<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://kindssecurity.com/</loc></url>
<url><loc>https://kindssecurity.com/case-study-ridgeline</loc></url>
<url><loc>https://kindssecurity.com/case-study-meridian</loc></url>
<url><loc>https://kindssecurity.com/case-study-lakeview-medical-group</loc></url>
<url><loc>https://kindssecurity.com/case-study</loc></url>
<url><loc>https://kindssecurity.com/privacy-policy</loc></url>
<url><loc>https://kindssecurity.com/contact</loc></url>
<url><loc>https://kindssecurity.com/changelog</loc></url>
<url><loc>https://kindssecurity.com/tos</loc></url>
<url><loc>https://kindssecurity.com/blog/email-security</loc></url>
<url><loc>https://kindssecurity.com/blog/artificial-intelligence</loc></url>
<url><loc>https://kindssecurity.com/blog/human-risk-management</loc></url>
<url><loc>https://kindssecurity.com/blog</loc></url>
<url><loc>https://kindssecurity.com/trust-center</loc></url>
<url><loc>https://kindssecurity.com/pricing</loc></url>
<url><loc>https://kindssecurity.com/glossary</loc></url>
<url><loc>https://kindssecurity.com/how-i-went-from-7-hours-a-month-to-zero-hours-a-month-managing-sat-with-kinds-copy</loc></url>
<url><loc>https://kindssecurity.com/blog/security-awareness-training-requirements-by-compliance-framework</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-glba-ftc-safeguards-rule-audit</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-hipaa-audit</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-pci-dss-audit</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-nist-800-53-assessment</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-nydfs-part-500-examination</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-cyber-insurance-questionnaire</loc></url>
<url><loc>https://kindssecurity.com/blog/what-soc-2-requires-for-security-awareness-training</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-iso-27001-audit</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-document-security-awareness-training-for-your-cmmc-audit</loc></url>
<url><loc>https://kindssecurity.com/blog/why-every-phishing-simulator-has-false-positives-except-one</loc></url>
<url><loc>https://kindssecurity.com/blog/knowbe4-alternatives-for-msps-in-2026</loc></url>
<url><loc>https://kindssecurity.com/blog/the-37-year-evolution-of-security-awareness-training</loc></url>
<url><loc>https://kindssecurity.com/blog/how-to-reduce-the-number-of-paid-seats</loc></url>
<url><loc>https://kindssecurity.com/blog/the-best-security-awareness-training-for-delve-users</loc></url>
<url><loc>https://kindssecurity.com/blog/is-knowbe4-worth-it-in-2026-inside-the-1.9-star-trustpilot-rating</loc></url>
<url><loc>https://kindssecurity.com/blog/the-evolution-of-security-awareness-training</loc></url>
<url><loc>https://kindssecurity.com/blog/deepfake-landscape-reveals-criminal-evolution</loc></url>
<url><loc>https://kindssecurity.com/blog/educating-your-employees-on-impersonation-threats</loc></url>
<url><loc>https://kindssecurity.com/blog/kinds-security-vs-terranova-hrm-comparison</loc></url>
<url><loc>https://kindssecurity.com/blog/why-personalization-makes-all-the-difference</loc></url>
<url><loc>https://kindssecurity.com/blog/why-msps-outsource-email-security-7-key-benefits</loc></url>
<url><loc>https://kindssecurity.com/blog/10-worst-password-storage-mistakes-hackers-love</loc></url>
<url><loc>https://kindssecurity.com/blog/the-future-of-phishing-with-kinds-security</loc></url>
<url><loc>https://kindssecurity.com/blog/the-art-of-crafting-the-perfect-spear-phish</loc></url>
<url><loc>https://kindssecurity.com/blog/top-10-human-risk-management-experiences-in-2025</loc></url>
<url><loc>https://kindssecurity.com/blog/email-invoice-scam-a-real-world-breakdown</loc></url>
<url><loc>https://kindssecurity.com/blog/what-is-email-security</loc></url>
<url><loc>https://kindssecurity.com/blog/how-is-genai-used-in-phishing-campaigns</loc></url>
<url><loc>https://kindssecurity.com/blog/how-is-malware-shared-through-emails</loc></url>
<url><loc>https://kindssecurity.com/blog/what-is-phishing</loc></url>
<url><loc>https://kindssecurity.com/blog/what-is-human-risk-management</loc></url>
<url><loc>https://kindssecurity.com/blog/security-training-fails-2025</loc></url>
<url><loc>https://kindssecurity.com/blog/ai-personalized-security-training</loc></url>
<url><loc>https://kindssecurity.com/blog/hipaa-security-training-healthcare</loc></url>
<url><loc>https://kindssecurity.com/blog/knowbe4-alternatives-performance</loc></url>
<url><loc>https://kindssecurity.com/blog/why-short-frequent-security-training-outperforms-annual-compliance-sessions</loc></url>
<url><loc>https://kindssecurity.com/blog/employees-clicking-phishing-after-training</loc></url>
<url><loc>https://kindssecurity.com/blog/nist-800-50-compliant-training</loc></url>
<url><loc>https://kindssecurity.com/blog/role-based-security-training-examples</loc></url>
<url><loc>https://kindssecurity.com/blog/monthly-vs-quarterly-training</loc></url>
<url><loc>https://kindssecurity.com/blog/free-trial-enterprise-security</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-are-phishing-red-flags</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-is-a-gift-card-scam</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-is-a-romance-scam</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-is-a-tech-support-scam</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-is-a-voice-cloning-attack</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-is-a-watering-hole-attack</loc></url>
<url><loc>https://kindssecurity.com/glossary/what-is-role-based-security-training</loc></url>
</urlset>