<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://publicsectorcyber.com/2025/11/04/dangerous-pdf-programs/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/11/icannwhois.jpg</image:loc><image:title>icannwhois</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/11/pdfcommunitynote.jpg</image:loc><image:title>pdfcommunitynote</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/11/adobepdfoffer.jpg</image:loc><image:title>adobepdfoffer</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/11/googlepdfresults.jpg</image:loc><image:title>googlepdfresults</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/11/prdprint.jpg</image:loc><image:title>prdprint</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/11/pdfsavepopup.jpg</image:loc><image:title>pdfsavepopup</image:title></image:image><lastmod>2025-11-04T18:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2025/01/22/how-can-i-learn-skills-for-digital-forensics-and-incident-response-as-a-beginner/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/01/blog-learn3.jpg</image:loc><image:title>BLOG-learn3</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/01/blog-learn-2.jpg</image:loc><image:title>BLOG-learn-2</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2025/01/blog-learn1.jpg</image:loc><image:title>BLOG-learn1</image:title></image:image><lastmod>2025-01-23T00:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2024/06/11/sysmon-help-an-investigator-out/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/06/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2024-06-11T23:52:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2024/04/07/usps-package-notification-or-how-to-check-bad-links/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/senttostore.png</image:loc><image:title>senttostore</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/smsharvester.png</image:loc><image:title>smsharvester</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/screenshot_20240407-155759.png</image:loc><image:title>screenshot_20240407-155759</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/malsite-1.png</image:loc><image:title>malsite-1</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/browser-sec.jpg</image:loc><image:title>browser-sec</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/malsite.png</image:loc><image:title>malsite</image:title></image:image><lastmod>2024-04-16T19:47:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2024/04/16/how-are-people-tricked-into-downloading-malicious-software/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/ransomware-2321665_1280.png</image:loc><image:title>ransomware-2321665_1280</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/downloadwithadblocker.jpg</image:loc><image:title>downloadwithadblocker</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/downloadadpopup.png</image:loc><image:title>downloadadpopup</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/danloadbs2.jpg</image:loc><image:title>danloadbs2</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/downloadwave.png</image:loc><image:title>downloadwave</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/download-wave.jpg</image:loc><image:title>download-wave</image:title></image:image><lastmod>2024-04-16T19:45:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2021/10/22/whats-installed-on-that-device/</loc><lastmod>2024-04-12T19:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2024/04/03/is-windows-defender-enough/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpointtools.png</image:loc><image:title>endpointtools</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpointurlblock.png</image:loc><image:title>endpointurlblock</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-8.jpg</image:loc><image:title>EDR features</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-7.jpg</image:loc><image:title>endpoint1-7</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-6.jpg</image:loc><image:title>endpoint1-6</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-5.jpg</image:loc><image:title>endpoint1-5</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-4.jpg</image:loc><image:title>endpoint1-4</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-3.jpg</image:loc><image:title>endpoint1-3</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-2.jpg</image:loc><image:title>endpoint1-2</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2024/04/endpoint1-1.jpg</image:loc><image:title>endpoint1-1</image:title></image:image><lastmod>2024-04-11T20:51:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2022/05/11/wireshark-101/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2022/05/wireshark5-1.png</image:loc><image:title>wireshark5-1</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2022/05/wireshark5.png</image:loc><image:title>wireshark5</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2022/05/wireshark4.png</image:loc><image:title>wireshark4</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2022/05/wireshark3.png</image:loc><image:title>wireshark3</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2022/05/wireshark2.png</image:loc><image:title>wireshark2</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2022/05/wireshark1.png</image:loc><image:title>wireshark1</image:title></image:image><lastmod>2022-05-11T21:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2022/02/15/parsing-google-voice-search/</loc><lastmod>2022-02-16T00:38:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2021/12/21/you-dont-have-to-learn-to-code-to-be-in-cybersecurity/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2021/12/filtered-teams.jpg</image:loc><image:title>Filtered Teams</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2021/12/teams-logs-without-filter.jpg</image:loc><image:title>Teams logs without filter</image:title></image:image><lastmod>2021-12-22T00:57:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2020/01/26/whats-getting-through-your-modem/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2020/01/ru-reaching-in.jpg</image:loc><image:title>ru reaching in</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2020/01/firewall-iran.jpg</image:loc><image:title>Firewall Iran</image:title></image:image><lastmod>2020-01-26T22:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/02/21/received-a-weird-email-free-help/</loc><lastmod>2019-12-15T19:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/12/15/have-you-been-pwned-what-is-that/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2019/12/haveibeen.jpg</image:loc><image:title>HaveIBeen</image:title></image:image><lastmod>2019-12-15T19:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/08/05/two-factor-authentication-simply-explained/</loc><lastmod>2019-08-06T02:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/03/10/everyone-can-see-what-you-send-wirelessly-hypothetically/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2019/03/books-21849_1920.jpg</image:loc><image:title>books-21849_1920</image:title></image:image><lastmod>2019-03-10T20:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/01/28/yubiwhat/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2019/01/yubikey.jpg</image:loc><image:title>yubikey</image:title></image:image><lastmod>2019-02-21T03:41:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/01/30/the-mother-lode-of-policy-templates/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2019/01/sans-desktop-policy-1.jpg</image:loc><image:title>sans desktop policy</image:title></image:image><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2019/01/sans-desktop-policy.jpg</image:loc><image:title>sans desktop policy</image:title></image:image><lastmod>2019-01-30T17:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2019/01/09/i-dont-care-what-you-found-dont-plug-it-in/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2019/01/memory-stick-1267620_640.jpg</image:loc><image:title>memory-stick-1267620_640</image:title></image:image><lastmod>2019-01-28T15:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2018/12/28/password-123-it-happens-dont-let-it/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2018/12/IMG_20181228_164938.jpg</image:loc><image:title>IMG_20181228_164938</image:title></image:image><lastmod>2018-12-28T23:44:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2018/10/13/cybersecurity-help-for-wi-local-governments/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2018/10/hacked.jpg</image:loc><image:title>hacked</image:title></image:image><lastmod>2018-10-13T15:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2018/10/09/you-with-20-open-tabs-shut-it-down/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2018/10/board-453758_1280.jpg</image:loc><image:title>board-453758_1280</image:title></image:image><lastmod>2018-10-09T14:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2018/09/28/the-campaign-playbook/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2018/09/campaign-playbook.jpg</image:loc><image:title>Campaign Playbook</image:title></image:image><lastmod>2018-09-29T02:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2018/09/14/do-this-now-dont-plan-to-get-back-to-it/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2018/09/google-sec.jpg</image:loc><image:title>GooGle sec</image:title></image:image><lastmod>2018-09-14T17:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/2018/09/14/the-journey-begins/</loc><lastmod>2018-09-14T17:32:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://publicsectorcyber.com/contact/</loc><image:image><image:loc>https://publicsectorcyber.com/wp-content/uploads/2018/09/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2018-09-14T16:28:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://publicsectorcyber.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-11-04T18:16:40+00:00</lastmod></url></urlset>
