<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thecybersafetyguys.blog/podcasts/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/mbp.png</image:loc><image:title>mbp</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/been.png</image:loc><image:title>Been</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/cjc.png</image:loc><image:title>cjc</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/art-bowker-general.png</image:loc><image:title>Art Bowker - General</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/skirtdanger.png</image:loc><image:title>skirtdanger</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/liberty.png</image:loc><image:title>Liberty</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/truecrimereport.png</image:loc><image:title>truecrimereport</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/awaking.png</image:loc><image:title>Awaking</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/adviceadvocates.png</image:loc><image:title>AdviceAdvocates</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/06/totalcrime.png</image:loc><image:title>Totalcrime</image:title></image:image><lastmod>2025-06-03T00:13:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/2025/05/05/unseen-victims-how-your-photos-can-be-misused-online/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/05/unseen_victims_middle_age_whit-2.jpeg</image:loc><image:title>Unseen_Victims_middle_age_whit</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/05/unseen_victims_middle_age_whit-1.jpeg</image:loc><image:title>Unseen_Victims_middle_age_whit</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/05/unseen_victims_middle_age_whit.jpeg</image:loc><image:title>Unseen_Victims_middle_age_whit</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2025/05/screenshot-17.png</image:loc><image:title>Screenshot (17)</image:title></image:image><lastmod>2025-05-06T02:11:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/09/12/surviving-a-cyberattack-an-interview-with-coauthor-art-bowker/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/09/bitsandbytes.jpg</image:loc><image:title>BitsandBytes</image:title></image:image><lastmod>2024-09-13T02:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/09/10/our-new-book-is-listed-on-amazon-com/</loc><lastmod>2024-09-10T18:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/new-book-updates/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/08/book-cover-surviving-a-cyberattack.png</image:loc><image:title>Book Cover-Surviving a Cyberattack</image:title></image:image><lastmod>2024-09-10T18:31:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/our-books/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/surviving-a-cyberattack-v4.jpg</image:loc><image:title>Surviving a cyberattack v4</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/surviving-a-cyberattack-v3.jpg</image:loc><image:title>Surviving a cyberattack v3</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/le-tech-guide.jpg</image:loc><image:title>LE Tech Guide</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/handbook-on-crime-and-technology.jpg</image:loc><image:title>Handbook on Crime and technology</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/cybercrime-handbook-for-correction.jpg</image:loc><image:title>Cybercrime Handbook for Correction</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/surviving-a-cyberattack-v2.jpg</image:loc><image:title>Surviving a cyberattack v2</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/surviving-a-cyberattack.jpg</image:loc><image:title>Surviving a cyberattack</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/ai-surviving-a-cyberattack.png</image:loc><image:title>AI Surviving a Cyberattack</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/41kzd2k9fhl._sx342_sy445_.jpg</image:loc><image:title>41kZD2K9fhL._SX342_SY445_</image:title></image:image><lastmod>2024-09-10T18:29:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/press-kit/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/artbowker20184220-300ab8x10book.jpg</image:loc><image:title>ArtBowker20184220-300ab8x10Book</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/todd-g.-shipley-dark-intel.jpg</image:loc><image:title>Todd G. Shipley -Dark Intel</image:title></image:image><lastmod>2024-09-04T00:41:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/2024/08/17/cybersurvival-beyond-safety-overcoming-the-inevitable-threats-of-the-internet/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/08/cybersurvival_beyond_safety_ov.jpeg</image:loc><image:title>Cybersurvival_Beyond_Safety_Ov</image:title></image:image><lastmod>2024-08-27T02:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/07/25/detecting-elder-cyber-abuse-roles-of-financial-and-medical-professionals/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/mandatory_reporting_of_elder_c-1.jpeg</image:loc><image:title>Mandatory_Reporting_of_Elder_C (1)</image:title></image:image><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/mandatory_reporting_of_elder_c.jpeg</image:loc><image:title>Mandatory_Reporting_of_Elder_C</image:title></image:image><lastmod>2024-07-27T21:16:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/art-and-todd-upcoming-events/</loc><lastmod>2024-07-24T20:34:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/2024/07/21/family-online-protection-combining-laws-and-technology/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/artificial_intelligence_and_on.jpeg</image:loc><image:title>Artificial_Intelligence_and_on</image:title></image:image><lastmod>2024-07-21T23:54:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/07/14/att-data-breach-2024-lessons-for-cyber-survival/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/data_breach_computer_hack_shar.jpeg</image:loc><image:title>data_breach_computer_hack_shar</image:title></image:image><lastmod>2024-07-19T21:23:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/07/19/the-world-gets-shut-down/</loc><lastmod>2024-07-19T21:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/contact/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2018/02/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-18T00:08:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/our-stuff/</loc><lastmod>2024-07-17T23:52:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybersafetyguys.blog/2024/07/17/an-unsolicited-text-message-from-me/</loc><lastmod>2024-07-17T22:59:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2019/05/01/investigating-cybercrime-on-the-digital-front-lines/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2019/05/tmm_investigatingcybercrime_webeventimage.jpg</image:loc><image:title>TMM_InvestigatingCybercrime_WebEventImage</image:title></image:image><lastmod>2024-07-17T21:31:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/05/20/elderly-cyber-crime-victims/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/05/katarzyna-grabowska-srawqyouivq-unsplash-1.jpg</image:loc><image:title>katarzyna-grabowska-srawqyouivq-unsplash-1</image:title></image:image><lastmod>2024-07-17T21:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2024/07/10/beware-of-fake-profiles/</loc><image:image><image:loc>https://thecybersafetyguys.blog/wp-content/uploads/2024/07/fake_profile_hot_white_male_an.jpeg</image:loc><image:title>Fake_profile_hot_white_male_an</image:title></image:image><lastmod>2024-07-17T21:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog/2018/03/08/if-you-see-it-report-it/</loc><lastmod>2018-03-09T02:28:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybersafetyguys.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-06-03T00:13:28+00:00</lastmod></url></urlset>
