title></image:image><lastmod>2017-10-16T16:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/10/03/information-handling/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/10/information-handlingprocedures.png</image:loc><image:title>Information HandlingProcedures</image:title></image:image><lastmod>2017-10-03T14:57:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/09/19/the-equifax-breach-and-you/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/09/ct-2017-07.jpg</image:loc><image:title>CT-2017-07</image:title></image:image><lastmod>2017-09-21T14:21:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/08/29/show-vs-tell/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/08/teachme-resource.jpg</image:loc><image:title>teachme resource</image:title></image:image><lastmod>2017-08-21T16:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/08/22/getting-ready-for-a-new-year-part-3/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/08/consistent-reminders.jpg</image:loc><image:title>Consistent Reminders</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/08/consistent-reminders.png</image:loc><image:title>Consistent Reminders</image:title></image:image><lastmod>2017-08-21T14:14:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/08/08/getting-ready-for-a-new-year-part-2/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/08/provide-a-technology-safety-success-guide1.jpg</image:loc><image:title>Provide a Technology Safety Success Guide</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/08/provide-a-technology-safety-success-guide.jpg</image:loc><image:title>Provide a Technology Safety Success Guide</image:title></image:image><lastmod>2017-08-07T18:47:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/07/25/getting-ready-for-a-new-year/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/07/p-2017-12.png</image:loc><image:title>P-2017-12</image:title></image:image><lastmod>2017-07-25T13:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/07/11/data-breach-stories-for-cyber-awareness/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/07/cyberroundups2.jpg</image:loc><image:title>CyberRoundups2</image:title></image:image><lastmod>2017-07-10T17:52:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/06/27/wheres-my-data/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/06/sd-2017-04-socialmedia.jpg</image:loc><image:title>sensitive-data-storage</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/06/sd-2017-04-socialmedia.png</image:loc><image:title>SD-2017-04-SOCIALMEDIA</image:title></image:image><lastmod>2017-06-27T12:38:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/05/30/two-scenarios/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/05/p-2017-14.png</image:loc><image:title>p-2017-14</image:title></image:image><lastmod>2017-05-23T21:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/05/23/password-managers/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/05/pw-2017-13.png</image:loc><image:title>PW-2017-13</image:title></image:image><lastmod>2017-05-23T21:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/05/02/four-cyber-threats-to-public-schools/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/05/four-cyber-threats.jpg</image:loc><image:title>Four Cyber Threats</image:title></image:image><lastmod>2017-05-01T21:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/04/18/poor-symbolism-https-and-lock-icons/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/04/what-https-really-means.jpg</image:loc><image:title>What HTTPS really means</image:title></image:image><lastmod>2017-04-17T16:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/04/05/dont-wait-to-start-awareness/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/04/w-2phishingscam-thumbnail.png</image:loc><image:title>W-2PhishingScam-thumbnail</image:title></image:image><lastmod>2017-04-05T15:04:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/03/21/the-danger-in-your-inbox/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/03/2016ignitetalk.jpg</image:loc><image:title>2016IgniteTalk</image:title></image:image><lastmod>2017-03-21T14:32:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/03/07/honest-mistake-real-consequences/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/03/shouldyousendcompanydata.jpg</image:loc><image:title>shouldyousendcompanydata</image:title></image:image><lastmod>2017-03-06T20:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/02/28/liven-up-your-security-awareness-with-stories-where-the-good-guys-fight-back/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/02/thegoodguysfightback1.jpg</image:loc><image:title>thegoodguysfightback</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/02/thegoodguysfightback.jpg</image:loc><image:title>thegoodguysfightback</image:title></image:image><lastmod>2017-02-26T16:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/02/21/when-was-the-last-time-you-accepted-a-strangers-friend-request/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/02/why-hack-my-social-network.jpg</image:loc><image:title>why-hack-my-social-network</image:title></image:image><lastmod>2017-02-21T18:37:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/02/14/free-resource-for-phishing-awareness/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/02/if_email_makes_you_feel2.jpg</image:loc><image:title>if_email_makes_you_feel2</image:title></image:image><lastmod>2017-02-13T18:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/02/07/security-awareness-programs-help-you-uncover-and-fix-problems/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/02/security-awareness-programs-help-you-uncover-and-fix-problems.png</image:loc><image:title>security-awareness-programs-help-you-uncover-and-fix-problems</image:title></image:image><lastmod>2017-02-06T18:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/01/31/when-procedures-arent-followed/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/just_wire_the_money.png</image:loc><image:title>just_wire_the_money</image:title></image:image><lastmod>2017-01-31T17:11:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/01/26/the-next-generation-of-cyber-defenders/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/2017-team3b.jpg</image:loc><image:title>2017-team3b</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/2017-team3.jpg</image:loc><image:title>2017-team3</image:title></image:image><lastmod>2017-01-26T12:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/01/24/new-cyber-roundups-2/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/cyberroundups2017.png</image:loc><image:title>cyberroundups2017</image:title></image:image><lastmod>2017-01-23T18:35:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/01/17/boiling-it-down/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/boilingitdown1.png</image:loc><image:title>boilingitdown</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/boilingitdown.png</image:loc><image:title>boilingitdown</image:title></image:image><lastmod>2017-01-09T16:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/01/10/introducing-security-awareness-posters/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/phishing1v2.png</image:loc><image:title>phishing1v2</image:title><image:caption>Whoa! Is that a phish?</image:caption></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/toothbrush.png</image:loc><image:title>toothbrush</image:title><image:caption>Sharing passwords is bad hygiene</image:caption></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/break.png</image:loc><image:title>break</image:title><image:caption>Remind users to lock their screens</image:caption></image:image><lastmod>2017-01-09T16:05:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2017/01/03/writing-just-to-write/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2017/01/doless.jpg</image:loc><image:title>doless</image:title></image:image><lastmod>2017-01-03T16:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/12/27/not-all-2fa-is-created-equal/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/12/additional_login_step.png</image:loc><image:title>additional_login_step</image:title></image:image><lastmod>2016-12-27T12:18:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/12/13/but-i-expect-e-mails-from-new-people-all-the-time/</loc><lastmod>2016-12-08T12:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/12/20/happy-holidays-free-resources/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/12/happyholidays.png</image:loc><image:title>happyholidays</image:title></image:image><lastmod>2016-12-03T18:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/12/06/this-is-too-hard/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/11/what-users-really-think-password-changes.png</image:loc><image:title>what-users-really-think-password-changes</image:title></image:image><lastmod>2016-11-23T19:27:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/11/29/its-the-most-scam-ridden-time-of-the-year/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/11/incredibledeal.png</image:loc><image:title>incredibledeal</image:title></image:image><lastmod>2016-11-23T19:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/11/15/share-and-beware/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/11/ifyoushare.jpg</image:loc><image:title>ifyoushare</image:title></image:image><lastmod>2016-11-14T19:41:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/11/22/thankful/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/11/happy-thanksgiving.png</image:loc><image:title>happy-thanksgiving</image:title></image:image><lastmod>2016-11-14T19:16:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/11/08/somethings-not-quite-right-here/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/11/callnowscam.jpg</image:loc><image:title>callnowscam</image:title></image:image><lastmod>2016-11-10T11:32:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/10/11/are-you-part-of-the-problem/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/10/dvr.png</image:loc><image:title>dvr</image:title></image:image><lastmod>2016-10-24T17:20:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/10/25/use-the-dnc-hacks-to-teach-phishing/</loc><lastmod>2016-10-24T17:12:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/10/18/do-you-have-a-plan/</loc><lastmod>2016-10-18T16:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/10/04/protecting-electronic-health-records/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/10/medical_history.png</image:loc><image:title>medical_history</image:title></image:image><lastmod>2016-10-04T02:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/09/27/the-largest-hack-to-date/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/notifications-about-suspicious-activity1.png</image:loc><image:title>notifications-about-suspicious-activity</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/notifications-about-suspicious-activity.png</image:loc><image:title>notifications-about-suspicious-activity</image:title></image:image><lastmod>2016-09-29T16:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/09/20/talking-cyber-security/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/2016-09-13-itenradio-small.jpg</image:loc><image:title>2016-09-13-itenradio-small</image:title></image:image><lastmod>2016-09-19T18:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/11/01/goodie-baskets/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/bewareonlinescams.jpg</image:loc><image:title>bewareonlinescams</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/placecomputer-securitytip-here.png</image:loc><image:title>placecomputer-securitytip-here</image:title></image:image><lastmod>2016-09-12T18:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/09/13/evaluating-your-security-awareness-program/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/measureupsecurityawareness.png</image:loc><image:title>measureupsecurityawareness</image:title></image:image><lastmod>2016-09-12T18:57:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/05/03/youre-not-teaching-it-security/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/blog-yourenotteachingitsecurity.png</image:loc><image:title>blog-yourenotteachingitsecurity</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/askusers.jpg</image:loc><image:title>AskUsers</image:title></image:image><lastmod>2016-09-07T18:17:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/09/06/one-thing-at-a-time/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/sat-lifecycle-track.png</image:loc><image:title>SAT Lifecycle Track</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/09/sat-lifecycle.png</image:loc><image:title>SAT Lifecycle</image:title></image:image><lastmod>2016-09-06T19:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/08/30/new-cyber-roundups/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/08/cyberroundups.jpg</image:loc><image:title>CyberRoundups</image:title></image:image><lastmod>2016-08-29T18:06:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/08/23/where-to-save-files/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/08/save-to-the-cloud.jpg</image:loc><image:title>SAVE TO THE CLOUD</image:title></image:image><lastmod>2016-08-24T17:54:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/08/16/password-change-pizza-party/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/08/password_pizza_party.jpg</image:loc><image:title>password_pizza_party</image:title></image:image><lastmod>2016-08-11T15:34:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/08/09/love-letter-to-facebook/</loc><lastmod>2016-08-11T10:58:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/08/02/summer-cyber-camp/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/07/cybercamp1.jpg</image:loc><image:title>cybercamp1</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/07/cybercamp2.jpg</image:loc><image:title>cybercamp2</image:title></image:image><lastmod>2016-07-26T14:17:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/07/26/changes-are-here/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/07/after_withmarkup.png</image:loc><image:title>after_withmarkup</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/07/before.png</image:loc><image:title>before</image:title></image:image><lastmod>2016-07-25T19:03:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/05/17/use-stories-to-introduce-awareness-programs/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/usestories1.png</image:loc><image:title>UseStories</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/usestories.png</image:loc><image:title>UseStories</image:title></image:image><lastmod>2016-07-25T18:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/07/05/strong-passwords-are-like-recipes/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/06/recipe1.png</image:loc><image:title>recipe1</image:title></image:image><lastmod>2016-07-25T18:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/07/19/a-particularly-good-tale-of-ransomware/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/07/a-particularly-good-story-o.jpg</image:loc><image:title>A PARTICULARLY GOOD STORY O</image:title></image:image><lastmod>2016-07-25T18:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/07/12/why-i-have-tape-over-my-webcam/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/07/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2016-07-25T18:17:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/06/28/ransomware-ransomware-everywhere/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/06/ransomware.jpg</image:loc><image:title>Ransomware</image:title></image:image><lastmod>2016-07-25T18:16:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/06/21/free-awareness-videos/</loc><lastmod>2016-07-25T18:16:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/06/07/conversations-with-teachers/</loc><lastmod>2016-07-25T18:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/06/01/writing-a-training-policy/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/training-policy1.png</image:loc><image:title>training-policy1</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/training-policy2.png</image:loc><image:title>training-policy2</image:title></image:image><lastmod>2016-07-25T18:15:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/05/24/the-unexpected-e-mail-needs-more-scrutiny/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/unexpected_email.png</image:loc><image:title>unexpected_email</image:title></image:image><lastmod>2016-07-25T18:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/04/26/aware-vs-unaware-employees/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/04/youneedmypassword.jpg</image:loc><image:title>youneedmypassword</image:title></image:image><lastmod>2016-07-25T18:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/04/19/the-gray-areas/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/04/neveronlydonothammer.jpg</image:loc><image:title>neveronlydonothammer</image:title></image:image><lastmod>2016-07-25T18:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/06/14/walkthrough-inspections/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/06/walkthrough-inspections.jpg</image:loc><image:title>Walkthrough Inspections</image:title></image:image><lastmod>2016-06-10T20:10:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/05/10/calling-out-employee-good-behavior/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/05/blog-thankyou.jpg</image:loc><image:title>Blog-thankyou</image:title></image:image><lastmod>2016-05-09T20:04:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/04/12/carrots/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/04/carrots1.jpg</image:loc><image:title>carrots</image:title></image:image><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/04/carrots.jpg</image:loc><image:title>carrots</image:title></image:image><lastmod>2016-04-12T16:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com/2016/04/08/hi-im-michelle/</loc><image:image><image:loc>https://blog.cybersafeworkforce.com/wp-content/uploads/2016/04/photo-1.jpg</image:loc><image:title>photo 1</image:title><image:caption>Social Media: What Are YOU Sharing?</image:caption></image:image><lastmod>2016-04-08T16:13:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cybersafeworkforce.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2021-05-03T02:33:30+00:00</lastmod></url></urlset>
