<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://shepherdsecurity.net/2026/03/12/the-copypasta-scam-60-minutes-facebook-post-is-a-hoax/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/copypasta-scam-blog.png</image:loc><image:title>copypasta scam blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/copypasta-scam-1.png</image:loc><image:title>Copypasta Scam</image:title></image:image><lastmod>2026-03-13T01:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/phishing-attacks/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-for-a-blog-post-related-to-1.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-related-to</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-for-a-blog-post-related-to.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-related-to</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/vishing-628-x-900-px.png</image:loc><image:title>Vishing (628 x 900 px)</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/msm-phishing-628-x-900-px.png</image:loc><image:title>MSM Phishing (628 x 900 px)</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/urgent-account-activity-alert-628-x-1200-px-2.png</image:loc><image:title>URGENT Account activity alert (628 x 1200 px)</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/urgent-account-activity-alert-628-x-1200-px-1.png</image:loc><image:title>URGENT Account activity alert (628 x 1200 px) (1)</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/urgent-account-activity-alert-628-x-1200-px.png</image:loc><image:title>URGENT Account activity alert (628 x 1200 px)</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/msm-phishing.png</image:loc><image:title>MSM Phishing</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/urgent-account-activity-alert-1.png</image:loc><image:title>URGENT Account activity alert</image:title></image:image><lastmod>2026-03-12T01:14:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/2025/03/20/received-a-text-about-unpaid-tolls-its-more-than-likely-a-scam/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/phish-bowl-.png</image:loc><image:title>Phish Bowl - Unpaid Toll Feature</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-7.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-6.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-5.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-4.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-2.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-1.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-featured-image-for-a-blog.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-11T17:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/03/09/%d4%9d%d0%b5v%d0%b5-k%d5%b8o%d4%9d%d5%b8-%d0%b5%d0%b0%d1%81h-%ce%bfth%d0%b5r-f%d0%ber-%d0%b0-%d4%9dh%d1%96l%d0%b5-%d0%b0t-l%d0%b5%d0%b0%d1%95t-%d3%8f-k%d5%b8%ce%bf%d4%9d-you/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-image-that-depicts-the-theme-5.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-depicts-the-theme</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-image-that-depicts-the-theme-4.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-depicts-the-theme</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-image-that-depicts-the-theme-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-depicts-the-theme</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-image-that-depicts-the-theme-2.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-depicts-the-theme</image:title></image:image><lastmod>2026-03-11T17:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/03/08/you-paid-to-f4-customs-for-invoice-000637/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-and-sharp-focused-image-illustrating-a-fraudulent-1.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-image-illustrating-a-fraudulent</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-and-sharp-focused-image-illustrating-a-fraudulent.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-image-illustrating-a-fraudulent</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-2-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/phishbowl-you-paid-to-f4-customs-for-invoice-000637.png</image:loc><image:title>PhishBowl - You paid to F4 Customs for invoice 000637</image:title></image:image><lastmod>2026-03-11T17:19:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2026/03/11/pi-day-the-cyberattack-pie-top-cybersecurity-attack-types-2025/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/designer.png</image:loc><image:title>Designer</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-highly-detailed-and-sharp-focused-featured-image-for-a-6.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-highly-detailed-and-sharp-focused-featured-image-for-a-5.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-highly-detailed-and-sharp-focused-featured-image-for-a-4.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/ss-pie-chart.png</image:loc><image:title>SS Pie Chart</image:title></image:image><lastmod>2026-03-11T17:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2026/03/05/small-targets-big-risk-cyber-threats-during-global-escalation/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/small-targets-big-risk.png</image:loc><image:title>Small Targets, Big Risk</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-13.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-12.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-11.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-10.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-9.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-8.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-7.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-6.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/03/create-a-featured-image-that-visually-represents-the-concept-of-5.png</image:loc><image:title>create-a-featured-image-that-visually-represents-the-concept-of</image:title></image:image><lastmod>2026-03-06T02:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/contact/</loc><lastmod>2026-02-17T16:56:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/about/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/john-2.jpg</image:loc><image:title>John 2</image:title></image:image><lastmod>2026-02-17T16:56:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/2026/02/04/when-love-is-a-lie-romance-scams-and-how-to-protect-your-heart-and-your-wallet/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-4.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-2.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-1.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-highly-detailed-high-resolution-featured-image-for-a-blog.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-17T16:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2026/02/17/who-to-contact-after-a-cybersecurity-incident/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who-6.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who-5.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who-4.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who-3.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who-2.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who-1.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/create-a-featured-image-for-a-blog-post-on-who.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-who</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-17T16:34:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/12/30/2026-new-year-new-passwords/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/12/create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept-4.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/12/create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/12/create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept-2.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/12/create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept-1.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/12/create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-illustrating-the-concept</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-31T00:37:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/09/12/remembering-charlie-kirk-defending-truth-in-a-time-of-violence/</loc><lastmod>2025-12-03T00:19:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/09/24/fall-into-cybersecurity-best-practices-for-this-fall-season/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-captivating-featured-image-for-a-blog-post-titled-1.png</image:loc><image:title>create-a-captivating-featured-image-for-a-blog-post-titled</image:title></image:image><lastmod>2025-09-25T00:42:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/the-shepherds-crook/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/ss-fall-feature.png</image:loc><image:title>SS Fall Feature</image:title></image:image><lastmod>2025-09-25T00:42:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/2025/08/18/protecting-your-childs-privacy-when-going-back-to-school/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/screenshot-2025-08-18-102424.png</image:loc><image:title>Screenshot 2025-08-18 102424</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-18.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-17.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-16.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-15.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-14.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-13.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-12.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/08/create-a-highly-detailed-and-vibrant-featured-image-for-a-11.png</image:loc><image:title>create-a-highly-detailed-and-vibrant-featured-image-for-a</image:title></image:image><lastmod>2025-09-24T22:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/06/18/staying-secure-on-the-go-cybersecurity-for-traveling/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-11.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-10.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-9.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-8.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-7.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-6.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-5.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-4.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focus-image-that-captures-3.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focus-image-that-captures</image:title></image:image><lastmod>2025-09-24T22:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/09/16/beware-of-scams-exploiting-the-death-of-charlie-kirk/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams-6.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams-5.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams-4.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams-3.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams-2.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams-1.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-featured-image-for-a-blog-post-about-scams.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-about-scams</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-highly-detailed-sharp-focused-image-depicting-the-essence-of-3.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-the-essence-of</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/09/create-a-highly-detailed-sharp-focused-image-depicting-the-essence-of-2.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-the-essence-of</image:title></image:image><lastmod>2025-09-16T14:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/04/14/the-security-of-our-spiritual-identity-in-jesus-reflections-for-good-friday-and-easter/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-9.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-8.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-7.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-6.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-5.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-4.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-2.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-1.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-highly-detailed-high-resolution-image-that-visually-represents-the.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><lastmod>2025-04-15T01:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/04/04/a-call-to-be-good-stewards-of-gods-resources-security-memo-to-church-leaders-or-other-leaders/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity-6.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity-5.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity-4.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity-3.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity-2.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity-1.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/create-a-featured-image-for-a-blog-post-on-cybersecurity.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-on-cybersecurity</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-04-05T01:08:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/2025/03/31/digital-spring-cleaning-6-healthy-habits-to-improve-your-life-in-2025/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring-6.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring-5.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring-4.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring-3.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring-2.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring-1.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-spring</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-15.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-highly-detailed-high-resolution-image-that-visually-represents-the-14.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-represents-the</image:title></image:image><lastmod>2025-03-31T22:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/nordvpn/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/generic-banners-protect-digital-life-1500x300-1.png</image:loc><image:title>generic-banners-protect-digital-life-1500x300</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/generic-affiliate-banners-300x250-1.png</image:loc><image:title>generic-affiliate-banners-300x250</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/generic-affiliate-banners-970x90-2.png</image:loc><image:title>generic-affiliate-banners-970x90</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/windows-en-7.png</image:loc><image:title>Windows-en-7</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/generic-affiliate-banners-970x90-1.png</image:loc><image:title>generic-affiliate-banners-970x90 (1)</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/nordvpn_logo_rgb_primary_blue_black.png</image:loc><image:title>NordVPN_Logo_RGB_Primary_Blue_Black</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/android-specialty-servers-us.png</image:loc><image:title>android-specialty-servers-us</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/windows-en-1.png</image:loc><image:title>Windows-en-1</image:title></image:image><lastmod>2025-03-22T16:38:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/2025/03/15/dont-rely-on-luck-for-your-cybersecurity/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-19.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-18.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-17.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-16.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-15.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-14.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-13.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-12.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-11.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover-10.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-featuring-a-four-leaf-clover</image:title></image:image><lastmod>2025-03-15T14:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net/cookie-policy/</loc><lastmod>2025-03-15T00:32:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/privacy-policy/</loc><lastmod>2025-03-15T00:11:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/terms-conditions/</loc><lastmod>2025-03-15T00:07:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/the-phishbowl/</loc><lastmod>2025-03-14T02:22:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://shepherdsecurity.net/2025/03/10/protecting-yourself-and-your-flock-essential-cybersecurity-hygiene-practices/</loc><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-12.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-11.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-10.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-9.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-8.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-7.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-6.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-5.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-4.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><image:image><image:loc>https://shepherdsecurity.net/wp-content/uploads/2025/03/create-a-featured-image-for-a-blog-post-titled-protecting-3.png</image:loc><image:title>create-a-featured-image-for-a-blog-post-titled-protecting</image:title></image:image><lastmod>2025-03-10T21:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://shepherdsecurity.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-13T01:01:15+00:00</lastmod></url></urlset>
