<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://suredefensestrategies.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://suredefensestrategies.com/be-alert-for-holiday-scams/</loc><lastmod>2022-03-23T19:42:23+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/cisa-shields-up-recommendations/</loc><lastmod>2026-03-03T21:01:16+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/6-ways-to-improve-ransomware-protection/</loc><lastmod>2026-03-03T21:01:17+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/phishing-backgrounder/</loc><lastmod>2026-03-03T21:01:17+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/setting-up-kali-in-wsl2-on-windows-11/</loc><lastmod>2026-03-03T21:01:17+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/5-tips-for-cybersecurity-awareness/</loc><lastmod>2026-03-03T21:01:18+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/6-tips-for-staying-safe-with-holiday-shopping-and-travel/</loc><lastmod>2026-03-03T21:01:18+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/4-steps-for-getting-started-with-risk-management-for-smbs/</loc><lastmod>2026-03-03T21:01:18+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/how-to-do-a-cybersecurity-self-assessment/</loc><lastmod>2026-03-03T21:01:19+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/so-youve-moved-to-the-cloud-now-what/</loc><lastmod>2026-03-03T21:01:19+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/basics-of-multi-factor-authentication/</loc><lastmod>2023-05-09T00:37:25+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/be-prepared-for-bad-things-to-happen/</loc><lastmod>2023-06-21T20:49:32+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/protecting-your-home-and-business-with-dns-filtering/</loc><lastmod>2023-07-17T18:21:44+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/keeping-the-lights-on-and-the-packets-flowing/</loc><lastmod>2024-05-30T15:45:17+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/do-i-really-need-to-do-a-cybersecurity-risk-assessment/</loc><lastmod>2024-05-30T15:44:17+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/diy-cyber-risk-assessment/</loc><lastmod>2024-06-17T16:38:10+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/canopy-us-for-child-protection/</loc><lastmod>2024-06-30T23:27:13+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/non-profits-the-cybersecurity-problem/</loc><lastmod>2024-07-25T20:14:28+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/youre-collecting-more-data-than-you-realize-thats-a-problem/</loc><lastmod>2026-03-05T16:53:58+00:00</lastmod></url><url><loc>https://suredefensestrategies.com/five-security-questions-to-ask-before-you-sign-any-software-or-support-contract/</loc><lastmod>2026-03-10T13:30:32+00:00</lastmod></url></urlset>
