<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://easycyber.net/2025/12/27/a-friendly-introduction-to-the-basics-of-ai/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T13:44:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/26/post-3-good-cybersecurity-practices-for-everyday-users/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/pexels-divinetechygirl-1181317.jpg</image:loc><image:title>pexels-divinetechygirl-1181317</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T11:26:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/26/reading-list-1-social-engineering-for-beginners/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T11:01:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/26/post-2-understanding-artificial-intelligence-ai-for-non-experts/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T11:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/26/post-4-real-life-cybercrime-organised-crime-global-scandal-10-essential-reads/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/create-a-highly-detailed-sharp-focused-featured-image-for-a-blog.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T10:59:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/26/post-5-geopolitics-global-finance-5-accessible-insightful-reads/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/pexels-photo-2691663.jpeg</image:loc><image:title>black and brown desk globe close up photography</image:title><image:caption>Photo by Anthony Acosta on &lt;a href="https://www.pexels.com/photo/black-and-brown-desk-globe-close-up-photography-2691663/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T10:59:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/27/post-1-films-that-bring-cybersecurity-crime-geopolitics-to-life/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T10:57:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/27/post-2-tv-shows-series-exploring-cybersecurity-crime-global-risk/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T10:56:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2025/12/27/documentaries-that-reveal-the-real-stories-behind-cybercrime-ai-global-power/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2025/12/image-7.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-27T10:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/about/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/img_0422.jpg</image:loc><image:title>img_0422</image:title></image:image><lastmod>2025-12-26T15:33:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://easycyber.net/2018/09/13/social-engineering-and-human-nature/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0384.jpg</image:loc><image:title>img_0384</image:title></image:image><lastmod>2022-02-11T17:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2020/08/04/bite-size-cyber-1-patching/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2020/08/194ff075-3f86-4b3a-b8fb-387978bf40e4.png</image:loc><image:title>194FF075-3F86-4B3A-B8FB-387978BF40E4</image:title></image:image><lastmod>2021-07-01T19:31:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2020/03/29/good-social-media-hygiene/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2020/03/social-media-keyboard.jpg</image:loc><image:title>social-media-keyboard</image:title></image:image><lastmod>2020-03-29T13:30:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2020/03/14/working-from-home-during-the-pandemic-a-simple-guide-for-companies-and-individuals-alike/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2020/03/wfh.jpg</image:loc><image:title>WFH</image:title></image:image><lastmod>2020-03-14T14:50:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2019/08/19/shadow-it/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2019/08/img_2151.png</image:loc><image:title>img_2151</image:title></image:image><lastmod>2019-08-13T18:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2019/08/12/careers-in-cyber/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/11/img_2120.png</image:loc><image:title>IMG_2120</image:title></image:image><lastmod>2019-08-12T08:06:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2019/08/07/the-great-hack/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2019/08/great-hack.jpg</image:loc><image:title>Great Hack</image:title></image:image><lastmod>2019-08-07T09:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2019/05/02/world-password-day/</loc><lastmod>2023-10-29T20:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2019/01/03/ciphers-and-codes-oh-my/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2019/01/IMG_0848.jpg</image:loc><image:title>IMG_0848</image:title></image:image><lastmod>2019-01-03T13:35:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/12/27/a-new-approach-for-2019/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/12/Accentuate-the-Positive.jpg</image:loc><image:title>Accentuate the Positive</image:title></image:image><lastmod>2019-11-15T21:02:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/02/28/e-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0527.jpg</image:loc><image:title>img_0527</image:title></image:image><lastmod>2018-12-17T19:54:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/12/18/z-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0548.jpg</image:loc><image:title>img_0548</image:title></image:image><lastmod>2018-12-17T19:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/12/08/big-data/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/12/img_0694.jpg</image:loc><image:title>img_0694</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/12/img_0692.jpg</image:loc><image:title>img_0692</image:title></image:image><lastmod>2018-12-08T18:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/12/06/y-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0547.jpg</image:loc><image:title>img_0547</image:title></image:image><lastmod>2018-12-06T21:14:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/11/20/x-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0546.jpg</image:loc><image:title>img_0546</image:title></image:image><lastmod>2018-11-20T20:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/11/06/w-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0545.jpg</image:loc><image:title>img_0545</image:title></image:image><lastmod>2018-11-03T11:15:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/11/03/unhelpful-media-headlines/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/11/oops.jpg</image:loc><image:title>Oops</image:title></image:image><lastmod>2018-11-03T11:02:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/10/23/v-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0544.jpg</image:loc><image:title>img_0544</image:title></image:image><lastmod>2018-10-20T21:01:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/jargon-explained/</loc><lastmod>2018-09-29T14:47:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://easycyber.net/2018/10/09/u-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0543.jpg</image:loc><image:title>img_0543</image:title></image:image><lastmod>2018-09-29T14:45:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/09/25/t-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0542.jpg</image:loc><image:title>img_0542</image:title></image:image><lastmod>2018-09-23T13:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/09/18/cyber-viewing/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/films.jpg</image:loc><image:title>Films</image:title></image:image><lastmod>2018-09-18T19:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/01/01/a-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0523.jpg</image:loc><image:title>img_0523</image:title></image:image><lastmod>2018-09-10T20:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/01/16/b-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0524.jpg</image:loc><image:title>img_0524</image:title></image:image><lastmod>2018-09-10T20:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/09/11/s-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0541.jpg</image:loc><image:title>img_0541</image:title></image:image><lastmod>2018-09-10T20:16:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/08/07/p-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/08/img_0538.jpg</image:loc><image:title>img_0538</image:title></image:image><lastmod>2018-09-10T19:35:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/09/05/are-you-ready-to-be-hacked/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/04/data-breach.jpg</image:loc><image:title>Data Breach</image:title></image:image><lastmod>2018-09-01T20:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/09/03/r-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/09/img_0540.jpg</image:loc><image:title>img_0540</image:title></image:image><lastmod>2018-09-01T19:43:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/07/29/o-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/07/img_0537.jpg</image:loc><image:title>img_0537</image:title></image:image><lastmod>2018-09-01T19:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/08/20/gatwick-continuity-planning/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/08/img_0607.jpg</image:loc><image:title>img_0607</image:title></image:image><lastmod>2018-08-20T19:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/08/16/q-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/08/img_0539.jpg</image:loc><image:title>img_0539</image:title></image:image><lastmod>2018-08-16T20:27:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/08/10/us-names-arrested-fin7-cyber-gang-suspects/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/08/img_0601.jpg</image:loc><image:title>img_0601</image:title></image:image><lastmod>2018-08-10T12:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/08/08/town-dusts-off-typewriters-after-cyber-attack/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/08/img_0600.jpg</image:loc><image:title>img_0600</image:title></image:image><lastmod>2018-08-08T11:45:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/07/28/n-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/07/img_0536.jpg</image:loc><image:title>img_0536</image:title></image:image><lastmod>2018-07-28T08:40:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/06/20/m-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/06/img_0535.jpg</image:loc><image:title>img_0535</image:title></image:image><lastmod>2018-06-20T22:04:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/06/05/l-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/06/img_0534.jpg</image:loc><image:title>img_0534</image:title></image:image><lastmod>2018-06-05T21:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/05/25/alexa-can-you-eavesdrop-on-us-please/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/05/img_0582.jpg</image:loc><image:title>img_0582</image:title></image:image><lastmod>2018-05-25T21:29:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/05/22/k-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/05/img_0533.jpg</image:loc><image:title>img_0533</image:title></image:image><lastmod>2018-05-22T17:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/05/15/connected-at-home-whats-the-problem/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/05/img_0070.jpg</image:loc><image:title>img_0070</image:title></image:image><lastmod>2018-05-15T20:57:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/05/12/presentations-an-update/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/05/img_0045.jpg</image:loc><image:title>img_0045</image:title></image:image><lastmod>2018-05-12T18:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/05/05/presenting-presentations/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/05/img_0577.jpg</image:loc><image:title>img_0577</image:title></image:image><lastmod>2018-05-05T20:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/05/08/j-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_0532.jpg</image:loc><image:title>img_0532</image:title></image:image><lastmod>2018-05-05T19:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/04/24/i-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_0531.jpg</image:loc><image:title>img_0531</image:title></image:image><lastmod>2018-04-24T04:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/01/30/c-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/01/img_0555.jpg</image:loc><image:title>img_0555</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0525.jpg</image:loc><image:title>img_0525</image:title></image:image><lastmod>2018-04-24T04:44:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/04/10/h-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_0530.jpg</image:loc><image:title>img_0530</image:title></image:image><lastmod>2018-04-10T08:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/04/12/its-just-a-like/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/04/img_2531.jpg</image:loc><image:title>img_2531</image:title></image:image><lastmod>2018-04-10T08:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/04/09/how-did-cambridge-analytica-do-what-they-did/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/04/img_2497.jpg</image:loc><image:title>img_2497</image:title></image:image><lastmod>2018-04-09T11:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/03/27/g-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0529.jpg</image:loc><image:title>img_0529</image:title></image:image><lastmod>2018-03-27T08:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/03/23/cambridge-analytica-who-knew/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_2497.jpg</image:loc><image:title>img_2497</image:title></image:image><lastmod>2018-03-23T08:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/03/16/do-you-have-privacy-fatigue/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_0564.jpg</image:loc><image:title>img_0564</image:title></image:image><lastmod>2018-03-16T07:52:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/03/13/f-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_0562-1.jpg</image:loc><image:title>img_0562-1</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2018/03/img_0562.jpg</image:loc><image:title>img_0562</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0528.jpg</image:loc><image:title>img_0528</image:title></image:image><lastmod>2018-03-13T15:17:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2018/02/13/d-is-for/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0526.jpg</image:loc><image:title>img_0526</image:title></image:image><lastmod>2018-02-24T21:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/11/05/ddos-whats-that/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/11/img_0299.jpg</image:loc><image:title>img_0299</image:title></image:image><lastmod>2018-02-12T19:06:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/12/30/tubes/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0549.jpg</image:loc><image:title>img_0549</image:title></image:image><lastmod>2017-12-30T10:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/05/my-first-podcast/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_0422-1.jpg</image:loc><image:title>img_0422-1</image:title></image:image><lastmod>2017-12-30T10:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/12/07/vehicle-security/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0514.jpg</image:loc><image:title>img_0514</image:title></image:image><lastmod>2017-12-07T17:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/12/04/should-we-be-worried-about-our-mps-security-awareness/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/12/img_0513.jpg</image:loc><image:title>img_0513</image:title></image:image><lastmod>2017-12-04T08:17:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/11/10/business-continuity-2/</loc><lastmod>2017-11-10T21:34:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/09/18/its-a-scary-cyber-world-or-is-it/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/09/img_0490.jpg</image:loc><image:title>img_0490</image:title></image:image><lastmod>2017-09-18T19:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/08/09/10-steps-to-cyber-security-part-2-of-2/</loc><lastmod>2017-08-09T16:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/08/08/episode-4-passwords/</loc><lastmod>2017-08-08T18:45:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/08/01/10-steps-to-cyber-security-part-1-of-2/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/08/img_0470.png</image:loc><image:title>img_0470</image:title></image:image><lastmod>2017-08-08T17:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/07/03/getting-started-in-cyber/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/07/img_0458.jpg</image:loc><image:title>img_0458</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/07/img_0456.jpg</image:loc><image:title>img_0456</image:title></image:image><lastmod>2017-07-03T20:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/07/03/how-does-your-security-measure-up/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/07/img_0455-1.jpg</image:loc><image:title>img_0455-1</image:title></image:image><lastmod>2017-07-03T17:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/06/21/good-exam-technique-explained/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/06/img_0451.jpg</image:loc><image:title>img_0451</image:title></image:image><lastmod>2017-06-21T14:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/06/10/i-told-you-so/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/06/img_0448.jpg</image:loc><image:title>img_0448</image:title></image:image><lastmod>2017-06-10T15:48:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/06/01/things-you-do-on-social-media-which-you-shouldnt/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/06/img_1303.jpg</image:loc><image:title>img_1303</image:title></image:image><lastmod>2017-06-01T22:03:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/17/podcast-now-available-for-free-in-itunes/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_1329.png</image:loc><image:title>img_1329</image:title></image:image><lastmod>2017-05-17T07:35:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/16/lesson-to-be-learned-from-wannacry-friday/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_0440.jpg</image:loc><image:title>img_0440</image:title></image:image><lastmod>2017-05-16T16:39:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/14/what-next-after-fridays-ransomware-attacks/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_0439.jpg</image:loc><image:title>img_0439</image:title></image:image><lastmod>2017-05-14T19:40:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/13/global-cyber-attack-the-podcast/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_13221.jpg</image:loc><image:title>METROGRAB: 74 countries affected</image:title><image:caption>METROGRAB:74 countries affected&#13;Hackers unleash global cyber carnage with tens of thousands of computers in 74 countries crippled in same attack that has hit the NHS&#13;NHS hit by a major cyber attack and criminals have taken control of computers&#13;Some medics claimed messages are flashing up saying they must pay cash&#13;One message claims the hackers want 300 US dollars in cyber currency Bitcoins&#13;Victims have been reported in 74 countries including Germany and Spain&#13;Photo credit: @Sever_i/ Twitter&#13;https://twitter.com/Sever_i/status/863112719276355584/photo/1</image:caption></image:image><lastmod>2017-05-13T14:35:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/13/global-cyber-attack/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_1322.jpg</image:loc><image:title>METROGRAB: 74 countries affected</image:title><image:caption>METROGRAB:74 countries affected&#13;Hackers unleash global cyber carnage with tens of thousands of computers in 74 countries crippled in same attack that has hit the NHS&#13;NHS hit by a major cyber attack and criminals have taken control of computers&#13;Some medics claimed messages are flashing up saying they must pay cash&#13;One message claims the hackers want 300 US dollars in cyber currency Bitcoins&#13;Victims have been reported in 74 countries including Germany and Spain&#13;Photo credit: @Sever_i/ Twitter&#13;https://twitter.com/Sever_i/status/863112719276355584/photo/1</image:caption></image:image><lastmod>2017-05-13T08:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/12/episode-3-the-cloud/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_0236.png</image:loc><image:title>img_0236</image:title></image:image><lastmod>2017-05-10T08:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/08/episode-2-who-are-the-bad-guys/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_0325-1.jpg</image:loc><image:title>img_0325-1</image:title></image:image><lastmod>2017-05-08T20:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/05/03/to-certify-or-not/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/05/img_0421.jpg</image:loc><image:title>img_0421</image:title></image:image><lastmod>2017-05-05T21:01:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/04/30/cyber-security-is-doomed/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/04/img_0418.png</image:loc><image:title>img_0418</image:title></image:image><lastmod>2017-04-30T15:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/04/25/who-should-the-ciso-report-to/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/04/img_0416.jpg</image:loc><image:title>img_0416</image:title></image:image><lastmod>2017-04-25T19:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/04/05/shiny-kit-isnt-always-what-you-need/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/04/img_0405.jpg</image:loc><image:title>img_0405</image:title></image:image><lastmod>2017-04-05T10:23:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/03/22/signing-your-life-away/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/03/img_0387.jpg</image:loc><image:title>img_0387</image:title></image:image><lastmod>2017-03-22T19:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/03/11/choosing-your-certification/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/03/img_0383.jpg</image:loc><image:title>img_0383</image:title></image:image><lastmod>2017-03-11T08:02:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/02/28/nuts-about-security-read-on/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/02/img_0380.jpg</image:loc><image:title>img_0380</image:title></image:image><lastmod>2017-02-28T19:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/02/21/encryption/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/02/img_0378.jpg</image:loc><image:title>img_0378</image:title></image:image><lastmod>2017-02-21T22:22:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/02/14/cyber-essentials-and-iso-27001-explained/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/02/img_0373.jpg</image:loc><image:title>img_0373</image:title></image:image><lastmod>2017-02-14T22:16:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/17/email-safety/</loc><lastmod>2017-01-17T20:53:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/15/top-10-passwords-of-2016-revealed/</loc><lastmod>2017-01-23T22:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/13/who-are-the-bad-guys/</loc><lastmod>2017-01-13T12:40:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/23/addressing-the-security-skills-gap/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2017/01/img_0332.jpg</image:loc><image:title>img_0332</image:title></image:image><lastmod>2017-01-12T17:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/18/a-question-of-privilege/</loc><lastmod>2017-01-12T17:06:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/12/preparing-for-gdpr/</loc><lastmod>2017-01-12T17:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/12/spam-a-lighthearted-look/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/image4.jpeg</image:loc><image:title>image</image:title></image:image><lastmod>2017-01-12T16:52:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/07/what-exactly-is-cyber/</loc><lastmod>2017-01-07T11:56:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2017/01/01/exciting-news/</loc><lastmod>2017-01-01T21:04:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/11/30/changes-to-data-protection-laws/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/11/img_0308.png</image:loc><image:title>img_0308</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/11/img_0307.png</image:loc><image:title>img_0307</image:title></image:image><lastmod>2016-11-30T07:17:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/09/20/passwords-again/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/09/image.jpeg</image:loc><image:title>image</image:title></image:image><lastmod>2016-09-20T19:39:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/07/30/whats-the-deal-with-passwords/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/07/image1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/07/image1.jpeg</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2016-07-30T17:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/07/28/password-hygiene/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/07/image.jpeg</image:loc><image:title>image</image:title></image:image><lastmod>2025-04-01T09:03:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/12/phishing-and-whaling/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/phishing.jpg</image:loc><image:title>Phishing</image:title></image:image><lastmod>2016-05-12T21:45:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/05/virus-attacks-and-what-can-be-done-about-them/</loc><lastmod>2016-05-05T16:25:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/03/if-you-cant-explain-it-to/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/image2.jpeg</image:loc><image:title>image</image:title></image:image><lastmod>2016-05-04T13:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/03/what-are-backups-and-when-why-are-they-needed/</loc><lastmod>2016-05-04T13:22:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/03/patching-whats-all-the-fuss-about/</loc><lastmod>2016-05-04T13:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/04/certified-ethical-hacker/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-12-20T11:46:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/03/certified-information-systems-security-professional/</loc><lastmod>2016-05-04T11:47:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/04/certified-information-security-manager/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/image5.jpeg</image:loc><image:title>image</image:title></image:image><lastmod>2016-05-04T11:41:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/04/the-cloud-vapourware-made-real/</loc><image:image><image:loc>https://easycyber.net/wp-content/uploads/2016/05/image3.jpeg</image:loc><image:title>image</image:title></image:image><lastmod>2016-05-05T14:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/03/the-code-book/</loc><lastmod>2016-05-03T21:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net/2016/05/03/ghost-in-the-wires/</loc><lastmod>2016-05-03T21:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://easycyber.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-12-27T13:44:23+00:00</lastmod></url></urlset>
