<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://logicalcybersecurity.com/phishing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1492222559661-1HRECT1WCHN7S07MDOMU/luis-llerena-14779.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2019/12/19/malicious-email-using-current-events-to-push-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1576801583470-3JIFOYNNMT0MWZMD69YV/greta-spam-email.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email using current events to push malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1576801742110-UNK4CM1ZS9O6LHGRU8FO/greta-spam-email2.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email using current events to push malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2018/8/1/malicious-dhl-shipment-email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1533168757391-5XARID3CSKU6KDYQSSWV/dhl_phish.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious DHL shipment email</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2018/7/24/malicious-email-with-a-resume-attached</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1532478431142-ZDSJHMG17SUGX9PRDWJX/phishing_resume1.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email with a resume attached</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1532478494565-GBAUQMEDB9HMTQYYHLDO/phishing_resume2.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email with a resume attached</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1532478604136-8E8Q75ULDET5KKSZS206/phishing_resume3.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email with a resume attached</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1532478788809-L2CYFFFCG8K287V6ZUR8/phishing_resume4.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email with a resume attached</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2018/4/13/malicious-email-appearing-to-be-from-legitimate-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1523660814159-SRZGV74DDJ7QRAGF4UYD/fake_phone_bill.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email appearing to be from legitimate company</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1523660868641-DYDDKS01CASBZQKM3IOC/fake_phone_bill2.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email appearing to be from legitimate company</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1523661127468-LDZMR4TFNI0QHUSMVB0X/rans_tutorial_3+%281%29.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious email appearing to be from legitimate company</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2018/4/3/user-infected-with-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522802093295-TOORAC4HXUWFD2EWV2CO/rans_tutorial_1.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522802187368-MRJU47H9QP3OXTKB166L/rans_tutorial_2.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522802243134-BOBUKTFR92XFV8KGK1NA/rans_tutorial_3.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522802320888-PI0S7YPTH7KISY22WIHO/rans_tutorial_4.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522802340070-3VGZCDL4C1SEA4BWM2Q1/rans_tutorial_5.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - User infected with ransomware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/9/10/fake-faxes-voicemails-and-invoices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1505073518170-XOBPJ3MGJ9DHKXCPPDH5/fax_phish4.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake faxes, voicemails and invoices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1505073696124-IJ7REC313CF5FFL4I9RB/fax_phish3_1.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake faxes, voicemails and invoices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1505073763853-34FFGFENWPM9HEBWEYMT/fax_phish2_1.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake faxes, voicemails and invoices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1505073806287-QI9PRE8ZIIF5HEHF5H90/fax_phish.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake faxes, voicemails and invoices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/8/18/phishing-email-warning-signs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1503088319828-LALOJJKDUMMHL7L6F5IN/phishing_attempt.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Phishing email warning signs</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/6/11/emails-with-links-to-fakemalicious-online-documents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1497206037672-2CR4TCP1VSY6UW7Q3S2V/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Emails with links to fake/malicious online documents</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1503071039519-T1V4OKAKT7TSMYOHPNM2/fakedocumentphish.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Emails with links to fake/malicious online documents</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/6/11/malicious-copier-or-scan-documents-in-email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1502143115477-WIV59CBJTJG7DNRRSNOM/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious copier or scan documents in email</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1497204293299-9JUR8ITZER74ZHOLAWOE/The+email+with+the+attachment.++It+would+be+from+your+email+domain+such+as+yourname%40yourcompany.com.</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious copier or scan documents in email</image:title>
      <image:caption>The email with the attachment.  It would be from your email domain such as yourname@yourcompany.com.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1497204356998-0MXVCDV40R0D8SQATHZV/When+opening+the+attachment%2C+it+asks+you+to+open+an+additional+docm+document</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious copier or scan documents in email</image:title>
      <image:caption>When opening the attachment, it asks you to open an additional docm document</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1497204394702-6D3GO8LRUP6AWOQXL95C/Opening+the+docm+document+asks+you+to+enable+macros%2C+which+we+know+is+a+warning+sign</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Malicious copier or scan documents in email</image:title>
      <image:caption>Opening the docm document asks you to enable macros, which we know is a warning sign</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/5/3/scareware-tech-support-scam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1504973514622-6I7XS42BJR3F1WMDZXWW/tech_support_scam13_1.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1493861737530-BB5TU37R5W7C1VXW7DX1/scareware_example_1</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1493861849116-408OL2G7ZED6BSE7DKAJ/scareware_example_2</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1493861894644-SH2RLCCIQXZT6DGITCQ7/scareware_example_3</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1493861925122-RSEN6GH2HQ0XCZ1GPK5V/scareware_example_4</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1493861953901-9NF3AL6NUQ5BVC91O8U3/scareware_example_5</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1496179234971-ETBUMQ5ETWTCRCKQ5TYM/tech_support_scam.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1504973789296-NFYCYKRKRMN488ZP46KD/tech_support_scam_3_1.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1496179352528-36R1GYPVUCAOJ6Z4NVZP/tech_support_scam_5.JPG</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1497202690741-U8VUK9KFMUEBY8LWN795/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1498092639773-4LBG4F08MGJI5FUV3518/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1504990646638-VG1EC9HPNZ7K4GR3ZV2P/tech_support_scam_6_1.jpg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Scareware:  Fake tech support scams</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/5/30/fake-shipment-email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1496179619038-RMSONH7BPA6VV7JY8TLJ/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake shipment emails (FedEx, UPS, DHL, Amazon, etc.)</image:title>
      <image:caption>The phishing email</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1496179666844-Y04TF0AEHP762G2KE4K1/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake shipment emails (FedEx, UPS, DHL, Amazon, etc.)</image:title>
      <image:caption>Notice when navigating to the link in the email it is asking you to download a zip file.  You should never have to download a zip file to track your package.  In this case, I would click "Cancel".</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1502463520479-I3YFQ884QB4NJCSWY2EX/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake shipment emails (FedEx, UPS, DHL, Amazon, etc.)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1502464092141-7C7Q9YD1IQG034TB8VEN/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Fake shipment emails (FedEx, UPS, DHL, Amazon, etc.)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/2017/5/6/protected-views-and-security-warnings-equal-danger</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1494079063714-JFXJRTQQUPRO4697UZ12/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Protected Views and Security Warnings equal danger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1494079092032-87SN5Q80926G780TWBJR/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Protected Views and Security Warnings equal danger</image:title>
      <image:caption>iN THIS EXAMPLE, DO NOT CLICK "eNABLE CONTENT".  IF YOU CLICK "ENABLE CONTENT", MALWARE WILL BE INSTALLED IN THE BACKGROUND.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1496180593316-PN0F8X5JG0JF6JU8ZSPZ/image-asset.jpeg</image:loc>
      <image:title>Real World Examples of Scams and Phishing Emails - Protected Views and Security Warnings equal danger</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/phishing/tag/phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-05-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1582336475585-ATRUC0ZBJIRGRGOW3ZJ2/ian-schneider-TamMbr4okv4-unsplash.jpg</image:loc>
      <image:title>Information Security Best Practices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/2019/5/24/cis-controls-hardware-asset-list</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-25</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/2019/4/23/cis-controls-software-asset-list</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-25</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/2017/5/14/everyone-must-work-together</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/2017/5/13/test-retest-re-retest-and-then-prove-it-works</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-02</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/2017/5/9/stop-saying-no-help-the-business-meet-requirements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/work+together</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/infosec+testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/CIS+Security+Controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/CIS+Controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/software+inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/infosec+career</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/software+asset+list</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/security+testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/teamwork</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/CIS+Top+20</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/Hardware+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/bestpractices/tag/Hardware+Asset+List</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1492298207094-6NMCLL3JXMXOG4JUYZT2/tim-gouw-60216.jpg</image:loc>
      <image:title>Beginner's Guide to Privacy and Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2019/12/19/phishing-scenario-malicious-email-using-current-events-to-push-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1576803874492-1D60NY4TYMYZBGMF083O/greta-spam-email.jpg</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: Malicious email using current events to push malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1576803970198-9OYSPKEUQ03DSZSTG2OB/greta-spam-email2.jpg</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: Malicious email using current events to push malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2018/10/28/providing-a-birthday-in-apps-and-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-07</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2018/4/2/phishing-scenario-user-infected-with-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522715145661-BA7Q40B98E8G835PJIEA/rans_tutorial_1.JPG</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522715282364-WHSH1BF4W07AOOVIP0C1/rans_tutorial_2.JPG</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522715531482-OSBR2TMPVX18YX8JPGVC/rans_tutorial_3.JPG</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522715594807-AUTR81DPCA9XTBUHX40F/rans_tutorial_4.JPG</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: User infected with ransomware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522715612291-UVRHB4RVJCB7LAIQUEML/rans_tutorial_5.JPG</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Phishing Scenario: User infected with ransomware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/6/21/spelling-of-a-website-is-extremely-important</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-03</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/8/11/determine-if-your-email-address-or-password-has-ever-been-hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1502505493973-KA5N9YLJSIX0R61HSUHM/image-asset.jpeg</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Determine if your email address or password has ever been hacked</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1502505585875-T233QDWZ3YMO715367NA/image-asset.jpeg</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Determine if your email address or password has ever been hacked</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/5/24/what-if-my-email-is-hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/23/safe-internet-habits-practice-safe-searching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-03</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/5/30/lost-stolen-compromised-device</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/5/8/macs-ipads-and-iphones-are-not-invincible</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/5/7/social-media-scenario-surveys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-07</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/5/6/fake-adobe-updates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1494084166766-ODJCLVMKFAHN1OAMQAKR/fake_flash_player_update</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Fake Software updates</image:title>
      <image:caption>Fake Flash Player update.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1494084215307-2RZDAV407EBRDCU71AQV/flash_update</image:loc>
      <image:title>Beginner's Guide to Privacy and Security - Fake Software updates</image:title>
      <image:caption>Authentic Flash update</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/26/social-media-scenario-facebook-for-sale-group</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/20/updates-and-patches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/18/what-should-i-look-for-when-buying-a-new-computer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/18/how-to-speed-up-an-old-computer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/18/a-valuable-and-free-tool-at-your-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-28</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/18/cntsp227g3j1d0687rqd6l7gumlm2s</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/17/only-download-apps-from-vendors-app-stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/17/social-media-scenarios</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/15/social-media-securityprivacy-tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/2017/4/15/beware-of-trends-and-current-events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-03</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/category/Scenarios</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/basics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/antivirus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/linkedin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/scenarios</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/instagram</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/updates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/internet+habits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/apple</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/twitter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/downloads</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/permissions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/lost</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/virustotal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/social+media</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/popular</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/trends</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/birth+date</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/personal+information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/patches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/business+owner</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/app+store</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/stolen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/current+events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/computer+shopping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/search+words</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/basics/tag/applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1546991990725-8Q26HXSKLP8GFHNLEDEL/photo-1515043954746-8052f63735f5.jpg</image:loc>
      <image:title>Product Reviews</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/2019/2/28/micro-centers-powerspec-pre-built-computers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1551388317619-0GIA4NSUXXOV9RE72XNH/B241</image:loc>
      <image:title>Product Reviews - Micro Center's PowerSpec Pre-built Computers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1551388348455-79XCXTL46XHXOWJWJ5O7/B501</image:loc>
      <image:title>Product Reviews - Micro Center's PowerSpec Pre-built Computers</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/2018/3/10/cord-cutting-and-ps-vue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-07</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/2018/11/4/roku-vs-amazon-fire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-07</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/2017/7/23/sonos-app-and-play1-speakers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/2017/5/21/corsair-gaming-k55-backlit-keyboard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/2017/4/20/acer-chromebooks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Roku</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/gaming+keyboard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/cord+cutters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/K55</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/PS+Vue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Micro+Center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Sling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/G501</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Acer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/PowerSpec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Amazon+Fire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/B241</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/cord+cutting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/cord+cutter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Corsair</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/cutting+the+cord</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/reviews/tag/Chromebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-05-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1582385219677-5GBD1C0CD0RXCE4LL498/P9070050.JPG</image:loc>
      <image:title>Career Advice for IT, compliance, and risk management</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/2019/5/25/interview-questions-to-ask-infosec-candidates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-28</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/2019/5/25/questions-to-ask-during-your-interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-25</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/2018/1/4/podcasts-are-a-time-saver</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1515114148391-C3WQV8UMSW1G4VY6FRME/security_podcasts.jpg</image:loc>
      <image:title>Career Advice for IT, compliance, and risk management - Podcasts are a time saver and great way to learn</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/2017/5/15/what-not-to-do-in-a-job-interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/2017/5/14/you-must-be-curious-by-nature</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/2017/4/30/like-onions-infosec-has-many-layers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-20</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/compliance+interview+questions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/security+interview+questions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/ability+to+learn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/infosec+career</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/compliance+podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/job+interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/security+interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/curious</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/security+podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/curiosity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/infosec+interview+questions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/compliance+interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/information+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/infosec+podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/Interview+Questions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/learning+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/privacy+podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/podcasts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/security+job+interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/learning+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/career-advice/tag/infosec+interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/security-101</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1522718730079-UWJ23323V556SDEA6JYN/john-towner-126924-unsplash.jpg</image:loc>
      <image:title>Security 101</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/security-101/2018/4/16/passwords-writing-down-valid-data-to-look-random</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-16</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/security-101/2018/4/16/enable-and-require-a-login-to-your-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-16</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/security-101/2018/4/4/password-managers-possibly-the-best-security-advice-we-could-give</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-05</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/security-101/2018/4/3/multi-factor-2-step-2-factor-authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-04</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/security-101/2018/4/3/finding-the-balance-security-versus-convenience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-05</lastmod>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/404-error</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1545348232116-O380ZZNPWYQVPCVMKLFZ/jeremy-bishop-211453-unsplash.jpg</image:loc>
      <image:title>404 Error</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1582332189214-G16DSA5YF9GBCMXZ2SDY/jeremy-thomas-FO7bKvgETgQ-unsplash.jpg</image:loc>
      <image:title>How We Got Here</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2020-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1582332283293-UPAWKW0VYFKG6TI70SFX/loic-leray-goiRbX3hu4w-unsplash.jpg</image:loc>
      <image:title>Finding the Balance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://logicalcybersecurity.com/contactus</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58ec183c1b631b84dcfdb099/1493083303817-BWPOWD8C1IA119SI9Z6M/jerry-kiesewetter-179264.jpg</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
</urlset>

