<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 5, 2026 at 1:22 pm by All in One SEO v4.9.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://matthewkatzer.theeasypreybook.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Matthew Katzer | The Easy Prey Book</title>
		<link><![CDATA[https://matthewkatzer.theeasypreybook.com]]></link>
		<description><![CDATA[Matthew Katzer | The Easy Prey Book]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Jan 2025 23:41:39 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://matthewkatzer.theeasypreybook.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/an-overview-of-gdap/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/an-overview-of-gdap/]]></link>
			<title>An Overview of GDAP</title>
			<pubDate><![CDATA[Wed, 29 Jan 2025 23:41:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/is-your-social-security-number-leaked-heres-how-to-find-out-and-what-to-do-next/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/is-your-social-security-number-leaked-heres-how-to-find-out-and-what-to-do-next/]]></link>
			<title>Is Your Social Security Number Leaked? Here’s How To Find Out And What To Do Next</title>
			<pubDate><![CDATA[Wed, 20 Nov 2024 22:02:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/2025-cybersecurity-predictions-what-to-expect-and-how-to-prepare/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/2025-cybersecurity-predictions-what-to-expect-and-how-to-prepare/]]></link>
			<title>2025 Cybersecurity Predictions: What To Expect And How To Prepare</title>
			<pubDate><![CDATA[Wed, 20 Nov 2024 20:46:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/what-happens-to-your-applications-when-windows-10-support-ends/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/what-happens-to-your-applications-when-windows-10-support-ends/]]></link>
			<title>What Happens To Your Applications When Windows 10 Support Ends?</title>
			<pubDate><![CDATA[Wed, 19 Mar 2025 18:31:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-make-or-break-factor-failing-business-owners-often-miss/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-make-or-break-factor-failing-business-owners-often-miss/]]></link>
			<title>The Make-Or-Break Factor Failing Business Owners Often Miss</title>
			<pubDate><![CDATA[Wed, 19 Mar 2025 18:26:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/new-year-new-tech-top-it-upgrades-to-supercharge-your-business-in-2025/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/new-year-new-tech-top-it-upgrades-to-supercharge-your-business-in-2025/]]></link>
			<title>New Year, New Tech: Top IT Upgrades To Supercharge Your Business In 2025</title>
			<pubDate><![CDATA[Wed, 18 Dec 2024 23:34:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/data-privacy-day-how-to-protect-your-business-from-costly-data-breaches/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/data-privacy-day-how-to-protect-your-business-from-costly-data-breaches/]]></link>
			<title>Data Privacy Day: How To Protect Your Business From Costly Data Breaches</title>
			<pubDate><![CDATA[Wed, 18 Dec 2024 23:24:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/how-to-exclude-sharepoint-files-from-copilot-access/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/how-to-exclude-sharepoint-files-from-copilot-access/]]></link>
			<title>How To Exclude SharePoint Files from Copilot Access</title>
			<pubDate><![CDATA[Wed, 18 Dec 2024 00:25:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/maximizing-security-with-mfa-what-your-sign-in-reports-reveal/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/maximizing-security-with-mfa-what-your-sign-in-reports-reveal/]]></link>
			<title>Maximizing Security with MFA: What Your Sign In Reports Reveal</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 20:00:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/understanding-azure-recovery-service-vaults-rsvs-ensuring-secure-and-reliable-backup-solutions-by-tulasi-nakka/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/understanding-azure-recovery-service-vaults-rsvs-ensuring-secure-and-reliable-backup-solutions-by-tulasi-nakka/]]></link>
			<title>Understanding Azure Recovery Service Vaults (RSVs) : Ensuring Secure and Reliable Backup Solutions By Tulasi Nakka</title>
			<pubDate><![CDATA[Wed, 11 Dec 2024 08:05:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-the-microsoft-purview-ai-hub/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-the-microsoft-purview-ai-hub/]]></link>
			<title>An Introduction To the Microsoft Purview AI Hub</title>
			<pubDate><![CDATA[Wed, 10 Jul 2024 20:53:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/what-is-conditional-access/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/what-is-conditional-access/]]></link>
			<title>What is Conditional Access?</title>
			<pubDate><![CDATA[Wed, 10 Jul 2024 10:17:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/which-licenses-do-i-need-the-differences-between-m365-and-gcc-high/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/which-licenses-do-i-need-the-differences-between-m365-and-gcc-high/]]></link>
			<title>Which Licenses Do I Need? The Differences Between M365 And GCC High</title>
			<pubDate><![CDATA[Wed, 05 Jun 2024 06:43:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-microsoft-copilot-agents/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-microsoft-copilot-agents/]]></link>
			<title>An Introduction to Microsoft Copilot Agents</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 22:50:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/avoid-a-holiday-tech-meltdown-with-better-it/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/avoid-a-holiday-tech-meltdown-with-better-it/]]></link>
			<title>Avoid A Holiday Tech Meltdown With Better IT</title>
			<pubDate><![CDATA[Tue, 22 Oct 2024 15:02:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/6-ways-your-phone-is-tracking-you/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/6-ways-your-phone-is-tracking-you/]]></link>
			<title>6 Ways Your Phone Is Tracking You</title>
			<pubDate><![CDATA[Tue, 22 Oct 2024 15:00:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/a-review-of-the-public-key-infrastructure/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/a-review-of-the-public-key-infrastructure/]]></link>
			<title>A Review of The Public Key Infrastructure</title>
			<pubDate><![CDATA[Tue, 10 Dec 2024 19:10:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/enhancing-device-security-with-guard-a-comprehensive-overview-of-policy-configurations/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/enhancing-device-security-with-guard-a-comprehensive-overview-of-policy-configurations/]]></link>
			<title>Enhancing Device Security with Guard+:  A Comprehensive Overview of Policy Configurations</title>
			<pubDate><![CDATA[Tue, 05 Nov 2024 23:29:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/how-to-manage-volume-licensing-in-the-m365-portal/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/how-to-manage-volume-licensing-in-the-m365-portal/]]></link>
			<title>How To Manage Volume Licensing In The M365 Portal</title>
			<pubDate><![CDATA[Tue, 04 Jun 2024 22:22:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/how-to-beat-the-hackers-this-year/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/how-to-beat-the-hackers-this-year/]]></link>
			<title>How To Beat The Hackers This Year</title>
			<pubDate><![CDATA[Thu, 23 Jan 2025 23:49:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/tracking-defender-antivirus-scans-with-log-analytics-insights-actionable-steps/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/tracking-defender-antivirus-scans-with-log-analytics-insights-actionable-steps/]]></link>
			<title>Tracking Defender Antivirus Scans with Log Analytics  Insights &amp; Actionable Steps</title>
			<pubDate><![CDATA[Thu, 20 Mar 2025 06:25:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/autopilot-for-device-deployment/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/autopilot-for-device-deployment/]]></link>
			<title>Autopilot for Device Deployment</title>
			<pubDate><![CDATA[Thu, 20 Jun 2024 22:47:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/spring-clean-your-computer-network/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/spring-clean-your-computer-network/]]></link>
			<title>Spring-Clean Your Computer Network</title>
			<pubDate><![CDATA[Thu, 20 Feb 2025 16:47:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/a-rising-threat-every-business-owner-needs-to-take-seriously/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/a-rising-threat-every-business-owner-needs-to-take-seriously/]]></link>
			<title>A Rising Threat Every Business Owner Needs To Take Seriously</title>
			<pubDate><![CDATA[Thu, 20 Feb 2025 16:44:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/shadow-it-how-employees-using-unauthorized-apps-could-be-putting-your-business-at-risk/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/shadow-it-how-employees-using-unauthorized-apps-could-be-putting-your-business-at-risk/]]></link>
			<title>Shadow IT: How Employees Using Unauthorized Apps Could Be Putting Your Business At Risk</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:33:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-biggest-mistakes-i-see-business-owners-making-in-it-and-cybersecurity/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-biggest-mistakes-i-see-business-owners-making-in-it-and-cybersecurity/]]></link>
			<title>The Biggest Mistakes I See Business Owners Making In IT And Cybersecurity</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:31:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/sms-or-an-authenticator-app-which-one-is-more-secure/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/sms-or-an-authenticator-app-which-one-is-more-secure/]]></link>
			<title>SMS Or an Authenticator App – Which One Is More Secure?</title>
			<pubDate><![CDATA[Thu, 09 Jan 2025 01:17:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/bulk-emailing-pitfalls-protect-yourself-and-your-business/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/bulk-emailing-pitfalls-protect-yourself-and-your-business/]]></link>
			<title>Bulk Emailing Pitfalls: Protect Yourself and Your Business</title>
			<pubDate><![CDATA[Thu, 08 Aug 2024 23:59:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-licensing-for-defender-vulnerability-management/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-licensing-for-defender-vulnerability-management/]]></link>
			<title>The Licensing For Defender Vulnerability Management</title>
			<pubDate><![CDATA[Thu, 06 Jun 2024 22:54:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/ensuring-email-deliverability/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/ensuring-email-deliverability/]]></link>
			<title>Ensuring Email Deliverability</title>
			<pubDate><![CDATA[Sun, 08 Sep 2024 11:01:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-worlds-largest-cybersecurity-breach/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-worlds-largest-cybersecurity-breach/]]></link>
			<title>The World’s Largest Cybersecurity Breach</title>
			<pubDate><![CDATA[Sat, 20 Jul 2024 03:16:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/are-business-premium-licenses-adequate-for-security/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/are-business-premium-licenses-adequate-for-security/]]></link>
			<title>Are Business Premium Licenses Adequate for Security?</title>
			<pubDate><![CDATA[Sat, 17 Aug 2024 07:43:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/cmmc-maturity-level-2-inheritance-simplified-explanation/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/cmmc-maturity-level-2-inheritance-simplified-explanation/]]></link>
			<title>CMMC Maturity Level 2 Inheritance: Simplified Explanation</title>
			<pubDate><![CDATA[Sat, 01 Mar 2025 00:29:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/was-your-information-compromised-from-the-national-public-data-breach/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/was-your-information-compromised-from-the-national-public-data-breach/]]></link>
			<title>Was Your Information Compromised From The National Public Data Breach?</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 14:14:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-end-is-almost-here-windows-10-will-no-longer-be-supported-as-of-october-2025/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-end-is-almost-here-windows-10-will-no-longer-be-supported-as-of-october-2025/]]></link>
			<title>The End Is Almost Here! Windows 10 Will No Longer Be Supported As Of October 2025</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 14:12:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/latest-update-on-cmmc-2-0/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/latest-update-on-cmmc-2-0/]]></link>
			<title>Latest Update on CMMC 2.0</title>
			<pubDate><![CDATA[Mon, 19 Aug 2024 18:06:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-microsoft-bookings/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-microsoft-bookings/]]></link>
			<title>An Introduction To Microsoft Bookings</title>
			<pubDate><![CDATA[Mon, 10 Jun 2024 15:52:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/national-clean-out-your-computer-day-declutter-your-computer-to-boost-productivity-and-security/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/national-clean-out-your-computer-day-declutter-your-computer-to-boost-productivity-and-security/]]></link>
			<title>National Clean Out Your Computer Day: Declutter Your Computer To Boost Productivity And Security</title>
			<pubDate><![CDATA[Mon, 03 Feb 2025 21:49:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/apple-might-never-have-released-the-macintosh-if-this-happened/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/apple-might-never-have-released-the-macintosh-if-this-happened/]]></link>
			<title>Apple Might Never Have Released The Macintosh If This Happened</title>
			<pubDate><![CDATA[Fri, 31 May 2024 13:49:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-silent-danger-a-powerful-lesson-for-every-business-from-this-1-6-billion-ransomware-attack/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-silent-danger-a-powerful-lesson-for-every-business-from-this-1-6-billion-ransomware-attack/]]></link>
			<title>The Silent Danger: A Powerful Lesson For Every Business From This $1.6 Billion Ransomware Attack</title>
			<pubDate><![CDATA[Fri, 31 May 2024 13:49:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/dangers-of-linkedin-4-security-features-to-use-today/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/dangers-of-linkedin-4-security-features-to-use-today/]]></link>
			<title>Dangers Of LinkedIn: 4 Security Features To Use TODAY</title>
			<pubDate><![CDATA[Fri, 28 Jun 2024 14:35:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/massive-layoffs-in-2024-create-a-serious-threat-to-your-cybersecurity/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/massive-layoffs-in-2024-create-a-serious-threat-to-your-cybersecurity/]]></link>
			<title>Massive Layoffs In 2024 Create A Serious Threat To Your Cybersecurity</title>
			<pubDate><![CDATA[Fri, 28 Jun 2024 14:33:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-the-dmarc/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/an-introduction-to-the-dmarc/]]></link>
			<title>An Introduction To The DMARC</title>
			<pubDate><![CDATA[Fri, 27 Sep 2024 21:46:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/recent-cyber-attacks-highlight-the-urgency-of-strong-cybersecurity-for-all-businesses/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/recent-cyber-attacks-highlight-the-urgency-of-strong-cybersecurity-for-all-businesses/]]></link>
			<title>Recent Cyber-Attacks Highlight The Urgency Of Strong Cybersecurity For All Businesses</title>
			<pubDate><![CDATA[Fri, 26 Jul 2024 13:35:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/outdated-technology-is-costing-your-organization-money/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/outdated-technology-is-costing-your-organization-money/]]></link>
			<title>Outdated Technology Is Costing Your Organization Money</title>
			<pubDate><![CDATA[Fri, 26 Jul 2024 13:33:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/the-crowdstrike-outage-how-to-avoid-a-future-it-crisis/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/the-crowdstrike-outage-how-to-avoid-a-future-it-crisis/]]></link>
			<title>The CrowdStrike Outage: How To Avoid A Future IT Crisis</title>
			<pubDate><![CDATA[Fri, 23 Aug 2024 19:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/microsoft-copilot-techniques-to-boost-business-productivity/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/microsoft-copilot-techniques-to-boost-business-productivity/]]></link>
			<title>Microsoft Copilot Techniques To Boost Business Productivity</title>
			<pubDate><![CDATA[Fri, 23 Aug 2024 19:14:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/an-overview-of-fido-2-keys/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/an-overview-of-fido-2-keys/]]></link>
			<title>An Overview of FIDO 2 Keys</title>
			<pubDate><![CDATA[Fri, 17 Jan 2025 17:24:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/streamlining-endpoint-security-mastering-software-inventory-on-your-devices/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/streamlining-endpoint-security-mastering-software-inventory-on-your-devices/]]></link>
			<title>Streamlining Endpoint Security:  Mastering Software Inventory on Your Devices</title>
			<pubDate><![CDATA[Fri, 06 Sep 2024 22:08:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://matthewkatzer.theeasypreybook.com/simplify-your-cmmc-l1-self-assessment-with-the-kamind-diy-kit/]]></guid>
			<link><![CDATA[https://matthewkatzer.theeasypreybook.com/simplify-your-cmmc-l1-self-assessment-with-the-kamind-diy-kit/]]></link>
			<title>Simplify Your CMMC L1 Self-Assessment with the KAMIND DIY KIT</title>
			<pubDate><![CDATA[Fri, 02 Aug 2024 23:08:12 +0000]]></pubDate>
		</item>
				</channel>
</rss>
