<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.sh.consulting</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/services/email-security</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/services/security-research</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/services/email-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/services/system-consolidation</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/about-us</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/contact</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/security-terms</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/case-studies</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/2-3-million-emails-one-exposed-api-key-10k-bill</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/accesspay-dmarc-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/analyzing-google-postmaster-unexpected-spam-report-spikes</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/avoid-homoglyphs-in-html-to-prevent-email-spam-issues</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/backscatter-injection-attacks-exploiting-legitimate-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/choose-the-right-domain-to-improve-email-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/client-ignoring-evidence-of-targeted-spoofing-attacks</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/cloudflare-dmarc-cname-txt-conflict</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/cloudflare-dmarc-documentation-exposed-domain</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/cloudflare-dmarc-documentation-third-party-example-exposure</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/cloudflare-outage-disrupts-multiple-services-including-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/consistent-deliverability-maximizes-results-even-on-basic-plans</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/crm-email-rejections-caused-by-missing-dkim-and-dmarc-settings</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/dmarc-enforcement-guide-moving-from-none-to-reject-without-breaking-email</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/dmarc-p-reject-reduces-spoofing-but-doesnt-guarantee-full-protection</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/dmarc-reject-blocks-spoofing-attempt-on-personal-domain</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/email-deliverability-audit-what-it-is-and-when-you-need-one</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/email-deliverability-higher-barrier-than-it</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/email-deliverability-isnt-about-engagement-its-about-security</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/email-open-rates-drop-after-domain-verification</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/email-security-is-the-foundation-of-email-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/expanding-from-real-estate-to-enterprise-email-security-and-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/first-look-at-google-postmaster----what-you-should-do</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/gmail-emails-going-to-spam-fix</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-dmarc-reports-stopped-since-april-13</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-gmail-api-scam-dmarc-passed-no-account-compromise</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-postmaster-updates-spam-complaint-visualization</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-postmaster-v1-deprecation-impact-on-email-deliverability-and-security</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-postmaster-v2-api-v1-deprecation</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-yahoo-email-regulations----june-1-compliance-deadline</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/google-yahoo-email-regulations-prepare-dkim-spf-and-dmarc-compliance</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/hazy-hawk-hijacked-subdomains-mit-harvard-stanford-us-universities</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/hidden-spf-abuse-via-look-alike-sendgrid-domain</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-a-dmarc-misconfiguration-exposed-sensitive-email-data</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-a-fake-bank-transfer-email-nearly-fooled-me</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-a-rare-3-character-domain-exposes-the-reality-of-email-spoofing</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-a-single-dmarc-misconfiguration-can-trigger-an-email-based-ddos</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-long-will-google-own-gmail-com</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-misconfigured-dmarc-can-enable-email-based-dos-attacks</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-saas-platforms-accidentally-enable-spam-and-phishing</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-threat-actors-exploit-redirect-chains-to-bypass-spam-filters</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-to-handle-bounces-and-blocks-properly</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-to-properly-add-new-domains-in-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-to-protect-your-domain-and-email-when-switching-saas-providers</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/how-to-safely-manage-high-volume-email-campaigns</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/invalid-dmarc-rua-addresses-should-be-penalized</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/is-external-destination-verification-required-for-dmarc-reporting</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/mailchimp-auto-dkim-can-overwrite-strict-dmarc-policies</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/mailchimp-sending-non-authenticated-emails-despite-dkim-and-dmarc</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/mailchimp-spf-misconfigurations-can-expose-domains-to-spoofing</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/massive-phishing-campaign-targets-yahoo-using-clients-domain</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/microsoft-365-groups-bypass-dmarc-exposing-organizations-to-spoofing</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/microsoft-and-google-dmarc-reports-ignore-syntax-errors</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/microsoft-begins-rejecting-emails-without-proper-authentication</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/microsoft-dmarc-reports-expose-recipient-domains---a-critical-risk</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/monthly-database-cleanup-boost-email-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/namecheap-dns-ttl-limit-creates-microsoft-dkim-challenges</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/never-let-your-domain-expire</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/new-sendgrid-dedicated-ip-immediately-listed-on-dns-blacklists</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/office-365-send-mail-as-issues-with-proofpoint-and-gmail</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/office-365-smtp-issues-with-proofpoint-and-gmail-send-mail-as</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/phishing-alert-netflix-subscription-cancellation-scams-on-the-rise</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/phishing-attacks-highlight-need-for-mandatory-email-security-training</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/phishing-attempt-exploits-server-without-spf-or-dmarc</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/phishing-via-compromised-sendgrid-accounts-bypasses-traditional-authentication</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/security-is-only-as-strong-as-the-weakest-engineer</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/sendgrid-2fa-issue-locks-access-to-50-client-accounts</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/sendgrid-deliverability-problems-common-issues-and-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/sendgrid-professional-services-vs-independent-email-deliverability-consulting</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/shared-chatgpt-links-can-expose-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/spoofed-appsheet-email-highlights-limits-of-dkim-spf-and-dmarc</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/subdomain-takeover-campaign-edu-universities</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/surbl-blacklist-explained-why-listed-and-how-to-remove</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/suspicious-google-calendar-emails-trigger-dmarc-failures</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/targeted-phishing-exploits-real-time-delivery-data-at-major-logistics-company</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/the-challenges-of-enforcing-dmarc-p-reject-in-modern-email-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/the-risks-of-abruptly-enforcing-dmarc-p-reject-in-organizations</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/unauthorized-dns-changes-suggest-possible-godaddy-issue</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/unexpected-dmarc-reports-flood-emvdmarc-com-after-domain-acquisition</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/urgent-email-list-cleanup-avoid-deliverability-issues</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/vendor-dns-control-dmarc-risk</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/when-esp-setup-instructions-break-your-dmarc-protection</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/when-gradual-sending-doesnt-prevent-spam-folder-placement</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/when-marketing-and-engineering-disconnect-at-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/when-to-separate-marketing-email-from-your-crm</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-dmarc-reports-dont-always-reveal-spoofing-activity</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-downgrading-dmarc-policies-puts-brands-at-risk</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-deliverability-complexity-can-be-an-advantage</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-has-so-many-rules</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-open-rates-and-click-through-rates-can-be-misleading</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-reputation-fixer-tools-usually-make-things-worse</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-security-and-compliance-matter-more-than-authentication</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-templates-must-stay-under-102kb</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-email-warm-up-is-critical-for-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-enforcing-broken-dmarc-models-harms-email-security-and-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-gmail-blocks-sending-after-just-a-few-emails</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-godaddys-enforced-dmarc-policies-raise-serious-security-and-privacy-concerns</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-google-groups-can-be-a-security-risk-for-shared-emails</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-google-removed-the-ip-reputation-graph-from-postmaster-tools</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-ignoring-email-deliverability-can-ruin-your-marketing-roi</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-low-volume-spoofing-is-still-a-serious-risk</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-regular-password-changes-still-matter-in-real-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-reusing-passwords-is-dangerous-the-justdropped-example</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-routing-crm-emails-through-a-third-party-esp-can-hurt-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-small-batch-emails-can-trigger-gmail-sending-limits</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-some-domains-are-heavily-spoofed-while-others-are-safe</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-spam-trigger-words-dont-actually-exist</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-subdomain-dmarc-policies-are-often-unnecessary</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-sudden-newsletter-volume-spikes-damage-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-top-level-domains-still-matter-for-email-deliverability</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-you-should-avoid-hosting-dns-zones-with-wix</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/why-your-emails-are-going-to-spam-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/yahoo-cfl-domains-not-recognized-by-mailchimp-spam-reports</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/yahoo-postmaster-updates-help-monitor-spam-reports-effectively</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/blog/yahoo-rejecting-forwarded-emails-due-to-authentication-failures</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/case-studies/ashton-real-estate-group</loc>
    </url>
    <url>
        <loc>https://www.sh.consulting/case-studies/legacy-real-estate-team</loc>
    </url>
</urlset>