<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 10:30 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://roundhousecyber.io/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Roundhouse Cyber</title>
		<link><![CDATA[https://roundhousecyber.io]]></link>
		<description><![CDATA[Roundhouse Cyber]]></description>
		<lastBuildDate><![CDATA[Wed, 05 Mar 2025 11:02:59 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://roundhousecyber.io/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://roundhousecyber.io/edr-what-it-is-and-why-you-need-it/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/edr-what-it-is-and-why-you-need-it/]]></link>
			<title>EDR: What it is and why you need it</title>
			<pubDate><![CDATA[Wed, 05 Mar 2025 11:02:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/case-study/opto-financial-cybersecurity-audit-case-study/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/case-study/opto-financial-cybersecurity-audit-case-study/]]></link>
			<title>Opto Financial: Cybersecurity Audit Case Study</title>
			<pubDate><![CDATA[Mon, 08 Dec 2025 14:11:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/how-hackers-evade-anti-virus-software/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/how-hackers-evade-anti-virus-software/]]></link>
			<title>How Hackers Evade Anti-Virus Software</title>
			<pubDate><![CDATA[Wed, 12 Mar 2025 11:44:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/email-security-tips/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/email-security-tips/]]></link>
			<title>Email Security Tips</title>
			<pubDate><![CDATA[Tue, 07 Oct 2025 10:37:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/case-study/swoopos-cyber-essentials-case-study/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/case-study/swoopos-cyber-essentials-case-study/]]></link>
			<title>SwooPOS : Cyber Essentials Case Study</title>
			<pubDate><![CDATA[Mon, 08 Dec 2025 14:11:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/case-study/an-even-better-place-to-work-cybersecurity-cyber-risk-diagnostics/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/case-study/an-even-better-place-to-work-cybersecurity-cyber-risk-diagnostics/]]></link>
			<title>An Even Better Place To Work: Cybersecurity &#038; Cyber Risk Diagnostics</title>
			<pubDate><![CDATA[Mon, 08 Dec 2025 14:07:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/why-you-need-enterprise-anti-virus/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/why-you-need-enterprise-anti-virus/]]></link>
			<title>Why You Need Enterprise Anti-Virus</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 10:40:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/remote-working-cyber-threats-a-guide-for-digital-nomads-ex-pats/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/remote-working-cyber-threats-a-guide-for-digital-nomads-ex-pats/]]></link>
			<title>Remote Working Cyber Threats: A Guide for Digital Nomads &amp; Ex-Pats</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 08:50:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/cybersecurity-training-top-5-courses-to-consider-for-2025/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/cybersecurity-training-top-5-courses-to-consider-for-2025/]]></link>
			<title>Cybersecurity Training: Top 5 Courses to consider for 2025</title>
			<pubDate><![CDATA[Fri, 17 Jan 2025 12:34:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/anti-virus-or-endpoint-detection-response-which-is-your-best-choice-and-why/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/anti-virus-or-endpoint-detection-response-which-is-your-best-choice-and-why/]]></link>
			<title>Anti-Virus or Endpoint Detection &amp; Response &#8211; Which is your best choice and why?</title>
			<pubDate><![CDATA[Fri, 04 Jul 2025 09:33:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/the-importance-of-strong-passwords-tips-for-creating-and-managing-them-2/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/the-importance-of-strong-passwords-tips-for-creating-and-managing-them-2/]]></link>
			<title>The Importance of Strong Passwords: Tips for Creating and Managing them</title>
			<pubDate><![CDATA[Wed, 21 Feb 2024 10:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/securing-your-home-network-essential-steps-for-cyber-protection-2/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/securing-your-home-network-essential-steps-for-cyber-protection-2/]]></link>
			<title>Securing your Home Network: Essential Steps for Cyber Protection</title>
			<pubDate><![CDATA[Wed, 07 Feb 2024 11:52:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/social-media-safety-tips-for-keeping-your-personal-information-private-2/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/social-media-safety-tips-for-keeping-your-personal-information-private-2/]]></link>
			<title>Social Media Safety: Tips for Keeping Your Personal Information Private</title>
			<pubDate><![CDATA[Wed, 31 Jan 2024 15:00:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/terms-and-conditions-policy/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/terms-and-conditions-policy/]]></link>
			<title>Terms and Conditions</title>
			<pubDate><![CDATA[Wed, 20 Sep 2023 05:36:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/testimonial/cyber-crime-cost/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/testimonial/cyber-crime-cost/]]></link>
			<title>Cyber crime cost</title>
			<pubDate><![CDATA[Tue, 30 May 2023 15:41:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/testimonial/nearly-1-billion-emails/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/testimonial/nearly-1-billion-emails/]]></link>
			<title>Nearly 1 billion emails</title>
			<pubDate><![CDATA[Tue, 30 May 2023 15:41:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/testimonial/attacks-aimed/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/testimonial/attacks-aimed/]]></link>
			<title>Attacks Aimed</title>
			<pubDate><![CDATA[Tue, 30 May 2023 15:41:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/phishing-scams-how-to-identify-and-avoid-them-2/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/phishing-scams-how-to-identify-and-avoid-them-2/]]></link>
			<title>Phishing Scams: How to Identify and Avoid them</title>
			<pubDate><![CDATA[Tue, 30 Jan 2024 09:23:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 12:01:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/blogs/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/blogs/]]></link>
			<title>Blogs</title>
			<pubDate><![CDATA[Thu, 27 Jul 2023 08:44:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/cookies-policy/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/cookies-policy/]]></link>
			<title>Cookie Policy</title>
			<pubDate><![CDATA[Thu, 14 Sep 2023 12:15:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/case-study/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/case-study/]]></link>
			<title>Case Study</title>
			<pubDate><![CDATA[Thu, 11 Jan 2024 13:24:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/hello-world/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/hello-world/]]></link>
			<title>Protecting Your Digital Identity: Cybersecurity Best Practices</title>
			<pubDate><![CDATA[Mon, 15 Jan 2024 17:41:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/privacy-policy/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/privacy-policy/]]></link>
			<title>Privacy Policy for Roundhouse Cyber</title>
			<pubDate><![CDATA[Fri, 19 Jan 2024 14:10:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/case-study/case-study-1/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/case-study/case-study-1/]]></link>
			<title>Cybersecurity Posture Improvement Case Study</title>
			<pubDate><![CDATA[Fri, 05 Jan 2024 14:02:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/testimonial/cost-of-cybercrime/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/testimonial/cost-of-cybercrime/]]></link>
			<title>Cost of cybercrime</title>
			<pubDate><![CDATA[Tue, 30 May 2023 15:40:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/testimonial/ethical-hackers/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/testimonial/ethical-hackers/]]></link>
			<title>Ethical hackers</title>
			<pubDate><![CDATA[Tue, 30 May 2023 15:40:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://roundhousecyber.io/blog/]]></guid>
			<link><![CDATA[https://roundhousecyber.io/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sat, 22 Jul 2023 07:08:01 +0000]]></pubDate>
		</item>
				</channel>
</rss>
