<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//makemecybersafe.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://makemecybersafe.com/</loc>
		<lastmod>2026-04-02T22:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/07/dark-web-a-cybersecurity-nightmare/</loc>
		<lastmod>2021-07-19T11:48:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/dark-web.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/hidden-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/07/securing-your-remote-office/</loc>
		<lastmod>2021-07-19T11:49:01+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/secure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/07/compromised-email-account-heres-what-to-do/</loc>
		<lastmod>2021-07-19T11:49:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/comp-mailbox.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/07/top-7-cybersecurity-training-practices-for-employees/</loc>
		<lastmod>2021-07-19T11:49:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/empl_training.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/passwords.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/06/take-care-be-aware-of-unsolicited-emails/</loc>
		<lastmod>2021-07-19T11:49:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/newsletter_18-blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/image001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/image002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/image003.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/image004.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/image005.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/image006.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/06/2021-cybersecurity-spring-cleaning-checklist/</loc>
		<lastmod>2021-07-19T11:49:33+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/newsletter_11-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/06/what-you-need-to-know-about-ransomware/</loc>
		<lastmod>2021-07-19T11:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/newsletter_13-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/07/how-to-prevent-dark-web-cyber-threats-and-attacks/</loc>
		<lastmod>2021-07-27T06:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/cyber-threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/08/top-breaches-and-leakages-of-2020/</loc>
		<lastmod>2021-08-12T14:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/top-breache.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/zdnet1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/cam2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/08/dark-market-economy/</loc>
		<lastmod>2021-08-12T14:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/dark-market-eco.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/dark-market-price1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/covid19-cost2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/08/cyberbullying-and-information-sharing/</loc>
		<lastmod>2021-08-12T14:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/info-share.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/08/understanding-the-importance-of-vulnerability-management/</loc>
		<lastmod>2021-08-16T12:01:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/08/vulnerability-management.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/09/virtual-conferencing-platform-tips/</loc>
		<lastmod>2021-09-13T13:47:03+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/conferance.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/penguin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/09/6-steps-to-securing-iot-devices-and-taking-back-your-privacy/</loc>
		<lastmod>2021-09-13T13:48:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/alexa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/09/social-media-the-pros-cons-and-the-security-policy/</loc>
		<lastmod>2021-09-13T13:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/social-media.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/07/how-to-protect-seniors-against-cybercrimes-and-scams/</loc>
		<lastmod>2021-09-21T12:17:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/07/senior.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/09/back-to-school-scams/</loc>
		<lastmod>2021-09-28T12:01:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/school.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/10/phishing-a-global-threat-to-employees-in-2021/</loc>
		<lastmod>2021-10-05T12:01:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/phishing20-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/phishing-impact.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/10/why-is-penetration-testing-so-important-for-my-business/</loc>
		<lastmod>2021-10-12T13:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/penetration.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/10/hack-the-human-end-user-training-and-tips-to-combat-social-engineering/</loc>
		<lastmod>2021-10-12T13:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/Hack-the-Human.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/amazon-sidewalk-is-privacy-dead/</loc>
		<lastmod>2021-11-01T15:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/10/amazon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/wfa-replaces-wfh-and-how-to-protect-your-company/</loc>
		<lastmod>2021-11-03T07:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/10/work-from-home.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/10/wfh-covid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/10/vulnerability-management-best-practices/</loc>
		<lastmod>2021-10-26T12:01:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/Vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/the-cyber-dangers-of-iot/</loc>
		<lastmod>2021-11-05T10:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/10/iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/supply-chain-risk/</loc>
		<lastmod>2021-11-09T10:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/supply-chain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/09/global-supply-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/are-hackers-coming-to-the-good-side/</loc>
		<lastmod>2021-11-09T17:38:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/11/ethical-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/the-evolving-threat-of-bec-attacks/</loc>
		<lastmod>2021-11-12T13:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/10/bec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/does-your-business-need-cyber-insurance/</loc>
		<lastmod>2021-11-16T10:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/11/cybersecurity-isurance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/5-most-common-malware-to-watch-out-for/</loc>
		<lastmod>2021-11-23T11:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/11/common-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/what-businesses-need-to-know-about-the-latest-phishing-trends/</loc>
		<lastmod>2021-11-26T11:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/11/phishing-trend.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/cybersecurity-is-growing-heres-what-your-new-hires-should-know/</loc>
		<lastmod>2021-12-03T11:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/11/cybersecurity-growing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/are-your-work-and-personal-accounts-locked-tight/</loc>
		<lastmod>2021-12-07T11:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/Work-and-Personal-Accounts-Locked.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/corporate-travel-is-coming-back/</loc>
		<lastmod>2021-12-10T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/corporate-travel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/how-to-protect-your-fast-growing-business-from-a-data-breach/</loc>
		<lastmod>2021-12-14T11:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/the-101-guide-to-the-california-consumer-privacy-act-ccpa/</loc>
		<lastmod>2022-01-04T11:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/cc-privacy-act.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/01/whats-this-about-cybersecurity-in-the-defense-bill/</loc>
		<lastmod>2021-12-20T21:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/defence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/risk-management-guide-for-saas-companies/</loc>
		<lastmod>2022-01-14T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/risk-management-guide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/technology-errors-and-omissions-insurance-what-you-need-to-know/</loc>
		<lastmod>2022-01-25T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/technology-errors-and-omissions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/06/dont-be-frivolous-with-your-stimulus/</loc>
		<lastmod>2022-01-01T04:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/06/newsletter_17-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/how-to-protect-your-business-while-youre-away/</loc>
		<lastmod>2022-01-28T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/how-to-protect-your-business.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/better-breach-protection-for-businesses/</loc>
		<lastmod>2022-02-01T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/better-breach-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/what-is-cyber-crime-and-social-engineering-insurance/</loc>
		<lastmod>2022-01-18T17:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/what-is-cyber-crime.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/5-cybersecurity-predictions-in-2022/</loc>
		<lastmod>2022-02-04T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/CybersecurityPredictions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/why-employees-are-lax-about-cybersecurity-and-what-to-do-about-it/</loc>
		<lastmod>2022-02-08T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/why-employees-are-lax.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/are-you-prepared-against-fake-antivirus-software/</loc>
		<lastmod>2022-02-11T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/fake-antivirus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/where-is-face-recognition-heading-in-2022/</loc>
		<lastmod>2022-02-15T11:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/face-recognition.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/protect-yourself-from-password-spraying/</loc>
		<lastmod>2022-02-08T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/password-spraying.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/biometrics-what-is-it-and-why-does-it-matter/</loc>
		<lastmod>2022-02-22T11:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/biometrics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/02/adware-what-is-it-and-how-can-you-avoid-it/</loc>
		<lastmod>2022-02-25T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/02/adware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/why-are-businesses-using-vpns/</loc>
		<lastmod>2022-03-08T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/vpn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/11/smishing-what-is-it-and-why-is-it-dangerous/</loc>
		<lastmod>2022-02-24T20:39:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/11/smishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/the-role-of-cybersecurity-amidst-global-tension/</loc>
		<lastmod>2022-03-01T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/02/Global-Tension.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/tax-season-is-here-is-your-return-secure/</loc>
		<lastmod>2022-03-11T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/tax.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/how-to-keep-the-healthcare-industry-cyber-safe/</loc>
		<lastmod>2022-03-15T11:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/02/heathcare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/could-your-business-lose-all-its-data/</loc>
		<lastmod>2022-03-18T11:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/02/Lose-All-It-Data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/new-botnet-makes-att-less-secure/</loc>
		<lastmod>2022-02-28T17:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/botnet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/cyber-liability-insurance-guide/</loc>
		<lastmod>2022-02-28T17:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/cyber-liability-insurance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/fake-covid-19-documents-circle-the-dark-web/</loc>
		<lastmod>2022-02-28T17:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/sars-covid-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/cyber-liability-and-pci-dss-compliance-and-why-they-matter/</loc>
		<lastmod>2022-02-28T17:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/pci_dss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2021/12/rise-of-ransomware-how-to-protect-your-business/</loc>
		<lastmod>2022-02-28T17:54:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/randsomeware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/6-forms-of-social-engineering-and-how-to-protect-your-business/</loc>
		<lastmod>2022-02-28T17:54:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/protect-your-business.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/01/top-5-tech-eo-and-cyber-claims/</loc>
		<lastmod>2022-02-28T17:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/12/tech-eno.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/avoiding-ddos-attacks-in-2022/</loc>
		<lastmod>2022-03-22T11:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/02/DDoS-Attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/how-cyber-insurance-and-cybersecurity-work-together/</loc>
		<lastmod>2022-03-25T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/Cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/what-threat-do-cyberattacks-pose-to-small-business/</loc>
		<lastmod>2022-03-29T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/Small-Business.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/clickjacking-what-is-it-and-how-can-it-affect-your-business/</loc>
		<lastmod>2022-04-01T11:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/Clickjacking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/is-your-security-awareness-training-up-to-snuff/</loc>
		<lastmod>2022-04-08T11:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/training.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/the-dark-web-what-is-it-and-how-can-i-keep-my-information-safe/</loc>
		<lastmod>2022-04-15T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/the_dark_web.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/banks-get-ready-for-new-cybersecurity-regulations/</loc>
		<lastmod>2022-04-05T18:17:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/02/banks-be-ready.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/which-web-browser-works-best/</loc>
		<lastmod>2022-04-19T11:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/web-browser.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/how-much-does-your-smart-phone-know/</loc>
		<lastmod>2022-04-22T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/mobile-manager.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/how-the-dark-web-hand-delivers-malware/</loc>
		<lastmod>2022-04-26T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/delivers-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/worlds-biggest-darknet-marketplace-shuts-down/</loc>
		<lastmod>2022-04-12T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/hydra-market.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/04/how-ransomware-is-changing/</loc>
		<lastmod>2022-04-29T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/03/ransomeware-mar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/03/ransomware-on-the-dark-net/</loc>
		<lastmod>2022-04-13T20:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/01/ransomeware-dark.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/cryptojacking-a-threat-borne-of-digitization/</loc>
		<lastmod>2022-05-03T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/crypto.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/honesty-is-the-best-policy-even-when-youre-being-hacked/</loc>
		<lastmod>2022-05-17T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/being-hacked.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/remember-revil-the-ransomware-group-is-making-a-comeback/</loc>
		<lastmod>2022-05-13T11:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/r-evil.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/threat-detection-is-getting-faster-is-yours-up-to-speed/</loc>
		<lastmod>2022-05-06T11:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/threat-detections.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/3-ways-to-tell-if-a-website-is-secure/</loc>
		<lastmod>2022-05-10T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/website-secure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/the-dark-threat-rising-in-artificial-intelligence/</loc>
		<lastmod>2022-05-20T11:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/dark-threat-rising.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/5-tips-to-save-time-online/</loc>
		<lastmod>2022-05-31T11:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/save-time-online.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/two-years-of-trouble-the-long-term-effects-of-ransomware-attacks/</loc>
		<lastmod>2022-06-03T11:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/ransomware-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/single-sign-on-more-secure-than-it-sounds/</loc>
		<lastmod>2022-05-24T17:10:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/single-sign.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/how-can-i-keep-my-info-off-the-dark-web/</loc>
		<lastmod>2022-06-07T11:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/keep-my-info-off.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/the-good-and-bad-of-qr-codes/</loc>
		<lastmod>2022-06-10T11:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/bad-qrcodes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/do-i-really-need-to-update-software-asap/</loc>
		<lastmod>2022-06-14T11:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/update-software.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/does-security-compliance-really-matter/</loc>
		<lastmod>2022-06-21T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/compliance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/how-online-job-ads-are-endangering-hr/</loc>
		<lastmod>2022-06-17T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/endangering-hr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/05/seth-greens-phishing-nightmare-it-can-happen-to-anyone/</loc>
		<lastmod>2022-05-27T11:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/phishing_nightmare2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/careful-with-crypto-know-the-dangers-before-you-invest/</loc>
		<lastmod>2022-06-24T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/04/careful-with-crypto.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/06/eco-friendliness-the-next-trend-in-tech/</loc>
		<lastmod>2022-06-28T11:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2021/01/eco-friendly.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/dont-download-that-file-and-other-things-to-know-about-email-security/</loc>
		<lastmod>2022-07-01T11:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/05/email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/digital-accessibility-what-is-it-and-why-should-you-care/</loc>
		<lastmod>2022-07-05T11:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/06/digitization-g5488f4ad2_1920-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/06/digitization-g5488f4ad2_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/the-cloud-everything-you-need-to-know-about-the-invisible-server/</loc>
		<lastmod>2022-07-08T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/06/an-tran-xa-X3YICs3s-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/06/sigmund-LCun3uxh-z0-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/25-cybersecurity-terms-you-should-know/</loc>
		<lastmod>2022-07-12T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/cs-terms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/whos-selling-your-data/</loc>
		<lastmod>2022-07-15T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/sell-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/secure-wfh-tips-for-the-everyman/</loc>
		<lastmod>2022-07-19T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/wfh.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/spear-phishing-what-is-it-and-how-to-avoid-it/</loc>
		<lastmod>2022-07-22T20:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/get-me-out-g5ef113edd_1280-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/scam-gb9d1ee955_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/get-me-out-g5ef113edd_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/ip-address-what-is-it-and-why-do-you-need-to-know/</loc>
		<lastmod>2022-07-26T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/ip.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/07/help-im-a-victim-of-ransomware/</loc>
		<lastmod>2022-07-29T11:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/dont-settle-for-notes-app-passwords-get-a-manager-instead/</loc>
		<lastmod>2022-08-02T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/password.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/everything-you-need-to-know-about-pii/</loc>
		<lastmod>2022-08-05T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/know-pii.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/rely-on-medical-devices-theyre-getting-more-cyber-secure/</loc>
		<lastmod>2022-08-09T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/medical.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/raccoon-stealer-malware-what-you-need-to-know/</loc>
		<lastmod>2022-08-12T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/raccoon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/tech-faqs-answers-to-your-top-tough-questions/</loc>
		<lastmod>2022-08-16T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/07/faqs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/how-to-spot-malicious-files/</loc>
		<lastmod>2022-08-19T11:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/search-file.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/5-things-you-didnt-know-about-your-iphone/</loc>
		<lastmod>2022-08-23T11:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/iphone.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/should-you-manually-bypass-web-filtering/</loc>
		<lastmod>2022-08-26T11:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/web-filter.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/08/3-ways-cyber-crime-plays-out-irl/</loc>
		<lastmod>2022-08-30T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/cyber-crime.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/3-unexpected-places-we-risk-online-security/</loc>
		<lastmod>2022-09-06T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/online-market.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/should-i-delete-my-old-apps-and-programs/</loc>
		<lastmod>2022-09-16T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/trash.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/5-things-your-i-t-guy-says-decoded/</loc>
		<lastmod>2022-09-20T11:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/the-hidden-threat-what-is-man-in-the-middle/</loc>
		<lastmod>2022-09-23T11:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/hidden-threat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/price-of-privacy-sephora-fined-1-2m-for-violating-ccpa/</loc>
		<lastmod>2022-09-02T16:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/sephora.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/lastpass-breached-where-did-the-password-manager-go-wrong/</loc>
		<lastmod>2022-09-09T11:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/last-pass.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/samsung-announces-data-breach-what-happened-to-your-info/</loc>
		<lastmod>2022-09-13T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/samsung-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/5-steps-for-safer-online-shopping/</loc>
		<lastmod>2022-09-27T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/online-shopping.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/09/save-space-and-time-by-tossing-outdated-tech/</loc>
		<lastmod>2022-09-30T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/save-space.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/attention-whatsapp-users-better-security-is-coming/</loc>
		<lastmod>2022-10-04T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/whatsapp-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/whats-the-most-common-brand-faked-by-phishers/</loc>
		<lastmod>2022-10-07T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/08/top-brand.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/when-cyber-threats-fly-what-the-data-breach-on-american-airlines-means-for-you/</loc>
		<lastmod>2022-10-11T11:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/10/airlines-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/what-the-optus-breach-tells-us-about-the-cyber-risks-of-telecom/</loc>
		<lastmod>2022-10-14T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/optus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/guilty-of-being-hacked-ex-uber-exec-convicted-for-paying-data-breachers/</loc>
		<lastmod>2022-10-21T11:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/10/uber-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/thief-on-thief-crime-hackers-target-the-incarcerated-more-thank-you-think/</loc>
		<lastmod>2022-10-25T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/10/thief-on-thief-crime.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/avoiding-business-identity-compromise/</loc>
		<lastmod>2022-10-28T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/10/phishing-office.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/10/watch-your-webcam-what-hackers-are-doing-with-your-camera/</loc>
		<lastmod>2022-10-19T23:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/webcam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/3-tips-to-make-your-iphone-more-secure/</loc>
		<lastmod>2022-11-04T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/iPhone-More-Secure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/malvertising-how-to-avoid-tempting-scams/</loc>
		<lastmod>2022-11-08T11:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/Malvertising.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/how-to-avoid-credit-card-theft/</loc>
		<lastmod>2022-11-11T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/10/cc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/what-do-you-know-about-pii-disclosure-laws-in-your-industry/</loc>
		<lastmod>2022-11-15T11:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/10/pii.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/botnets-are-you-part-of-the-digital-threat/</loc>
		<lastmod>2022-11-18T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/botnets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/think-before-you-click-hyperlink-safety-101/</loc>
		<lastmod>2022-11-25T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/Hyperlink.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/what-is-this-ftc-safeguards-rule-for-banks/</loc>
		<lastmod>2022-11-22T11:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/clock-ga106f8a85_1920.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/clock-ga106f8a85_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/happy-healthy-holidays-5-tips-for-secure-gift-giving/</loc>
		<lastmod>2022-12-02T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/healthy-holidays.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/california-privacy-rights-act-in-effect-on-january-1st/</loc>
		<lastmod>2022-11-29T11:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/cpra.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/metaverse-what-is-it-and-what-will-cybersecurity-there-look-like/</loc>
		<lastmod>2022-12-09T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/metaverse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/when-credit-card-monitoring-is-illegally-monitored/</loc>
		<lastmod>2022-12-20T11:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/cc-monitoring.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/sample-braech-email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/lastpass-is-struck-again/</loc>
		<lastmod>2022-12-06T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/towfiqu-barbhuiya-em5w9_xj3uU-unsplash-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/breach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/towfiqu-barbhuiya-em5w9_xj3uU-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/11/how-to-keep-information-private-during-video-calls/</loc>
		<lastmod>2022-12-06T17:23:21+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/09/video-call.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/phi-what-is-it-and-how-to-know-yours-is-protected/</loc>
		<lastmod>2022-12-23T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/11/medical-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/sharing-a-computer-be-careful-what-you-browse/</loc>
		<lastmod>2022-12-27T11:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/computer-share.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/secure-access-service-edge-coming-in-2023/</loc>
		<lastmod>2022-12-30T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/secure-access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/uber-hacked-again-the-newest-data-breach-on-the-rideshare-app/</loc>
		<lastmod>2022-12-23T16:20:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/uber-hacked-again.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/coding-g505b40a02_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/pexels-thisisengineering-3861969-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/new-year-for-cyber-threats-3-things-coming-your-way-in-2023/</loc>
		<lastmod>2023-01-03T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/new-year-cyber-threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/is-malware-about-to-get-60x-faster/</loc>
		<lastmod>2023-01-13T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/malware-faster.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/spam-dont-just-click-delete/</loc>
		<lastmod>2023-01-17T00:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/spam-delete-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/twitter-suffers-data-breach-of-400m-users/</loc>
		<lastmod>2023-01-10T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/twitter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/qtq80-11WDUw.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/twitter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/what-is-pki-and-why-does-it-matter/</loc>
		<lastmod>2023-01-24T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/pki.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/smart-cars-get-duped-the-new-security-flaw-found-in-millions-of-vehicles/</loc>
		<lastmod>2023-01-20T11:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/highway.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/car-g0b33e873f_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/highway.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/what-you-need-to-know-about-physically-securing-your-devices/</loc>
		<lastmod>2023-01-27T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/immo-wegmann-YriuRFYUP0I-unsplash-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/towfiqu-barbhuiya-em5w9_xj3uU-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/immo-wegmann-YriuRFYUP0I-unsplash-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/how-encryption-really-works-a-beginners-guide/</loc>
		<lastmod>2023-01-31T11:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/encryption-really-works.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/inside-the-breach-on-t-mobile/</loc>
		<lastmod>2023-02-03T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/t-mobile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/roaming-mantis-real-time-case-study-in-compromised-public-wifi/</loc>
		<lastmod>2023-02-10T11:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/roaming-mantis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/how-to-manage-third-party-risks/</loc>
		<lastmod>2023-02-14T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/third-party-risk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2022/12/is-mfa-all-its-cracked-up-to-be/</loc>
		<lastmod>2023-02-05T11:19:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/mfa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/data-breach-exposes-1m-chs-patients-phi/</loc>
		<lastmod>2023-02-17T11:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-pixabay-263402-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-pixabay-263402-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-chokniti-khongchum-2280568-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/what-to-do-with-default-apps/</loc>
		<lastmod>2023-02-28T11:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/default-apps.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/breach-on-godaddy-goes-back-multiple-years/</loc>
		<lastmod>2023-02-22T15:51:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/godaddy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-mikhail-nilov-6963098-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-rodolfo-clix-1036936-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/gamer-or-gambler-watch-out-for-this-new-social-engineering-threat/</loc>
		<lastmod>2023-03-07T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/gamer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/whats-up-with-the-phone-theft-epidemic/</loc>
		<lastmod>2023-03-14T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/stolan-phones.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/phishing-scams-compromise-reddit/</loc>
		<lastmod>2023-02-24T11:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/reddit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/telus-tell-all-canadian-telecom-company-under-attack/</loc>
		<lastmod>2023-03-03T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/qtq80-Cl2uSQ.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/qtq80-6P7Stl.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/qtq80-Cl2uSQ.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/guide-to-chatgpt-what-it-is-what-it-can-do-and-where-its-going/</loc>
		<lastmod>2023-03-10T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/ChatGPT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/authentication-recovery/</loc>
		<lastmod>2023-03-21T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/authentication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/02/google-fi-ghting-a-sim-swap-attack/</loc>
		<lastmod>2023-03-04T13:46:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/google.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-deepanker-verma-1482061-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/02/pexels-silvie-lindemann-63690-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/data-breach-on-att-rattles-millions/</loc>
		<lastmod>2023-03-17T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/pexels-ketut-subiyanto-4350210-2-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/pexels-andrea-piacquadio-3781524-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/pexels-ketut-subiyanto-4350210-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/dont-bother-the-bees-honeypots-and-how-to-avoid-them/</loc>
		<lastmod>2023-03-24T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/01/bee_hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/how-secure-is-your-favorite-social-media-app/</loc>
		<lastmod>2023-03-28T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/social-media.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/03/cyber-criminals-are-going-after-crypto-atms/</loc>
		<lastmod>2023-03-31T11:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/Crypto-ATMs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/what-does-the-internet-is-forever-really-mean/</loc>
		<lastmod>2023-04-07T11:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/is-your-face-id-being-held-without-your-consent-or-your-knowledge/</loc>
		<lastmod>2023-04-11T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/face-id.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/crash-course-in-keylogging-what-is-it-and-what-do-you-need-to-know/</loc>
		<lastmod>2023-04-14T11:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/keylogger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/whats-the-fuss-about-mfa/</loc>
		<lastmod>2023-04-21T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/passwords-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/hooked-a-catfish-heres-how-to-throw-it-back/</loc>
		<lastmod>2023-04-04T19:36:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/hooked_catfish.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/network-g1ec346ea3_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/catfish-g174a38ec1_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/a-dark-power-is-rising-behind-the-emerging-ransomware-threat/</loc>
		<lastmod>2023-04-18T11:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/03/dark_power_rising.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/crypto-exchange-hacks-what-is-it-and-how-to-protect-yourself/</loc>
		<lastmod>2023-04-12T19:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2022/12/crypto-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/04/is-your-network-security-decentralized/</loc>
		<lastmod>2023-04-28T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/decentralise.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/imprisoned-for-bad-data-privacy/</loc>
		<lastmod>2023-05-02T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/bad-data-privacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/the-inside-scoop-on-insider-threats/</loc>
		<lastmod>2023-05-05T11:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/insider-threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/have-you-heard-of-the-near-ultrasound-inaudible-trojan/</loc>
		<lastmod>2023-05-09T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/inaudible-trojan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/its-time-to-get-serious-about-cyber-compliance/</loc>
		<lastmod>2023-05-12T11:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/cyber-complience.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/beware-this-new-and-improved-banking-trojan/</loc>
		<lastmod>2023-05-16T11:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/banking-trojan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/why-radio-silence-is-the-wrong-response-to-a-cyber-event/</loc>
		<lastmod>2023-05-23T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/04/pii-expose.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/congress-exposed-in-phi-related-data-breach/</loc>
		<lastmod>2023-05-26T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/phi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/05/why-is-meta-in-hot-water-with-data-privacy-advocates/</loc>
		<lastmod>2023-05-30T11:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/meta-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/a-real-pain-cactus-ransomware-wreaks-havoc-on-vpns/</loc>
		<lastmod>2023-06-02T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/cactus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/most-common-brand-faked-by-phishers-so-far-this-year/</loc>
		<lastmod>2023-06-06T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/brand-faked.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/beginning-of-the-end-behind-the-latest-breach-on-chatgpt/</loc>
		<lastmod>2023-06-09T11:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/gpt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/open-source-coding-101-behind-the-buzzword/</loc>
		<lastmod>2023-06-13T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/opensource.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/how-well-do-you-know-your-incident-response-plan/</loc>
		<lastmod>2023-06-16T11:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/incident_response.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/consumer-financial-protection-bureaus-big-mistake/</loc>
		<lastmod>2023-06-20T11:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/cpfb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/3-smart-ways-to-hide-your-searches-in-public/</loc>
		<lastmod>2023-06-23T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/05/smart-ways.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/smart-cars-keep-getting-outsmarted/</loc>
		<lastmod>2023-06-27T11:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/smart-car.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/06/are-online-file-converters-cyber-safe/</loc>
		<lastmod>2023-06-30T11:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/file-upload.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/tricks-to-avoid-phishing-scams-for-mobile-users/</loc>
		<lastmod>2023-07-04T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/mobile-phishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/data-poisoning-why-ai-isnt-infallible/</loc>
		<lastmod>2023-07-07T11:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/data-visualization.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/what-is-data-localization-and-is-it-in-our-future/</loc>
		<lastmod>2023-07-11T11:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/data-localization.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/how-does-gen-z-stack-up-against-cybersecurity-best-practices/</loc>
		<lastmod>2023-07-14T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/gen-z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/how-to-manage-vendors-and-third-party-risk/</loc>
		<lastmod>2023-07-18T11:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/06/vendor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/got-student-loan-debt-scammers-know-it-too/</loc>
		<lastmod>2023-07-21T15:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/debt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/student-loan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/hack-g441e14d8d_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/over-100k-chatgpt-accounts-compromised/</loc>
		<lastmod>2023-07-25T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/chatgpt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/07/what-does-zero-day-mean/</loc>
		<lastmod>2023-07-28T15:18:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/zero-day.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/binoculars-gb83490c9c_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/pexels-photomix-company-101808-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/is-cybersecurity-strong-enough-in-space/</loc>
		<lastmod>2023-08-01T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/satellite.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/what-is-continuous-monitoring-and-why-does-it-matter/</loc>
		<lastmod>2023-08-04T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/07/monitoring.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/threads-what-is-it-and-is-it-safe-to-use/</loc>
		<lastmod>2023-08-08T11:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/thread.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/fiber-g5cc08f18c_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/girl-g06f54ea58_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/beware-of-spyware-what-is-it-and-how-can-you-stay-safe/</loc>
		<lastmod>2023-08-11T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/pexels-antoni-shkraba-5475810-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/hacker-2077138_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/pexels-antoni-shkraba-5475810-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/mobile-device-management/</loc>
		<lastmod>2023-08-15T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/mobile-device.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/lets-cast-a-light-on-shadow-it/</loc>
		<lastmod>2023-08-18T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/shadow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/irish-police-hit-by-industrial-scale-data-breach/</loc>
		<lastmod>2023-08-22T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/police-irish.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/geofencing-what-is-it-and-how-does-it-factor-into-data-privacy-and-cybersecurity/</loc>
		<lastmod>2023-08-29T11:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/geofencing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/08/geotagging-what-is-it-and-what-are-its-security-risks/</loc>
		<lastmod>2023-08-25T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/geotagging.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/incognito-maybe-not/</loc>
		<lastmod>2023-09-01T11:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/incognito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/application-whitelist-vs-blacklist/</loc>
		<lastmod>2023-09-05T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/whitelist.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/your-guide-to-the-us-cyber-trust-mark/</loc>
		<lastmod>2023-09-08T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/trustmark.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/safe-or-suspicious-x-now-requires-photo-verification/</loc>
		<lastmod>2023-09-12T11:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/x-photo-id.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/black-basta-shows-no-signs-of-slowing-ransomware-attacks/</loc>
		<lastmod>2023-09-15T00:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/08/black-basta-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/do-you-hire-or-fire-people-stay-safe-during-turnover/</loc>
		<lastmod>2023-09-19T20:35:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-5439439-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/pexels-cottonbro-studio-5989927-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-5439439-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/are-cookies-taking-a-bite-out-of-your-data-privacy/</loc>
		<lastmod>2023-09-22T11:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/pexels-daisy-anderson-5584278-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/pexels-peter-olexa-4012966-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/pexels-daisy-anderson-5584278-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/mgm-shut-down-by-a-phone-call/</loc>
		<lastmod>2023-09-26T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/mgm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/09/when-bobcats-go-ballistic/</loc>
		<lastmod>2023-09-29T11:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/backdoor1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/hacking-for-good-its-possible-lucrative-and-legal/</loc>
		<lastmod>2023-10-03T11:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/good-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/typosquatting-your-guide-to-understanding-this-cyber-threat/</loc>
		<lastmod>2023-10-06T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/url.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/what-is-software-as-a-service/</loc>
		<lastmod>2023-10-10T11:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/saas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/when-biometrics-get-stolen/</loc>
		<lastmod>2023-10-13T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/biometric.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/why-the-dark-web-loves-phi/</loc>
		<lastmod>2023-10-20T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/dw-loves-phi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/the-pros-and-cons-of-mfa/</loc>
		<lastmod>2023-10-24T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/09/mfa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/falling-for-common-internet-scams/</loc>
		<lastmod>2023-10-31T11:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/who-crossed-the-red-cross/</loc>
		<lastmod>2023-11-03T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/red-cross.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/are-you-part-of-a-culture-of-cybersecurity/</loc>
		<lastmod>2023-11-07T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/october-is-cybersecurity-awareness-month/</loc>
		<lastmod>2023-10-17T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/scam-7070718_1280.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/woman-6554271_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/scam-7070718_1280.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/battle-of-the-sexes-who-does-cyber-safety-better/</loc>
		<lastmod>2023-11-14T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/hack-man-woman.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/the-battle-for-your-childrens-data/</loc>
		<lastmod>2023-10-23T21:50:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/kids-computer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/money-goes-even-more-digital/</loc>
		<lastmod>2023-11-17T11:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/digital-money.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/injecting-more-than-just-vaccines-prompt-injection-attacks-run-rampant/</loc>
		<lastmod>2023-11-21T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/prompt-inj.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/12/is-google-wiretapping-your-calls/</loc>
		<lastmod>2023-12-01T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/google-call.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/ftc-safeguard-rule-gets-stronger-than-ever/</loc>
		<lastmod>2023-11-10T16:40:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/Untitled-design.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/man-5899192_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/Untitled-design.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/12/behind-the-hospital-curtain-why-is-phi-such-a-hot-topic/</loc>
		<lastmod>2023-12-08T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/phi-hot-topic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/12/factoring-in-the-human-element-of-cybersecurity/</loc>
		<lastmod>2023-12-12T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/data-protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/scattered-spider-skitters-back-onto-scene/</loc>
		<lastmod>2023-11-28T11:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/pexels-pixabay-276242.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/spider-3533177_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/pexels-kat-wilcox-923681-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/12/why-hackers-love-the-holidays/</loc>
		<lastmod>2023-12-05T11:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/hackers-love.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/what-is-ethernet/</loc>
		<lastmod>2024-01-05T11:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/ethernet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/01/why-does-incident-reporting-matter/</loc>
		<lastmod>2024-01-10T22:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/incident-reporting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/a-bite-out-of-apple-safari-exploit-discovered/</loc>
		<lastmod>2024-01-19T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/apple-bite.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/is-your-search-engine-stalking-you/</loc>
		<lastmod>2024-01-23T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/search-engine.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/ddos-attack-compromises-chatgpt/</loc>
		<lastmod>2024-01-26T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/ddos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/how-one-wobbly-domino-brought-down-an-organization/</loc>
		<lastmod>2024-01-30T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/okta.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/are-you-a-ciso-the-law-could-be-after-you/</loc>
		<lastmod>2024-02-02T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/sunburst.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/back-up-is-your-digital-life-protected/</loc>
		<lastmod>2024-02-06T11:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/data-protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/end-to-end-encryption-what-is-it-and-why-does-it-matter/</loc>
		<lastmod>2024-01-16T19:58:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/11/encryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/can-you-outrun-fast-ransomware/</loc>
		<lastmod>2024-02-09T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/ransomeware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/misinformation-isnt-just-frustrating-its-dangerous-too/</loc>
		<lastmod>2024-02-13T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/Misinformation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/microsoft-fights-off-the-storm-a-huge-vulnerability-just-got-patched/</loc>
		<lastmod>2024-02-16T11:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/microsoft-fight-back.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/california-tackles-data-privacy-again/</loc>
		<lastmod>2024-02-20T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/california-act.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/are-your-devices-spying-on-you/</loc>
		<lastmod>2024-02-23T11:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/tech-spy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/02/do-you-use-chat-rooms-heres-what-you-need-to-know/</loc>
		<lastmod>2024-02-27T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/chatroom.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/packaged-ransomware-puts-more-malware-in-hackers-hands/</loc>
		<lastmod>2024-03-01T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/safe-surfing-circumvent-spam-and-scams/</loc>
		<lastmod>2024-03-05T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/spam.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/demystifying-distributed-denial-of-service-attacks/</loc>
		<lastmod>2024-03-08T11:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/DDoS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/is-your-smart-phone-spying-on-you/</loc>
		<lastmod>2024-03-12T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/12/spy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/23andme-and-threat-actors-too/</loc>
		<lastmod>2024-03-15T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/02/23andme.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/artificial-intelligence-101/</loc>
		<lastmod>2024-03-15T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/01/artifical-inteligence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/raas-what-are-these-kits/</loc>
		<lastmod>2024-03-19T11:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/01/RaaS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/what-is-5g/</loc>
		<lastmod>2024-03-22T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/01/5g.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/11/what-the-end-of-the-writer-strike-means-for-ai/</loc>
		<lastmod>2024-02-19T22:49:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/ai-writer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/is-your-digital-life-encrypted/</loc>
		<lastmod>2024-03-29T11:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/02/encrypted-life.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/eu-launches-investigation-into-tiktok-over-child-protection-and-privacy-concerns/</loc>
		<lastmod>2024-04-05T11:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/02/child-protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/why-are-supply-chain-attacks-targeting-critical-infrastructure/</loc>
		<lastmod>2024-04-09T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/01/supply-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/is-your-digital-wallet-protected/</loc>
		<lastmod>2024-04-12T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/01/Digital-Wallet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/ai-got-your-tongue/</loc>
		<lastmod>2024-04-02T11:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/02/aivoice.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/is-the-algorithm-a-threat-to-data-privacy/</loc>
		<lastmod>2024-04-16T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/02/algorithm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/03/is-tiktok-really-getting-banned-in-the-u-s/</loc>
		<lastmod>2024-03-26T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/pexels-cottonbro-studio-5081930-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/pexels-katrin-bolovtsova-6077447-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/pexels-cottonbro-studio-5081930-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/the-truth-about-third-party-data-collection/</loc>
		<lastmod>2024-04-19T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/third-party-data-collection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/ai-spurs-greater-need-for-cyber-insurance/</loc>
		<lastmod>2024-04-23T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/ai-insurance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/are-you-oversharing-with-location-sharing/</loc>
		<lastmod>2024-04-30T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/location.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/why-you-shouldnt-reuse-passwords/</loc>
		<lastmod>2024-05-03T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/recycle-password.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/why-is-the-government-banning-microsoft-from-its-devices/</loc>
		<lastmod>2024-05-07T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/banning-microsoft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/dont-let-the-house-win-your-data/</loc>
		<lastmod>2024-05-10T11:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/casino.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/how-quantum-computers-could-break-our-best-cyber-defenses-simplified/</loc>
		<lastmod>2024-05-14T11:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/quantum-computing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/generative-ai-what-it-is-and-what-that-means-for-humans/</loc>
		<lastmod>2024-05-17T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/Generative-Ai-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/6-user-friendly-features-to-security-tech/</loc>
		<lastmod>2024-05-21T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/Security-Tech.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/rethinking-phishing-tests-a-call-for-trust-and-control/</loc>
		<lastmod>2024-05-24T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/phishing-test.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/getting-continuous-support-from-i-t/</loc>
		<lastmod>2024-05-28T11:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/it-support.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/05/falling-for-financial-scams/</loc>
		<lastmod>2024-05-31T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/scam-trap.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/Untitled.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/SGEMA2ZJMRAHTA3RX5CUB24TMI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/how-can-you-contribute-to-global-cybersecurity-efforts/</loc>
		<lastmod>2024-06-04T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/04/cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/04/saving-password-to-your-browser-youre-at-risk/</loc>
		<lastmod>2024-05-10T19:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/password.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/03/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/dont-blur-the-lines-between-work-and-personal-devices/</loc>
		<lastmod>2024-06-11T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/work-personal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/ai-friend-and-foe-in-cybersecurity/</loc>
		<lastmod>2024-06-14T11:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/ai-good-bad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/what-is-the-cyber-threat-landscape/</loc>
		<lastmod>2024-06-18T11:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/cyber-threat-landscape.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/putting-zero-trust-in-your-cybersecurity/</loc>
		<lastmod>2024-06-21T11:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/zero-trust-cs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/caught-in-a-pig-butchering-scam/</loc>
		<lastmod>2024-06-25T11:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/pig-butchering.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/06/how-bug-bounty-programs-help-white-hat-hackers/</loc>
		<lastmod>2024-06-28T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/white-hat-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/hackers-save-the-day/</loc>
		<lastmod>2024-07-02T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/Hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/modern-data-privacy-a-global-concern/</loc>
		<lastmod>2024-07-05T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/05/data-privacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/what-should-you-know-about-incident-response/</loc>
		<lastmod>2024-07-12T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/06/Incident-Response.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/protection-against-account-takeover/</loc>
		<lastmod>2024-07-16T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/06/Protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/what-is-the-gdpr-and-are-you-affected/</loc>
		<lastmod>2024-07-15T19:49:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/06/GDPR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/is-your-qr-code-hacking-you/</loc>
		<lastmod>2024-07-19T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/bar-code-6128518_1280-edited.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/phishing-6926470_1280-edited.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/qr-code-156717_1280-edited.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/bar-code-6128518_1280-edited.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/07/dont-fall-for-the-glimmer-spot-and-avoid-advance-fee-fraud/</loc>
		<lastmod>2024-07-26T16:35:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/advance-fee.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/ramming-into-computer-issues-what-you-need-to-know-about-random-access-memory/</loc>
		<lastmod>2024-08-06T11:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/ram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/dont-text-back-to-a-pretext/</loc>
		<lastmod>2024-08-09T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/07/sms-pretext.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/what-you-need-to-know-about-the-massive-data-breach-at-national-public-data/</loc>
		<lastmod>2024-08-16T23:58:32+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/unnamed-file.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/deepfakes-faking-you-out/</loc>
		<lastmod>2024-08-20T17:10:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/Deepfakes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/your-printer-could-be-the-key-to-your-demise/</loc>
		<lastmod>2024-08-23T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/printer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/encryption-the-invisible-shield-protecting-your-data/</loc>
		<lastmod>2024-08-27T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/data-encryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/08/real-site-or-typosquat-heres-how-to-tell/</loc>
		<lastmod>2024-08-30T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/Typosquat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/cyber-extortion-is-not-just-a-concern-for-your-boss/</loc>
		<lastmod>2024-09-03T11:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/extortion.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/business-email-compromise-on-the-rise/</loc>
		<lastmod>2024-09-13T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/email-comp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/secure-and-productive-video-conferencing-solutions-for-businesses/</loc>
		<lastmod>2024-09-20T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/video-conferencing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/pastejacking-behind-the-subtle-phishing-scam/</loc>
		<lastmod>2024-09-17T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/pastejacking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/how-to-online-shop-and-stay-cyber-safe/</loc>
		<lastmod>2024-09-24T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/online-shopping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/how-microsoft-copilot-got-hijacked/</loc>
		<lastmod>2024-09-06T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/Title.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/cybersecurity-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/pexels-tara-winstead-8386440-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/the-tiktok-chase-bank-glitch-a-lesson-in-cybersecurity/</loc>
		<lastmod>2024-09-10T11:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/pexels-rdne-5699376-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/fraud-prevention-3188092_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/pexels-rdne-5699376-edited-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/09/staying-safe-from-scams-in-collaborative-tools/</loc>
		<lastmod>2024-09-27T11:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/collaborative-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/what-is-a-sim-swap/</loc>
		<lastmod>2024-10-01T11:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/SIM-Swap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/all-mfa-is-not-created-equal/</loc>
		<lastmod>2024-10-04T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/08/mfa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/balancing-security-with-data-privacy/</loc>
		<lastmod>2024-10-08T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/data-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/space-technology-a-universe-of-possibilities/</loc>
		<lastmod>2024-10-11T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/09/space.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/security-awareness-training-the-key-to-securing-home-and-work-networks/</loc>
		<lastmod>2024-10-15T11:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/10/qtq80-dcKeDY.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/understanding-the-recent-canva-data-breach-and-how-to-protect-your-accounts/</loc>
		<lastmod>2024-10-18T11:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/10/pexels-cottonbro-5054358-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/understanding-the-geopolitical-implications-of-cybersecurity/</loc>
		<lastmod>2024-10-22T11:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/10/qtq80-q7QJGp.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/10/machine-learning-your-secret-weapon-against-targeted-attacks/</loc>
		<lastmod>2024-10-25T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/10/machine-learning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/why-you-should-hide-apps-on-your-phone-screen/</loc>
		<lastmod>2024-11-01T11:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/10/qtq80-SAUfwj.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/is-your-job-using-a-i-securely/</loc>
		<lastmod>2024-11-05T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/10/qtq80-FlYTnH.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/are-cybercriminals-using-your-stolen-data-to-steal-from-your-job/</loc>
		<lastmod>2024-11-08T19:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/pexels-towfiqu-barbhuiya-3440682-8541751-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/what-cybersecurity-trainings-do-you-take-and-why-do-they-matter/</loc>
		<lastmod>2024-11-12T11:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/qtq80-objLfD.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/how-fraud-took-down-att/</loc>
		<lastmod>2024-11-15T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/qtq80-CJw9tn.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/top-5-online-threats-to-watch-out-for-in-2025/</loc>
		<lastmod>2024-11-15T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/crime-1862312_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/the-role-of-firewalls-in-network-security-and-why-they-matter-to-you/</loc>
		<lastmod>2024-11-19T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/ai-generated-8070000_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/what-happens-in-the-downtime-during-a-data-breach/</loc>
		<lastmod>2024-11-22T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/11/how-to-outsmart-insider-threats/</loc>
		<lastmod>2024-11-26T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/insider-threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2023/10/behind-the-average-ransomware-attack/</loc>
		<lastmod>2024-11-21T00:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2023/10/ransomware-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/how-underground-cables-affect-our-data/</loc>
		<lastmod>2024-12-03T11:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/why-you-should-never-pay-a-ransomware-fee/</loc>
		<lastmod>2024-12-06T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/ransomeware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/what-is-privilege-escalation-in-a-data-breach/</loc>
		<lastmod>2024-12-10T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/Data-Breach-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/navigating-eu-regulations-meta-google-and-the-quest-for-clarity-about-ai/</loc>
		<lastmod>2024-12-13T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/11/navigation-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/how-to-safely-dispose-of-outdated-technology/</loc>
		<lastmod>2024-12-20T11:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/outdated-tech.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/5-types-of-multi-factor-authentication/</loc>
		<lastmod>2024-12-24T11:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/password-otp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/access-levels-and-security-clearance/</loc>
		<lastmod>2024-12-27T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/what-to-do-if-your-system-is-infected/</loc>
		<lastmod>2024-12-31T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/infacted.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/01/incident-response-is-a-team-effort/</loc>
		<lastmod>2024-12-16T22:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/incident-reporting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/cyber-threats-to-watch-out-for-in-2025/</loc>
		<lastmod>2025-01-03T11:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/crime-2025.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/best-practices-to-protect-phi-and-why-everyone-should-know-how/</loc>
		<lastmod>2025-01-07T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/phi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/why-is-email-such-a-common-method-of-cyber-attack/</loc>
		<lastmod>2025-01-10T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/email.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/how-ai-will-impact-cybersecurity-in-2025/</loc>
		<lastmod>2025-01-14T11:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/cyber-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/job-seekers-and-recruiters-protect-yourself-from-cybercrime/</loc>
		<lastmod>2025-01-17T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/hiring.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/state-of-the-u-s-tiktok-ban/</loc>
		<lastmod>2025-01-21T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/tiktok-ban.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/is-it-a-crock-to-call-crypto-cash/</loc>
		<lastmod>2025-01-24T11:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/crypto-cash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2024/12/the-most-effective-backup-and-data-storage/</loc>
		<lastmod>2025-01-15T18:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2024/12/backup-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/are-your-social-media-profiles-secure/</loc>
		<lastmod>2025-01-28T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/profile-safe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/01/is-there-a-hacker-in-your-smartphone/</loc>
		<lastmod>2025-01-31T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/hacker-phone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/u-s-executive-order-on-a-i-the-environment-and-cybersecurity/</loc>
		<lastmod>2025-02-04T11:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/new-ransomware-targets-amazon-aws/</loc>
		<lastmod>2025-02-07T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/aws-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/double-clickjacking-toil-and-trouble/</loc>
		<lastmod>2025-02-11T11:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/Clickjacking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/bring-your-own-device-means-bringing-extra-security/</loc>
		<lastmod>2025-02-18T11:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/mobile-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/your-smartphone-could-compromise-your-work-network/</loc>
		<lastmod>2025-02-21T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/worknetwork.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/new-darkgate-ransomware-targets-team-communication-apps/</loc>
		<lastmod>2025-02-25T11:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/blackgate.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/met-your-valentine-online-have-a-cyber-safe-date/</loc>
		<lastmod>2025-02-14T11:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/01/graphic-art-that-depicts-valentines-day-themed-cybersecurity-themed-online-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/when-ai-leads-to-legal-disputes/</loc>
		<lastmod>2025-03-07T11:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/ai-legal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/when-deepfakes-land-you-in-deep-waters/</loc>
		<lastmod>2025-03-14T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/deepfakes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/is-your-information-on-people-finding-websites/</loc>
		<lastmod>2025-03-18T11:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/ai-people-finding-website-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/generative-ai-what-is-it-and-is-it-a-danger-to-us/</loc>
		<lastmod>2025-03-21T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/genrative-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/vishing-what-makes-voice-phishing-so-effectively-dangerous/</loc>
		<lastmod>2025-03-25T11:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/vishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/ransomware-past-present-and-future/</loc>
		<lastmod>2025-03-28T11:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/ransomeware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/how-do-authenticator-apps-protect-data-privacy/</loc>
		<lastmod>2025-03-11T21:46:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/auth-app.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/02/is-triple-extortion-the-next-big-ransomware/</loc>
		<lastmod>2025-03-11T22:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/create-a-high-resolution-image-illustrating-the-concept-of-triple-extortion-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/03/whats-up-with-the-privacy-allegations-against-snapchat-ai/</loc>
		<lastmod>2025-03-11T22:19:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/02/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/the-rising-threat-of-nation-state-cyberattacks/</loc>
		<lastmod>2025-04-08T11:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/wordlwide-cyberattack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/behind-the-bybit-crypto-crime/</loc>
		<lastmod>2025-04-11T11:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/cryptocurrency-stock-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/ethereum-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/understanding-credential-stuffing/</loc>
		<lastmod>2025-04-15T11:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/login.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/how-ai-empowers-spear-phishing/</loc>
		<lastmod>2025-04-18T11:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/phish-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/can-cyber-hygiene-fend-off-ai-driven-cyberattacks/</loc>
		<lastmod>2025-04-22T11:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/cyber-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/the-ups-and-downs-of-facial-recognition-technology/</loc>
		<lastmod>2025-04-25T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/facial-recognition.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/protecting-your-device-from-malware/</loc>
		<lastmod>2025-05-09T09:22:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/04/malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/5-biggest-threats-to-your-cryptocurrency-and-crypto-wallet/</loc>
		<lastmod>2025-05-09T09:24:16+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/cryptocurrency-hacking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/do-security-questions-make-good-mfa/</loc>
		<lastmod>2025-05-09T09:26:10+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/security-questions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/what-are-the-risks-to-your-cloud-data/</loc>
		<lastmod>2025-05-09T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/cloud-data-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/what-happens-in-the-downtime-during-a-data-breach-2/</loc>
		<lastmod>2025-05-16T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/security-breach-downtime.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/how-do-hardware-keys-secure-your-data/</loc>
		<lastmod>2025-05-20T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/hardware-keys-and-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/lock-it-down-email-security-and-effective-communication/</loc>
		<lastmod>2025-05-23T11:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/email-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/headhunter-phishing-navigating-unsafe-job-recruiters/</loc>
		<lastmod>2025-05-27T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/headhunter-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/rfid-inside-the-invisible-technology/</loc>
		<lastmod>2025-05-30T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/rfid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/how-to-use-ai-safely-and-effectively-in-the-workplace/</loc>
		<lastmod>2025-06-03T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/biggest-data-breaches-of-2025-so-far/</loc>
		<lastmod>2025-05-13T14:04:05+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/04/virus.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/passwords.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/data-breaches.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/when-the-dark-web-has-your-pii/</loc>
		<lastmod>2025-06-10T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/pii-on-dark-web-1536x1038-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/how-a-supply-chain-attack-triggered-a-lawsuit/</loc>
		<lastmod>2025-06-06T11:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/supply-chain-attack-cyber-threat-1536x1038-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/05/why-you-should-embrace-automation-in-the-workplace/</loc>
		<lastmod>2025-05-14T22:51:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/automated-technology-and-humans.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/are-you-posting-too-much-information-to-social-media/</loc>
		<lastmod>2025-06-13T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/social-media-cyberattack-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/how-ai-stops-small-mistakes-from-becoming-big-cyber-events/</loc>
		<lastmod>2025-06-20T11:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/ai-and-people-cybersecurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/are-fake-websites-faking-you-out/</loc>
		<lastmod>2025-06-27T11:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/fake-websites-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/why-are-there-blocked-websites-on-work-wifi/</loc>
		<lastmod>2025-07-01T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/blocked-websites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/3-common-myths-about-ai/</loc>
		<lastmod>2025-07-11T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/AI-in-the-workplace.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/doxxing-what-you-need-to-know-about-this-cyber-threat/</loc>
		<lastmod>2025-06-19T20:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/doxxing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/shadow-ai-in-the-workplace/</loc>
		<lastmod>2025-07-18T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/shadow-AI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/are-ai-chatbots-inaccurate/</loc>
		<lastmod>2025-07-22T11:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/chatbot-ai-accuracy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/how-social-engineering-is-evolving-in-2025/</loc>
		<lastmod>2025-07-25T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/social-engineering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/inside-the-phi-breach-at-blue-shield/</loc>
		<lastmod>2025-07-08T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/PHI-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/16-billion-passwords-leaked-what-really-happened-and-what-you-need-to-do-now/</loc>
		<lastmod>2025-07-04T11:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/07/data-leak.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/how-lack-of-preparation-can-affect-cybersecurity/</loc>
		<lastmod>2025-08-01T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/07/breach-readiness.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/06/when-botnets-take-over-your-phone/</loc>
		<lastmod>2025-07-17T22:22:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/05/botnet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/conversational-vs-generative-ai-the-difference-and-why-it-matters/</loc>
		<lastmod>2025-07-29T19:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/07/conversational-AI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/ai-bias-and-safety-are-really-the-same-problem/</loc>
		<lastmod>2025-08-08T11:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/07/ai-chat-bots-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/malware-as-a-service-is-using-microsoft-teams-to-launch-attacks/</loc>
		<lastmod>2025-08-12T11:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/your-crypto-wallet-login-is-worth-more-than-your-laptop-on-the-dark-web/</loc>
		<lastmod>2025-08-15T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/crypto-wallet-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/hackers-breach-federal-court-filing-system-what-it-means-for-you/</loc>
		<lastmod>2025-08-19T11:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/Hacker-Targets-Court-System-Databases-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/07/how-healthcare-data-breaches-fuel-identity-theft-and-insurance-fraud/</loc>
		<lastmod>2025-08-14T22:06:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/06/phi-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/digital-trust-what-it-means-and-why-its-disappearing/</loc>
		<lastmod>2025-08-22T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/digital-trust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/ai-leaks-what-happens-when-machines-leak-your-secrets/</loc>
		<lastmod>2025-08-26T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/AI-Data-Breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan/</loc>
		<lastmod>2025-09-02T11:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/digital-dependency.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/08/ai-supply-chain-trusting-the-algorithms-behind-your-business/</loc>
		<lastmod>2025-08-29T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/AI-supply-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/digital-ethics-what-it-means-for-you-at-work/</loc>
		<lastmod>2025-09-09T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/Digital-Ethics-and-resilience-planning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/why-hackers-think-youre-an-easy-target/</loc>
		<lastmod>2025-09-05T11:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/hackers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/why-cybersecurity-matters-to-you/</loc>
		<lastmod>2025-09-12T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/cybersecurity-for-all.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/the-invisible-human-cost-of-a-breach/</loc>
		<lastmod>2025-09-16T11:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/getty-images-OxYlYiMYY3c-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/singapore-mandates-age-verification-and-online-accountability/</loc>
		<lastmod>2025-09-19T11:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/08/age-verification.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/what-glba-means-for-you-at-work/</loc>
		<lastmod>2025-09-23T11:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/glba-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives/</loc>
		<lastmod>2025-09-26T11:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/workplace-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/09/when-opt-out-doesnt-mean-out-what-googles-425m-lesson-means-for-you/</loc>
		<lastmod>2025-09-30T11:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/data-collection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/switzerland-surveillance-shift-and-what-it-means-for-you/</loc>
		<lastmod>2025-10-03T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/Digital-Privacy-and-Surveillance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/spoofing-when-trust-gets-faked/</loc>
		<lastmod>2025-10-10T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/private-login.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/when-zero-trust-meets-human-nature/</loc>
		<lastmod>2025-10-14T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/is-ai-fixing-security-or-just-automating-our-flaws/</loc>
		<lastmod>2025-10-17T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/ai-automation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/are-our-defenses-built-to-protect-or-reassure/</loc>
		<lastmod>2025-10-21T11:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/employee-technology-security-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/slam-the-door-on-phone-slamming/</loc>
		<lastmod>2025-10-24T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/phone-slamming.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/when-tax-season-texts-turn-into-smishing-attacks/</loc>
		<lastmod>2025-10-15T17:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/09/Tax-Smishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/how-oversharing-and-overscrolling-lead-to-breaches/</loc>
		<lastmod>2025-11-04T11:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/social-engineering-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/from-routine-to-resilience-turning-security-habits-into-second-nature/</loc>
		<lastmod>2025-11-07T11:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/why-didn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/hidden-roi-of-security-awareness-training/</loc>
		<lastmod>2025-11-11T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/security-awareness-training.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/beating-alert-fatigue-without-losing-vigilance/</loc>
		<lastmod>2025-11-14T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/security-alerts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/why-following-the-rules-isnt-the-same-as-being-secure/</loc>
		<lastmod>2025-11-18T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/not-following-the-rules-of-phishing-awareness-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/the-deepfake-dilemma-can-you-trust-what-you-see-online/</loc>
		<lastmod>2025-11-21T11:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/video-deepfake.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/how-everyday-conversations-shape-cyber-safety/</loc>
		<lastmod>2025-11-11T23:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/coworkers-communicating-through-conversations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/is-contactless-payment-smart-or-insecure/</loc>
		<lastmod>2025-11-28T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/contactless-payment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/10/when-convenience-becomes-the-enemy-of-security/</loc>
		<lastmod>2025-11-17T21:25:26+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/10/cybersecurity-v-convenience.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/malware-as-a-service-the-subscription-nobody-wants/</loc>
		<lastmod>2025-12-02T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/malware-as-a-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/staying-secure-beyond-the-office-walls/</loc>
		<lastmod>2025-12-09T11:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/ChatGPT-Image-Nov-6-2025-10_53_58-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/vishing-scams-are-on-the-rise/</loc>
		<lastmod>2025-12-05T11:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/vishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/11/can-qr-codes-wreck-your-cell-phone/</loc>
		<lastmod>2025-11-26T19:21:49+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/11/qr-code-risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/are-you-giving-away-privacy-for-convenience/</loc>
		<lastmod>2025-12-12T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/personal-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/how-everyday-work-habits-leak-more-data-than-you-think/</loc>
		<lastmod>2025-12-16T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/workplace-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/your-inbox-isnt-a-to-do-list-pause-before-you-click/</loc>
		<lastmod>2025-12-19T11:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/email-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/how-are-people-scamming-food-delivery-apps/</loc>
		<lastmod>2025-12-23T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/food-delivery-apps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/remote-access-tools-what-they-are-why-we-use-them-and-when-to-be-careful/</loc>
		<lastmod>2025-12-26T11:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/remote-access-tool.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/12/how-to-communicate-securely-when-every-chat-can-be-a-threat/</loc>
		<lastmod>2025-12-30T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/ai-chat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/why-your-click-matters-more-than-any-software/</loc>
		<lastmod>2026-01-02T11:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/phishing-links-and-careful-clicks-online.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/what-will-cybersecurity-look-like-in-2026/</loc>
		<lastmod>2026-01-06T11:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/cybersecurity-in-2026.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/the-downsides-of-smart-devices/</loc>
		<lastmod>2026-01-09T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/smart-devices-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/how-the-european-space-agency-was-breached/</loc>
		<lastmod>2026-01-12T11:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/12/european-space-station-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/what-are-insider-threats/</loc>
		<lastmod>2026-01-16T11:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/workplace-insider-threats.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/the-quiet-risk-of-just-helping-out-at-work/</loc>
		<lastmod>2026-01-20T11:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/helping-coworkers-creates-security-risks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/reddit-fights-ai-over-data-privacy/</loc>
		<lastmod>2026-01-23T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/REDDIT-VS-DATA-PRIVACY.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/what-happens-after-a-breach/</loc>
		<lastmod>2026-01-27T11:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/recovery-after-data-breaches-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/work-from-anywhere-secure-everywhere/</loc>
		<lastmod>2026-01-30T11:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/remote-work.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/01/what-is-a-supply-chain-attack/</loc>
		<lastmod>2026-01-20T17:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/supply-chain-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/what-makes-public-wi-fi-a-risk/</loc>
		<lastmod>2026-02-06T11:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/public-wifi-security-risks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/the-dangers-of-texting-phi-and-using-insecure-communication/</loc>
		<lastmod>2026-02-10T11:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/phi-texting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/how-ai-helps-threat-actors-commit-cyber-crime/</loc>
		<lastmod>2026-02-13T11:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/AI-cyber-crime.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/what-the-cisa-incident-teaches-us-about-ai-safety/</loc>
		<lastmod>2026-02-03T11:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/ai-safety-at-work.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/malvertising-when-online-ads-become-a-delivery-system-for-malware/</loc>
		<lastmod>2026-02-17T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/01/malvertisements.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/what-is-piggybacking/</loc>
		<lastmod>2026-02-20T11:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/02/piggybacking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/what-is-read-only-access-and-why-does-it-matter/</loc>
		<lastmod>2026-02-24T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/02/read-only-file-access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/02/why-hackers-go-after-universities-and-what-it-means-for-your-data/</loc>
		<lastmod>2026-02-27T11:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/02/universities-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/03/the-hidden-dangers-of-outdated-systems/</loc>
		<lastmod>2026-03-03T11:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/02/outdated-devices.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2025/04/how-mfa-fatigue-hurts-your-accounts/</loc>
		<lastmod>2026-02-25T21:26:42+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2025/03/push-notifcation-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/03/the-most-common-ways-workers-accidentally-put-data-at-risk/</loc>
		<lastmod>2026-03-06T11:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/03/workplace-data-risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/03/how-to-recognize-and-beat-ai-bias/</loc>
		<lastmod>2026-03-10T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/02/ai-bias-and-risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://makemecybersafe.com/2026/04/a-popular-tool-was-compromised-heres-why-that-matters-to-you/</loc>
		<lastmod>2026-04-17T11:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://makemecybersafe.com/wp-content/uploads/2026/04/microsoft-breach.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->