<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://oit.utk.edu/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='April 6, 2026 1:05 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://oit.utk.edu/security/tools/</loc>
		<lastmod>2026-02-24T14:50:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/tools/awareness/</loc>
		<lastmod>2026-03-31T13:24:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/policies-procedures/</loc>
		<lastmod>2025-03-26T21:00:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/tools/phishing/</loc>
		<lastmod>2026-03-30T14:44:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/tools/phishing/bait/</loc>
		<lastmod>2026-02-10T15:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/tools/tips-for-protecting-your-ut-accounts/</loc>
		<lastmod>2025-09-02T15:16:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/tools/writing-non-phishy-emails-dos-and-donts/</loc>
		<lastmod>2019-12-05T18:52:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/tools/tips-for-working-remotely/</loc>
		<lastmod>2026-04-01T20:00:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/theres-no-security-without-u/</loc>
		<lastmod>2025-04-07T18:42:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/phishing-ourselves/</loc>
		<lastmod>2026-03-25T13:53:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/its-tax-season-dont-be-a-victim/</loc>
		<lastmod>2026-03-10T11:49:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/ways-to-spot-a-scam/</loc>
		<lastmod>2025-03-25T17:39:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/ive-been-hacked/</loc>
		<lastmod>2025-03-25T18:18:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/dont-be-a-victim-of-cyber-crime/</loc>
		<lastmod>2026-02-09T14:59:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/refuse-the-bait/</loc>
		<lastmod>2026-03-06T15:31:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cyber-security-101-insider-threat/</loc>
		<lastmod>2023-05-31T18:49:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/events-in-eastern-europe/</loc>
		<lastmod>2023-05-31T18:48:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/data-loss-prevention-dlp/</loc>
		<lastmod>2025-04-07T18:38:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cybersecuritywhy/</loc>
		<lastmod>2023-05-31T18:38:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/compromised-workstations-laptops/</loc>
		<lastmod>2023-05-31T18:37:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-social-engineering/</loc>
		<lastmod>2023-05-31T18:35:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/incident-what/</loc>
		<lastmod>2023-05-31T18:34:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/steps-for-staying-secure-in-these-scary-times/</loc>
		<lastmod>2026-03-27T15:27:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/file-sharing-options-for-sensitive-information/</loc>
		<lastmod>2026-03-10T12:19:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/security-topic-of-the-week/</loc>
		<lastmod>2025-03-25T18:21:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/how-do-cybercriminals-make-an-email-sound-so-authentic/</loc>
		<lastmod>2026-03-02T21:40:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/plans-and-programs-and-controls-oh-my/</loc>
		<lastmod>2026-03-27T15:14:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/look-no-hands-let-oit-continuously-monitor-your-systems/</loc>
		<lastmod>2023-05-31T18:23:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/are-my-documents-secure-in-the-cloud/</loc>
		<lastmod>2023-06-19T16:38:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/context-is-everything/</loc>
		<lastmod>2023-05-31T18:20:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/considering-social-media-privacy/</loc>
		<lastmod>2023-05-31T18:19:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cyber-security-101-insider-threats/</loc>
		<lastmod>2023-05-31T18:19:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/risk-why-we-emphasize-information-security/</loc>
		<lastmod>2023-05-31T18:17:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/you-are-the-target-noreallyyou-are/</loc>
		<lastmod>2026-02-20T16:41:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/security-terms/</loc>
		<lastmod>2026-03-27T15:17:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/no-really-you-are-a-target/</loc>
		<lastmod>2024-11-13T19:14:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/dont-become-a-victim/</loc>
		<lastmod>2023-05-31T18:08:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/zelle-fraud-alert/</loc>
		<lastmod>2023-05-31T18:05:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/news-related-scams/</loc>
		<lastmod>2023-05-31T18:07:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/its-the-simple-things/</loc>
		<lastmod>2024-07-16T15:43:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cybersecurity-awareness-month-2022/</loc>
		<lastmod>2026-03-10T12:16:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/4-easy-steps-to-stay-secure-online/</loc>
		<lastmod>2025-09-25T15:46:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/malvertising/</loc>
		<lastmod>2023-05-31T17:57:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/student-loan-relief-programs/</loc>
		<lastmod>2025-03-25T18:23:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/exam-time/</loc>
		<lastmod>2023-05-31T17:51:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cryptocurrency/</loc>
		<lastmod>2023-05-31T17:46:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/clone-phishing-scams/</loc>
		<lastmod>2025-09-25T15:52:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/tiktok-filter-scams/</loc>
		<lastmod>2023-05-31T17:32:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/homoglyphs-and-unicodes-no-not-unicorns/</loc>
		<lastmod>2023-05-31T17:28:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/you-broke-facebook/</loc>
		<lastmod>2023-05-31T17:24:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/tax-time/</loc>
		<lastmod>2026-03-27T15:13:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/beware-of-scams-related-to-recent-earthquakes/</loc>
		<lastmod>2023-05-31T16:45:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/there-was-phishing-then-there-was-smishing/</loc>
		<lastmod>2023-05-31T17:26:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/it-or-cybercriminal/</loc>
		<lastmod>2025-03-25T17:53:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/keep-it-private-and-separate/</loc>
		<lastmod>2026-03-25T12:05:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cybercriminal-at-your-door/</loc>
		<lastmod>2023-05-31T16:15:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/compromised-workstations/</loc>
		<lastmod>2025-03-25T18:11:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/high-profile-scams/</loc>
		<lastmod>2023-05-31T16:20:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/ai-phishbait/</loc>
		<lastmod>2023-05-31T16:19:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/linktree-scam-2/</loc>
		<lastmod>2026-03-27T15:07:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/ransomware/</loc>
		<lastmod>2023-05-31T16:06:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/watch-out-fednow-scams/</loc>
		<lastmod>2023-09-05T18:04:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/</loc>
		<lastmod>2026-03-30T16:25:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/</loc>
		<lastmod>2026-02-18T18:53:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/smishing-for-bank-information/</loc>
		<lastmod>2026-03-27T15:09:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/security-glossary/</loc>
		<lastmod>2023-06-01T19:32:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/paypal-payment-ploy-2/</loc>
		<lastmod>2026-04-01T14:33:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/permission-to-hack/</loc>
		<lastmod>2024-07-16T16:00:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/chatgpt/</loc>
		<lastmod>2023-09-05T18:07:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/pretexting/</loc>
		<lastmod>2023-09-05T18:08:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/phishing-with-images/</loc>
		<lastmod>2023-09-05T18:05:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/call-800-cybercriminal/</loc>
		<lastmod>2023-09-05T18:10:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/zip-domains/</loc>
		<lastmod>2023-09-05T18:12:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/cybercriminals-and-barbie/</loc>
		<lastmod>2023-09-05T18:12:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/avoid-social-media-mistakes/</loc>
		<lastmod>2023-09-05T18:23:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-importance-of-information-security/</loc>
		<lastmod>2025-03-14T14:36:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/safeguarding-your-online-presence-a-guide-to-secure-social-media-use/</loc>
		<lastmod>2025-03-25T18:20:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/safeguard-your-data-in-the-cloud/</loc>
		<lastmod>2025-03-25T18:20:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/safeguarding-against-qr-code-fishing/</loc>
		<lastmod>2025-03-25T18:20:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/a-cyber-security-guide-for-higher-ed/</loc>
		<lastmod>2025-03-25T17:34:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/protecting-your-digital-world-defeating-mfa-fatigue/</loc>
		<lastmod>2025-03-25T17:50:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/safeguarding-against-qr-code-fishing-2/</loc>
		<lastmod>2024-07-16T15:36:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/secure-file-sharing-in-microsoft-365/</loc>
		<lastmod>2025-07-24T16:21:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/beware-of-fake-update-pop-ups/</loc>
		<lastmod>2025-03-25T17:37:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/protecting-against-malware-concealed-in-png-images/</loc>
		<lastmod>2023-12-21T19:04:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/holiday-cybersecurity-tips-2023/</loc>
		<lastmod>2025-03-25T18:18:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/avoiding-scammers/</loc>
		<lastmod>2025-03-25T17:36:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/understanding-cybersecurity-a-glossary-for-everyone/</loc>
		<lastmod>2025-03-25T17:40:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/it-security-a-recent-real-world-attack/</loc>
		<lastmod>2024-07-16T15:35:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/internet-of-things/</loc>
		<lastmod>2025-03-25T18:11:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/data-security-on-your-phone/</loc>
		<lastmod>2024-01-12T21:10:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/use-approved-anti-malware-software/</loc>
		<lastmod>2026-03-30T15:46:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/browser-extensions/</loc>
		<lastmod>2025-03-25T18:11:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/sms-scams/</loc>
		<lastmod>2026-02-09T15:00:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/understandinig-aups/</loc>
		<lastmod>2025-03-25T17:41:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/install-only-approved-software/</loc>
		<lastmod>2024-02-19T16:37:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/mfa-fatigue/</loc>
		<lastmod>2025-03-25T17:55:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/password-managers/</loc>
		<lastmod>2024-03-01T19:59:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/data-loss-prevention/</loc>
		<lastmod>2025-03-25T17:40:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/zero-day-vulnerabilities/</loc>
		<lastmod>2025-03-25T18:22:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/protecting-your-virtual-machines/</loc>
		<lastmod>2024-04-30T20:53:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/lessons-from-recent-university-breaches/</loc>
		<lastmod>2024-07-16T15:32:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/incident-reporting-and-response/</loc>
		<lastmod>2024-11-13T19:15:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/avoiding-shared-accounts/</loc>
		<lastmod>2025-03-25T17:31:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/ai-machine-learning-risks-in-cybersecurity/</loc>
		<lastmod>2024-04-30T20:55:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/keeping-our-devices-safe-with-mod1/</loc>
		<lastmod>2024-05-03T20:13:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/understanding-qr-code-phishing/</loc>
		<lastmod>2024-07-16T15:44:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/keeping-your-web-browser-updated/</loc>
		<lastmod>2024-07-16T15:44:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/strengthening-information-security-why-it-matters/</loc>
		<lastmod>2024-07-16T16:02:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/microsoft-defender/</loc>
		<lastmod>2025-03-25T17:38:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-importance-of-reporting-incidents-to-oit/</loc>
		<lastmod>2025-05-23T22:20:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/guide-to-incident-response-planning/</loc>
		<lastmod>2025-03-25T17:42:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/secure-data-management-cybersecurity/</loc>
		<lastmod>2025-03-25T18:20:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-essential-role-of-security-awareness-training/</loc>
		<lastmod>2024-07-16T15:34:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/navigating-the-crowdstrike-incident/</loc>
		<lastmod>2024-07-28T23:40:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/understanding-the-latest-cyber-threats/</loc>
		<lastmod>2025-03-25T17:39:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/protecting-university-owned-devices-from-infostealers/</loc>
		<lastmod>2024-10-07T19:43:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/understanding-the-national-public-data-breach/</loc>
		<lastmod>2025-03-25T17:39:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/secure-file-transfer/</loc>
		<lastmod>2025-04-07T18:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/tips-for-securing-macros-on-macos/</loc>
		<lastmod>2025-03-25T18:24:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/tips-for-securing-windows/</loc>
		<lastmod>2025-03-25T18:25:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-encryption/</loc>
		<lastmod>2024-10-07T19:38:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/reporting-cybercrime/</loc>
		<lastmod>2025-03-25T18:19:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/stay-safe-online-when-using-ai/</loc>
		<lastmod>2025-03-25T18:23:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/tips-for-securing-linux/</loc>
		<lastmod>2025-03-25T18:24:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-importance-of-software-updates/</loc>
		<lastmod>2024-11-18T18:47:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/managing-permissions-on-mobile-phones/</loc>
		<lastmod>2025-03-25T18:19:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-zero-trust/</loc>
		<lastmod>2024-12-09T21:06:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-open-source-intelligence/</loc>
		<lastmod>2024-12-16T15:20:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/privacy-concerns-with-onboard-ai-apple-intelligence/</loc>
		<lastmod>2025-03-25T18:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/privacy-concerns-with-onboard-ai-microsoft-copilot/</loc>
		<lastmod>2025-03-25T18:19:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/policies-and-procedures-security-plan-archive-info/</loc>
		<lastmod>2025-01-22T16:56:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/privacy-onboard-ai-google-gemini/</loc>
		<lastmod>2025-01-27T16:35:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/safeguarding-your-remote-work/</loc>
		<lastmod>2026-01-12T21:50:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/be-careful-in-the-deepseek/</loc>
		<lastmod>2025-02-21T00:57:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-mindset-of-a-hacker/</loc>
		<lastmod>2025-03-24T19:47:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-need-to-replace-sms-based-mfa/</loc>
		<lastmod>2025-03-25T18:09:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/blueteamer/</loc>
		<lastmod>2025-03-24T19:39:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/reporting-phishing-email/</loc>
		<lastmod>2025-03-03T14:52:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/red-teamer/</loc>
		<lastmod>2025-03-10T15:39:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-a-purple-teamer/</loc>
		<lastmod>2025-03-24T11:52:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/spring-cleaning/</loc>
		<lastmod>2025-03-25T18:23:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-a-pentester/</loc>
		<lastmod>2025-04-07T17:33:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-a-data-broker/</loc>
		<lastmod>2025-04-14T17:19:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/social-engineering-examples-and-avoiding-them/</loc>
		<lastmod>2025-04-28T15:22:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/what-is-a-bug-bounty-hunter/</loc>
		<lastmod>2025-05-05T05:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/phishing-health-awareness/</loc>
		<lastmod>2026-02-25T19:00:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/passwords-passwords-everywhere/</loc>
		<lastmod>2026-03-30T15:58:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/can-you-identify-a-phishing-email/</loc>
		<lastmod>2025-06-04T17:50:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/identify-a-phishing-website/</loc>
		<lastmod>2025-06-10T03:15:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/what-is-passwordless-authentication/</loc>
		<lastmod>2025-07-09T15:15:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/physical-security-tips-while-traveling/</loc>
		<lastmod>2025-07-15T04:33:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/easy-steps-to-secure-your-android-smartphone/</loc>
		<lastmod>2025-08-01T16:24:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/how-to-secure-iphone-smartphone/</loc>
		<lastmod>2025-08-11T02:13:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/phishing-scam-simulation/</loc>
		<lastmod>2026-03-10T11:48:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/5-cybersecurity-habits-for-a-safer-campus/</loc>
		<lastmod>2026-03-17T17:37:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/dont-delete-that-suspicious-email/</loc>
		<lastmod>2025-10-06T19:40:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-rising-threat-of-ai-voice-cloning/</loc>
		<lastmod>2025-10-21T11:40:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/why-you-should-lock-your-screen/</loc>
		<lastmod>2026-04-01T19:58:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/agentic-ai-browsers-and-associated-risks/</loc>
		<lastmod>2025-11-03T18:19:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/tech-support-scams/</loc>
		<lastmod>2025-11-11T14:51:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/phishing-and-phishing-and-phishing-2/</loc>
		<lastmod>2025-11-19T18:15:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/if-it-sounds-too-good-to-be-true/</loc>
		<lastmod>2025-12-09T16:26:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/two-factor-authentication-2fa-prompt-bombing/</loc>
		<lastmod>2026-01-26T18:38:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/obscured-obfuscated-links/</loc>
		<lastmod>2026-02-09T17:51:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/the-importance-of-password-rotation/</loc>
		<lastmod>2026-02-13T21:34:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/spotting-and-avoiding-phishing-attacks/</loc>
		<lastmod>2026-02-19T20:01:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/typosquatting/</loc>
		<lastmod>2026-03-05T13:06:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://oit.utk.edu/security/learning-library/article-archive/secure-travel-tips/</loc>
		<lastmod>2026-03-23T19:06:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.7</priority>
	</url>
</urlset><!-- Request ID: 9800d6fed7041284bbc9897e0f90b8ba; Queries for sitemap: 7; Total queries: 47; Seconds: 0.02; Memory for sitemap: 1KB; Total memory: 12MB -->
