<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://howtocyber.blog/2020/11/14/anti-vendor-cybersecurity/</loc><lastmod>2021-04-07T11:34:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2021/03/03/what-data-tells-us-about-cyber-security-breaches-part-1/</loc><lastmod>2021-03-03T12:05:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2021/02/17/what-is-your-problem/</loc><lastmod>2021-02-17T19:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2021/02/05/why-use-a-virtual-security-leader/</loc><lastmod>2021-02-11T09:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2020/12/07/how-to-boss-the-security-questionnaire/</loc><lastmod>2020-12-13T13:22:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/contact/</loc><image:image><image:loc>https://howtocyber.blog/wp-content/uploads/2019/06/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2020-05-19T23:18:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://howtocyber.blog/2020/01/31/why-the-coronavirus-is-like-cyber-security/</loc><lastmod>2020-05-19T23:15:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2020/05/19/coronavirus-and-cybersecurity-threats-two-peas-in-a-pod-part-two/</loc><lastmod>2020-05-19T23:14:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2019/06/08/your-mssp-is-ripping-you-off-what-to-do-about-it/</loc><lastmod>2020-05-15T11:19:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2019/12/29/why-ive-disabled-multi-factor-authentication-for-my-password-manager/</loc><lastmod>2019-12-29T09:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2019/11/17/is-fear-driving-cyber-security-into-failure-%ef%bb%bf/</loc><lastmod>2019-11-17T13:55:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2019/07/07/screw-the-tech/</loc><lastmod>2019-07-17T19:24:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog/2019/07/11/cyber-insurance-to-take-or-not-to-take/</loc><lastmod>2019-07-17T19:06:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://howtocyber.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2021-04-07T11:34:22+00:00</lastmod></url></urlset>
