<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://geniewish.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://geniewish.com/are-your-social-media-profiles-secure/</loc><lastmod>2025-01-28T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/is-it-a-crock-to-call-crypto-cash/</loc><lastmod>2025-01-24T06:00:07-05:00</lastmod></url><url><loc>https://geniewish.com/state-of-the-u-s-tiktok-ban/</loc><lastmod>2025-01-21T06:00:12-05:00</lastmod></url><url><loc>https://geniewish.com/job-seekers-and-recruiters-protect-yourself-from-cybercrime/</loc><lastmod>2025-01-17T06:00:37-05:00</lastmod></url><url><loc>https://geniewish.com/how-ai-will-impact-cybersecurity-in-2025/</loc><lastmod>2025-01-14T06:00:57-05:00</lastmod></url><url><loc>https://geniewish.com/why-is-email-such-a-common-method-of-cyber-attack/</loc><lastmod>2025-01-10T06:00:12-05:00</lastmod></url><url><loc>https://geniewish.com/best-practices-to-protect-phi-and-why-everyone-should-know-how/</loc><lastmod>2025-01-07T06:00:44-05:00</lastmod></url><url><loc>https://geniewish.com/cyber-threats-to-watch-out-for-in-2025/</loc><lastmod>2025-01-03T06:00:32-05:00</lastmod></url><url><loc>https://geniewish.com/what-to-do-if-your-system-is-infected/</loc><lastmod>2024-12-31T06:00:23-05:00</lastmod></url><url><loc>https://geniewish.com/access-levels-and-security-clearance/</loc><lastmod>2024-12-27T06:00:38-05:00</lastmod></url><url><loc>https://geniewish.com/is-there-a-hacker-in-your-smartphone/</loc><lastmod>2025-02-23T13:54:44-05:00</lastmod></url><url><loc>https://geniewish.com/u-s-executive-order-on-a-i-the-environment-and-cybersecurity/</loc><lastmod>2025-02-23T13:54:37-05:00</lastmod></url><url><loc>https://geniewish.com/bring-your-own-device-means-bringing-extra-security/</loc><lastmod>2025-02-23T13:54:04-05:00</lastmod></url><url><loc>https://geniewish.com/met-your-valentine-online-have-a-cyber-safe-date/</loc><lastmod>2025-02-23T13:54:15-05:00</lastmod></url><url><loc>https://geniewish.com/double-clickjacking-toil-and-trouble/</loc><lastmod>2025-02-23T13:54:21-05:00</lastmod></url><url><loc>https://geniewish.com/new-ransomware-targets-amazon-aws/</loc><lastmod>2025-02-23T13:54:28-05:00</lastmod></url><url><loc>https://geniewish.com/your-smartphone-could-compromise-your-work-network/</loc><lastmod>2025-02-21T06:00:47-05:00</lastmod></url><url><loc>https://geniewish.com/new-darkgate-ransomware-targets-team-communication-apps/</loc><lastmod>2025-02-25T06:00:08-05:00</lastmod></url><url><loc>https://geniewish.com/is-triple-extortion-the-next-big-ransomware/</loc><lastmod>2025-02-28T06:00:08-05:00</lastmod></url><url><loc>https://geniewish.com/how-do-authenticator-apps-protect-data-privacy/</loc><lastmod>2025-03-04T06:00:30-05:00</lastmod></url><url><loc>https://geniewish.com/when-ai-leads-to-legal-disputes/</loc><lastmod>2025-03-07T06:00:56-05:00</lastmod></url><url><loc>https://geniewish.com/whats-up-with-the-privacy-allegations-against-snapchat-ai/</loc><lastmod>2025-03-11T07:00:03-04:00</lastmod></url><url><loc>https://geniewish.com/when-deepfakes-land-you-in-deep-waters/</loc><lastmod>2025-03-14T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/is-your-information-on-people-finding-websites/</loc><lastmod>2025-03-18T07:00:01-04:00</lastmod></url><url><loc>https://geniewish.com/ransomware-past-present-and-future/</loc><lastmod>2025-03-28T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/behind-the-bybit-crypto-crime/</loc><lastmod>2025-04-11T07:00:02-04:00</lastmod></url><url><loc>https://geniewish.com/the-rising-threat-of-nation-state-cyberattacks/</loc><lastmod>2025-04-08T07:00:11-04:00</lastmod></url><url><loc>https://geniewish.com/how-mfa-fatigue-hurts-your-accounts-2/</loc><lastmod>2025-04-04T07:00:03-04:00</lastmod></url><url><loc>https://geniewish.com/biggest-data-breaches-of-2025-so-far/</loc><lastmod>2025-04-01T07:00:36-04:00</lastmod></url><url><loc>https://geniewish.com/understanding-credential-stuffing-the-dangers-of-reusing-passwords/</loc><lastmod>2025-04-15T07:00:48-04:00</lastmod></url><url><loc>https://geniewish.com/how-ai-empowers-spear-phishing/</loc><lastmod>2025-04-18T07:00:59-04:00</lastmod></url><url><loc>https://geniewish.com/can-cyber-hygiene-fend-off-ai-driven-cyberattacks/</loc><lastmod>2025-04-22T07:00:03-04:00</lastmod></url><url><loc>https://geniewish.com/the-ups-and-downs-of-facial-recognition-technology/</loc><lastmod>2025-04-25T07:00:53-04:00</lastmod></url><url><loc>https://geniewish.com/protecting-your-device-from-malware/</loc><lastmod>2025-04-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/5-biggest-threats-to-your-cryptocurrency-and-crypto-wallet-12/</loc><lastmod>2025-05-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/what-are-the-risks-to-your-cloud-data/</loc><lastmod>2025-05-09T07:00:14-04:00</lastmod></url><url><loc>https://geniewish.com/do-security-questions-make-good-mfa-5/</loc><lastmod>2025-05-06T07:00:03-04:00</lastmod></url><url><loc>https://geniewish.com/why-you-should-embrace-automation-in-the-workplace/</loc><lastmod>2025-05-13T07:00:07-04:00</lastmod></url><url><loc>https://geniewish.com/what-happens-in-the-downtime-during-a-data-breach-5/</loc><lastmod>2025-05-16T07:00:39-04:00</lastmod></url><url><loc>https://geniewish.com/how-do-hardware-keys-secure-your-data/</loc><lastmod>2025-05-20T07:00:25-04:00</lastmod></url><url><loc>https://geniewish.com/lock-it-down-email-security-and-effective-communication-8/</loc><lastmod>2025-05-23T07:00:45-04:00</lastmod></url><url><loc>https://geniewish.com/rfid-inside-the-invisible-technology/</loc><lastmod>2025-05-30T07:00:52-04:00</lastmod></url><url><loc>https://geniewish.com/headhunter-phishing-navigating-unsafe-job-recruiters-5/</loc><lastmod>2025-05-27T07:00:44-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-use-ai-safely-and-effectively-in-the-workplace-6/</loc><lastmod>2025-06-03T07:00:29-04:00</lastmod></url><url><loc>https://geniewish.com/how-a-supply-chain-attack-triggered-a-lawsuit/</loc><lastmod>2025-06-06T07:00:26-04:00</lastmod></url><url><loc>https://geniewish.com/when-botnets-take-over-your-phone-15/</loc><lastmod>2025-06-24T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/how-ai-stops-small-mistakes-from-becoming-big-cyber-events/</loc><lastmod>2025-06-20T07:00:34-04:00</lastmod></url><url><loc>https://geniewish.com/doxxing-what-you-need-to-know-about-this-cyber-threat/</loc><lastmod>2025-06-17T07:00:23-04:00</lastmod></url><url><loc>https://geniewish.com/are-you-posting-too-much-information-to-social-media/</loc><lastmod>2025-06-13T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/are-fake-websites-faking-you-out/</loc><lastmod>2025-06-27T07:00:36-04:00</lastmod></url><url><loc>https://geniewish.com/why-are-there-blocked-websites-on-work-wifi-12/</loc><lastmod>2025-07-01T07:00:18-04:00</lastmod></url><url><loc>https://geniewish.com/are-ai-chatbots-inaccurate/</loc><lastmod>2025-07-22T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/shadow-ai-in-the-workplace/</loc><lastmod>2025-07-18T07:00:37-04:00</lastmod></url><url><loc>https://geniewish.com/how-healthcare-data-breaches-fuel-identity-theft-and-insurance-fraud-33/</loc><lastmod>2025-07-15T07:00:10-04:00</lastmod></url><url><loc>https://geniewish.com/3-common-myths-about-ai/</loc><lastmod>2025-07-11T07:00:25-04:00</lastmod></url><url><loc>https://geniewish.com/how-social-engineering-is-evolving-in-2025/</loc><lastmod>2025-07-25T07:00:12-04:00</lastmod></url><url><loc>https://geniewish.com/conversational-vs-generative-ai-the-difference-and-why-it-matters/</loc><lastmod>2025-07-29T07:00:35-04:00</lastmod></url><url><loc>https://geniewish.com/how-lack-of-preparation-can-affect-cybersecurity/</loc><lastmod>2025-08-01T07:00:37-04:00</lastmod></url><url><loc>https://geniewish.com/ai-bias-and-safety-are-really-the-same-problem/</loc><lastmod>2025-08-08T07:00:52-04:00</lastmod></url><url><loc>https://geniewish.com/malware-as-a-service-is-using-microsoft-teams-to-launch-attacks/</loc><lastmod>2025-08-12T07:00:58-04:00</lastmod></url><url><loc>https://geniewish.com/your-crypto-wallet-login-is-worth-more-than-your-laptop-on-the-dark-web/</loc><lastmod>2025-08-15T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/hackers-breach-federal-court-filing-system-what-it-means-for-you/</loc><lastmod>2025-08-19T07:00:48-04:00</lastmod></url><url><loc>https://geniewish.com/digital-trust-what-it-means-and-why-its-disappearing/</loc><lastmod>2025-08-22T07:00:23-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-2/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-3/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-4/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-5/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-6/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-7/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-8/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/trusting-the-ai-supply-chain-behind-your-business-9/</loc><lastmod>2025-08-29T07:00:17-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-2/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-3/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-4/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-5/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-6/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-7/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-8/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-9/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-10/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-11/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-12/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-13/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-14/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-15/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-16/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/why-hackers-think-youre-an-easy-target/</loc><lastmod>2025-09-05T07:00:36-04:00</lastmod></url><url><loc>https://geniewish.com/digital-dependence-and-resilience-planning-the-art-of-a-backup-plan-17/</loc><lastmod>2025-09-02T07:00:27-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-2/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-3/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-4/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-5/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-6/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-7/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-8/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-9/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-10/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-11/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-12/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-13/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-14/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-15/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-16/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-17/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-18/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-19/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-20/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-21/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-22/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-23/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-24/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-25/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-2/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-3/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-4/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-5/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-6/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-7/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-8/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-9/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-10/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-11/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-12/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/singapore-mandates-age-verification-and-online-accountability-13/</loc><lastmod>2025-09-19T07:00:56-04:00</lastmod></url><url><loc>https://geniewish.com/the-invisible-human-cost-of-a-breach/</loc><lastmod>2025-09-16T07:00:30-04:00</lastmod></url><url><loc>https://geniewish.com/why-cybersecurity-matters-to-you/</loc><lastmod>2025-09-12T07:00:29-04:00</lastmod></url><url><loc>https://geniewish.com/digital-ethics-what-it-means-for-you-at-work-26/</loc><lastmod>2025-09-09T07:00:55-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-2/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-3/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-4/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-5/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-6/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-7/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-8/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-9/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-10/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/what-glba-means-for-you-at-work-11/</loc><lastmod>2025-09-23T07:00:49-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-2/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-3/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-4/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-5/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-6/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-7/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-8/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-9/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-10/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-11/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-12/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-13/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-14/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-15/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-16/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-17/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-18/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-19/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-20/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-21/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-22/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-23/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-24/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-25/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-26/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-27/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/switzerlands-surveillance-shift-and-what-it-means-for-you/</loc><lastmod>2025-10-03T07:00:43-04:00</lastmod></url><url><loc>https://geniewish.com/when-opt-out-doesnt-mean-out-what-googles-425m-lesson-means-for-you/</loc><lastmod>2025-09-30T07:00:13-04:00</lastmod></url><url><loc>https://geniewish.com/cybersecurity-is-a-team-sport-the-role-of-everyone-from-interns-to-executives-28/</loc><lastmod>2025-09-26T07:00:54-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-2/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-3/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-4/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-5/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-6/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-7/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-8/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-9/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-10/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-tax-season-texts-turn-into-smishing-attacks-11/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/when-zero-trust-meets-human-nature/</loc><lastmod>2025-10-14T07:00:19-04:00</lastmod></url><url><loc>https://geniewish.com/when-zero-trust-meets-human-nature-2/</loc><lastmod>2025-10-14T07:00:19-04:00</lastmod></url><url><loc>https://geniewish.com/is-ai-fixing-security-or-just-automating-our-flaws/</loc><lastmod>2025-10-17T07:00:38-04:00</lastmod></url><url><loc>https://geniewish.com/when-zero-trust-meets-human-nature-3/</loc><lastmod>2025-10-14T07:00:19-04:00</lastmod></url><url><loc>https://geniewish.com/spoofing-when-trust-gets-faked/</loc><lastmod>2025-10-10T07:00:14-04:00</lastmod></url><url><loc>https://geniewish.com/tax-season-texts-turn-into-smishing-attacks/</loc><lastmod>2025-10-07T07:00:57-04:00</lastmod></url><url><loc>https://geniewish.com/are-our-defenses-built-to-protect-or-reassure/</loc><lastmod>2025-10-21T07:00:58-04:00</lastmod></url><url><loc>https://geniewish.com/slam-the-door-on-phone-slamming/</loc><lastmod>2025-10-24T07:00:37-04:00</lastmod></url><url><loc>https://geniewish.com/slam-the-door-on-phone-slamming-2/</loc><lastmod>2025-10-24T07:00:37-04:00</lastmod></url><url><loc>https://geniewish.com/slam-the-door-on-phone-slamming-3/</loc><lastmod>2025-10-24T07:00:37-04:00</lastmod></url><url><loc>https://geniewish.com/when-convenience-becomes-the-enemy-of-security/</loc><lastmod>2025-10-28T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/slam-the-door-on-phone-slamming-4/</loc><lastmod>2025-10-24T07:00:37-04:00</lastmod></url><url><loc>https://geniewish.com/how-everyday-conversations-shape-cyber-safety/</loc><lastmod>2025-10-31T07:00:14-04:00</lastmod></url><url><loc>https://geniewish.com/how-everyday-conversations-shape-cyber-safety-2/</loc><lastmod>2025-10-31T07:00:14-04:00</lastmod></url><url><loc>https://geniewish.com/how-oversharing-and-overscrolling-lead-to-breaches/</loc><lastmod>2025-11-04T06:00:26-05:00</lastmod></url><url><loc>https://geniewish.com/how-everyday-conversations-shape-cyber-safety-3/</loc><lastmod>2025-10-31T07:00:14-04:00</lastmod></url><url><loc>https://geniewish.com/from-routine-to-resilience-turning-security-habits-into-second-nature/</loc><lastmod>2025-11-07T06:00:01-05:00</lastmod></url><url><loc>https://geniewish.com/from-routine-to-resilience-turning-security-habits-into-second-nature-2/</loc><lastmod>2025-11-07T06:00:01-05:00</lastmod></url><url><loc>https://geniewish.com/hidden-roi-of-security-awareness-training/</loc><lastmod>2025-11-11T06:00:15-05:00</lastmod></url><url><loc>https://geniewish.com/hidden-roi-of-security-awareness-training-2/</loc><lastmod>2025-11-11T06:00:15-05:00</lastmod></url><url><loc>https://geniewish.com/beating-alert-fatigue-without-losing-vigilance/</loc><lastmod>2025-11-14T06:00:53-05:00</lastmod></url><url><loc>https://geniewish.com/beating-alert-fatigue-without-losing-vigilance-2/</loc><lastmod>2025-11-14T06:00:53-05:00</lastmod></url><url><loc>https://geniewish.com/why-following-the-rules-isnt-the-same-as-being-secure/</loc><lastmod>2025-11-18T06:00:37-05:00</lastmod></url><url><loc>https://geniewish.com/the-deepfake-dilemma-can-you-trust-what-you-see-online/</loc><lastmod>2025-11-21T06:00:46-05:00</lastmod></url><url><loc>https://geniewish.com/the-deepfake-dilemma-can-you-trust-what-you-see-online-2/</loc><lastmod>2025-11-21T06:00:46-05:00</lastmod></url><url><loc>https://geniewish.com/can-qr-codes-wreck-your-cell-phone/</loc><lastmod>2025-11-25T06:00:58-05:00</lastmod></url><url><loc>https://geniewish.com/can-qr-codes-wreck-your-cell-phone-2/</loc><lastmod>2025-11-25T06:00:58-05:00</lastmod></url><url><loc>https://geniewish.com/is-contactless-payment-smart-or-insecure/</loc><lastmod>2025-11-28T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/is-contactless-payment-smart-or-insecure-2/</loc><lastmod>2025-11-28T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/malware-as-a-service-the-subscription-nobody-wants/</loc><lastmod>2025-12-02T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/is-contactless-payment-smart-or-insecure-3/</loc><lastmod>2025-11-28T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/vishing-scams-are-on-the-rise/</loc><lastmod>2025-12-05T06:00:30-05:00</lastmod></url><url><loc>https://geniewish.com/vishing-scams-are-on-the-rise-2/</loc><lastmod>2025-12-05T06:00:30-05:00</lastmod></url><url><loc>https://geniewish.com/staying-secure-beyond-the-office-walls/</loc><lastmod>2025-12-09T06:00:19-05:00</lastmod></url><url><loc>https://geniewish.com/staying-secure-beyond-the-office-walls-2/</loc><lastmod>2025-12-09T06:00:19-05:00</lastmod></url><url><loc>https://geniewish.com/are-you-giving-away-privacy-for-convenience/</loc><lastmod>2025-12-12T06:00:38-05:00</lastmod></url><url><loc>https://geniewish.com/are-you-giving-away-privacy-for-convenience-2/</loc><lastmod>2025-12-12T06:00:38-05:00</lastmod></url><url><loc>https://geniewish.com/how-everyday-work-habits-leak-more-data-than-you-think/</loc><lastmod>2025-12-16T06:00:18-05:00</lastmod></url><url><loc>https://geniewish.com/your-inbox-isnt-a-to-do-list-pause-before-you-click/</loc><lastmod>2025-12-19T06:00:27-05:00</lastmod></url><url><loc>https://geniewish.com/your-inbox-isnt-a-to-do-list-pause-before-you-click-2/</loc><lastmod>2025-12-19T06:00:27-05:00</lastmod></url><url><loc>https://geniewish.com/how-are-people-scamming-food-delivery-apps/</loc><lastmod>2025-12-23T06:00:55-05:00</lastmod></url><url><loc>https://geniewish.com/how-are-people-scamming-food-delivery-apps-2/</loc><lastmod>2025-12-23T06:00:55-05:00</lastmod></url><url><loc>https://geniewish.com/remote-access-tools-what-they-are-why-we-use-them-and-when-to-be-careful/</loc><lastmod>2025-12-26T06:00:14-05:00</lastmod></url><url><loc>https://geniewish.com/remote-access-tools-what-they-are-why-we-use-them-and-when-to-be-careful-2/</loc><lastmod>2025-12-26T06:00:14-05:00</lastmod></url><url><loc>https://geniewish.com/remote-access-tools-what-they-are-why-we-use-them-and-when-to-be-careful-3/</loc><lastmod>2025-12-26T06:00:14-05:00</lastmod></url><url><loc>https://geniewish.com/remote-access-tools-what-they-are-why-we-use-them-and-when-to-be-careful-4/</loc><lastmod>2025-12-26T06:00:14-05:00</lastmod></url><url><loc>https://geniewish.com/why-your-click-matters-more-than-any-software/</loc><lastmod>2026-01-02T06:00:46-05:00</lastmod></url><url><loc>https://geniewish.com/how-to-communicate-securely-when-every-chat-can-be-a-threat/</loc><lastmod>2025-12-30T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/remote-access-tools-what-they-are-why-we-use-them-and-when-to-be-careful-5/</loc><lastmod>2025-12-26T06:00:14-05:00</lastmod></url><url><loc>https://geniewish.com/what-will-cybersecurity-look-like-in-2026/</loc><lastmod>2026-01-06T06:00:53-05:00</lastmod></url><url><loc>https://geniewish.com/what-will-cybersecurity-look-like-in-2026-2/</loc><lastmod>2026-01-06T06:00:53-05:00</lastmod></url><url><loc>https://geniewish.com/the-downsides-of-smart-devices/</loc><lastmod>2026-01-09T06:00:15-05:00</lastmod></url><url><loc>https://geniewish.com/how-the-european-space-agency-was-breached/</loc><lastmod>2026-01-12T06:00:51-05:00</lastmod></url><url><loc>https://geniewish.com/how-the-european-space-agency-was-breached-2/</loc><lastmod>2026-01-12T06:00:51-05:00</lastmod></url><url><loc>https://geniewish.com/how-the-european-space-agency-was-breached-3/</loc><lastmod>2026-01-12T06:00:51-05:00</lastmod></url><url><loc>https://geniewish.com/what-are-insider-threats/</loc><lastmod>2026-01-16T06:00:23-05:00</lastmod></url><url><loc>https://geniewish.com/how-the-european-space-agency-was-breached-4/</loc><lastmod>2026-01-12T06:00:51-05:00</lastmod></url><url><loc>https://geniewish.com/the-quiet-risk-of-just-helping-out-at-work/</loc><lastmod>2026-01-20T06:00:29-05:00</lastmod></url><url><loc>https://geniewish.com/the-quiet-risk-of-just-helping-out-at-work-2/</loc><lastmod>2026-01-20T06:00:29-05:00</lastmod></url><url><loc>https://geniewish.com/reddit-fights-ai-over-data-privacy/</loc><lastmod>2026-01-23T06:00:47-05:00</lastmod></url><url><loc>https://geniewish.com/reddit-fights-ai-over-data-privacy-2/</loc><lastmod>2026-01-23T06:00:47-05:00</lastmod></url><url><loc>https://geniewish.com/what-happens-after-a-breach/</loc><lastmod>2026-01-27T06:00:11-05:00</lastmod></url><url><loc>https://geniewish.com/work-from-anywhere-secure-everywhere/</loc><lastmod>2026-01-30T06:00:55-05:00</lastmod></url><url><loc>https://geniewish.com/work-from-anywhere-secure-everywhere-2/</loc><lastmod>2026-01-30T06:00:55-05:00</lastmod></url><url><loc>https://geniewish.com/what-the-cisa-incident-teaches-us-about-ai-safety/</loc><lastmod>2026-02-03T06:00:35-05:00</lastmod></url><url><loc>https://geniewish.com/what-the-cisa-incident-teaches-us-about-ai-safety-2/</loc><lastmod>2026-02-03T06:00:35-05:00</lastmod></url><url><loc>https://geniewish.com/what-makes-public-wi-fi-a-risk/</loc><lastmod>2026-02-06T06:00:17-05:00</lastmod></url><url><loc>https://geniewish.com/what-makes-public-wi-fi-a-risk-2/</loc><lastmod>2026-02-06T06:00:17-05:00</lastmod></url><url><loc>https://geniewish.com/the-dangers-of-texting-phi-and-using-insecure-communication/</loc><lastmod>2026-02-10T06:00:41-05:00</lastmod></url><url><loc>https://geniewish.com/how-ai-helps-threat-actors-commit-cyber-crime/</loc><lastmod>2026-02-13T06:00:20-05:00</lastmod></url><url><loc>https://geniewish.com/the-dangers-of-texting-phi-and-using-insecure-communication-2/</loc><lastmod>2026-02-10T06:00:41-05:00</lastmod></url><url><loc>https://geniewish.com/what-makes-public-wi-fi-a-risk-3/</loc><lastmod>2026-02-06T06:00:17-05:00</lastmod></url><url><loc>https://geniewish.com/what-the-cisa-incident-teaches-us-about-ai-safety-3/</loc><lastmod>2026-02-03T06:00:35-05:00</lastmod></url><url><loc>https://geniewish.com/malvertising-when-online-ads-become-a-delivery-system-for-malware/</loc><lastmod>2026-02-17T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/malvertising-when-online-ads-become-a-delivery-system-for-malware-2/</loc><lastmod>2026-02-17T06:00:43-05:00</lastmod></url><url><loc>https://geniewish.com/what-is-piggybacking/</loc><lastmod>2026-02-20T06:00:33-05:00</lastmod></url><url><loc>https://geniewish.com/what-is-piggybacking-2/</loc><lastmod>2026-02-20T06:00:33-05:00</lastmod></url><url><loc>https://geniewish.com/what-is-read-only-access-and-why-does-it-matter/</loc><lastmod>2026-02-24T06:00:39-05:00</lastmod></url><url><loc>https://geniewish.com/why-hackers-go-after-universities-and-what-it-means-for-your-data/</loc><lastmod>2026-02-27T06:00:09-05:00</lastmod></url><url><loc>https://geniewish.com/why-hackers-go-after-universities-and-what-it-means-for-your-data-2/</loc><lastmod>2026-02-27T06:00:09-05:00</lastmod></url><url><loc>https://geniewish.com/the-hidden-dangers-of-outdated-systems/</loc><lastmod>2026-03-03T06:00:47-05:00</lastmod></url><url><loc>https://geniewish.com/the-hidden-dangers-of-outdated-systems-2/</loc><lastmod>2026-03-03T06:00:47-05:00</lastmod></url><url><loc>https://geniewish.com/the-most-common-ways-workers-accidentally-put-data-at-risk/</loc><lastmod>2026-03-06T06:00:18-05:00</lastmod></url><url><loc>https://geniewish.com/the-most-common-ways-workers-accidentally-put-data-at-risk-2/</loc><lastmod>2026-03-06T06:00:18-05:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-2/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-3/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-4/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-5/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-6/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-7/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-8/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-9/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-10/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-11/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-12/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-13/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-14/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-15/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-16/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-17/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url><url><loc>https://geniewish.com/how-to-recognize-and-beat-ai-bias-18/</loc><lastmod>2026-03-10T07:00:15-04:00</lastmod></url></urlset>
