<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8'-->
<!--Jetpack_Sitemap_Buffer_Page_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//golantek.com/sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 <url>
  <loc>https://golantek.com/2025/04/20/introduction-to-social-engineering-navigating-the-human-element-in-cybersecurity/</loc>
  <lastmod>2026-05-04T00:33:00Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/opt-out-preferences/</loc>
  <lastmod>2025-04-22T13:40:25Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/04/28/the-anatomy-of-a-social-engineering-attack-recognize-the-signs-stay-secure/</loc>
  <lastmod>2026-05-04T00:33:00Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/05/05/real-world-alert-how-a-fake-ice-call-nearly-fooled-me-and-how-i-stayed-safe/</loc>
  <lastmod>2026-05-04T00:33:00Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/05/12/social-engineering-in-the-age-of-ai-emerging-threats-and-defense-mechanisms/</loc>
  <lastmod>2026-05-04T00:32:59Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/06/16/prospect-phishing-scam-a-real-world-breakdown/</loc>
  <lastmod>2026-05-04T00:32:59Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/07/15/how-i-managed-to-phish-myself/</loc>
  <lastmod>2026-05-04T00:32:58Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/08/18/qr-codes-convenient-shortcut-or-hackers-backdoor/</loc>
  <lastmod>2026-05-04T00:32:58Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/09/15/the-hidden-costs-of-free-why-free-online-tools-can-be-dangerous/</loc>
  <lastmod>2026-05-04T00:32:57Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/10/15/protecting-yourself-online-what-i-teach-my-family-and-friends-and-what-you-should-too/</loc>
  <lastmod>2026-05-04T00:32:57Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/10/01/special-edition-the-7-cybersecurity-truths-everyone-should-know/</loc>
  <lastmod>2026-05-04T00:32:57Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/11/15/the-new-normal-living-with-constant-deception/</loc>
  <lastmod>2026-05-04T00:32:56Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2025/12/15/2025-the-year-social-engineering-stopped-pretending-to-be-subtle/</loc>
  <lastmod>2026-05-04T00:32:56Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/</loc>
  <lastmod>2026-05-04T02:21:49Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/blog/</loc>
  <lastmod>2026-05-04T00:32:22Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/case-studies/</loc>
  <lastmod>2026-05-04T00:31:54Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/contact/</loc>
  <lastmod>2026-05-04T02:09:03Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2026/03/16/ai-risk-board-briefing-2026/</loc>
  <lastmod>2026-05-04T00:33:01Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2026/01/15/soc-2-86-days-decisions-that-mattered/</loc>
  <lastmod>2026-05-04T00:33:01Z</lastmod>
 </url>
 <url>
  <loc>https://golantek.com/2026/04/15/mcp-gateways-agent-security-governance-pattern/</loc>
  <lastmod>2026-05-04T00:33:02Z</lastmod>
 </url>
</urlset>
