<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.securitymetrics.com</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/reseller</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/security-consulting</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/hipaa-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-program</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/ei3pa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/hitrust</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/ssf-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/p2pe-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/cis-controls-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-small-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/forensics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-small-business-pricing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/health-network-program</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/gdpr-defense</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/anti-virus-essentials</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pulse</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/mobile</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/internal-network-scan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/security-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/hipaa-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/vulnerability-scan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/workforce-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/hipaa-policies</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-policies</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/card-data-discovery</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pii-data-discovery</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/shopping-cart-inspect</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/shopping-cart-monitor</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/webpage-integrity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pin-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/healthcare-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/hipaa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/data-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/industry-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/compliance-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/glossary</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/news</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/about</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/retail-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/contact</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/higher-education-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/financial-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/government-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/hospitality-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/k-12-education-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/program-education/pci-dss-v4-faqs-for-acquirers-and-isos</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/program-education/pci-dss-v4-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/program-education/pci-dss-v4-faqs-for-enterprise-merchants</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/program-education/pci-dss-v4-faqs-for-service-providers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/program-education/pci-dss-v4-ecommerce-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/events</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/careers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/gdpr-rights-request</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/service-providers-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/franchise-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/podcast</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/search</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog-subscription</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/home-page</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/program-product/miva</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/intuit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/cmmc</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/pci-compliance-guide-pcivault</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/aaron-bishop</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/aaron-willis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/adnan-raja</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/ben-christensen</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/brad-caldwell</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/brad-nelson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/brand-barney</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/brandon-bastian</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/brandon-benson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/brittany-woodard</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/caleb-clarke</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/chad-horton</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/chase-palmer</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/christopher-skarda</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/colten-henrie</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/dale-s-laszig</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/david-ellis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/david-page</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/doreen-espinoza</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/dr-mayer-levitt</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/emory-french-folsom</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/gabrielle-harris</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/garrett-adler</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/gary-glover</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/george-mateaki</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/greg-steffen</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/heff</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/ian-eyles</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/jaren-jolley</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/jason-leland</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/jen-stone</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/john-jb-bartholomew</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/joshua-black</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/kelly-rodriguez</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/landry-french</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/lee-pierce</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/marcus-call</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/marcus-clawson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/mark-miner</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/matt-glade</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/matt-halbleib</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/michael-johnson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/michael-maughan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/michael-monsivais</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/michael-ohran</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/michael-simpson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/mike-misasi</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/mike-riesen</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/nathan-cooper</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/robbi-watson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/robert-jorgensen</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/rus-rodeback</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/ryan-marshall</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/scott-robinson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/securitymetrics-cybersecurity-scribes</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/stephen-w-orfei</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/steve-snelgrove</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/terrill-thorn</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/thomas-mccrory</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/tod-ferran</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/todd-hovorka</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/trent-gunderson</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/trevor-hansen</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/wenlock-free</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/authors/winn-oakey</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2019-forensic-predictions-and-what-happened-in-2018</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2020-forensic-predictions-and-what-happened-in-2019</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2021-forensic-predictions-and-what-happened-in-2020</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2021-security-year-review</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2022-forensic-predictions-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2023-forensic-predictions-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/2024-cyber-predictions-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/3-myths-about-pci-compliance-that-cost-you-time</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/3-steps-to-become-hipaa-compliant-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/5-acquirer-tips-for-pci-program-success</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/5-tips-to-pay-less-for-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/5-tips-to-prevent-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/5-tips-train-workforce-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/6-phases-of-an-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/addressing-attack-surfaces</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/ai-in-context-cybersecurity-and-privacy-implications</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/answering-common-pci-dss-questions-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/are-you-ready-for-a-pci-v4-audit-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/artificial-intelligence-opportunities-and-risks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/asset-management-foundational-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/best-practices-for-a-first-time-pci-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/breaking-barriers-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/bridging-the-cybersecurity-skills-gap</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/building-a-resilient-healthcare-system</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/business-continuity-during-a-healthcare-crisis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/buyers-guide-to-pci-dss-ecommerce-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/carving-your-own-cybersecurity-path-growth-beyond-your-first-job</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/choosing-an-mssp</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cloud-security-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cloud-security-best-practices-podcast</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cloud-security-managment-vs-implementation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cmmc-protecting-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/communicating-with-your-it-department</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/complex-regulatory-environments-how-fis-maintains-a-mature-program</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/compliance-mandates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/covid-19-lessons-for-a-secure-remote-workplace</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/current-cyber-threats-and-why-you-should-care</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/current-ocr-and-hipaa-trends-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cybersecurity-as-an-operational-effort</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cybersecurity-burnout</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cybersecurity-for-families</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cybersecurity-fundamentals-why-nist-still-matter-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/cybersecurity-innovation-from-military-to-enterprise</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/data-access-protection-a-critical-part-of-security-securitymetrics-podcast</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/data-breach-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/data-leakage-how-pci-dss-4-0-requirements-help</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/data-privacy-compliance-podcast</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/data-risk-management</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/data-security-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/demystifying-the-acquirers-role-in-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/diversity-and-mentorship-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/easy-breezy-pci-compliance-validation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/ecommerce-security-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/ecommerce-website-spoofing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/eliminating-friction-between-development-and-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/emerging-pci-dss-40-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/emvco-and-pci-how-these-security-standards-support-each-other</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/external-penetration-testing-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/finding-your-path-into-cybersecurity-workforce</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/forensic-analysis-of-2025-and-predictions-for-2026</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/gdpr-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/gdpr-101-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/gdpr-and-ccpa-privacy-changes-and-your-role-in-data-protection</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/gdpr-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/gdpr-compliance-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/gdpr-trends-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/getting-more-from-your-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/guide-to-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hacking-your-career-how-to-become-a-penetration-tester</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/healthcare-it-security-during-the-covid-19-crisis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/healthcare-problems-security-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hhs-405d-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hhs-405d-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-basics-where-to-start-with-practices-and-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-best-practices-for-2019-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-compliance-101-business-associates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-compliance-in-a-year</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-compliance-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-compliant-mobile-devices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-firewall-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-patient-data-security-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-privacy-rule-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-reality-check-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-risk-management-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-testing-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-training-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-uses-and-disclosures</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hipaa-vulnerability-scanning-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-101-answering-your-biggest-questions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-assessment-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-assessment-checklist</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-certification-navigating-challenges-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-certification-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/hitrust-faqs-top-questions-about-hitrust-answered</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/home-cybersecurity-101-routers-firewalls-and-more</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-become-compliant-pci-dss-32-and-321</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-can-i-prevent-ransomware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-can-isos-help-merchants-with-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-franchises-can-protect-their-brand-through-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-get-cybersecurity-buy-in</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-much-does-cybersecurity-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-prevent-formjacking-and-ecommerce-skimming</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-become-a-qsa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-choose-the-right-mssp-for-your-small-to-medium-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-communicate-cybersecurity-risk-effectively</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-conduct-a-remote-pci-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-develop-implement-successful-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-effectively-manage-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-effectively-manage-a-healthcare-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-implement-and-maintain-hipaa-compliant-firewalls</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-improve-your-hipaa-compliance-efforts-in-2018-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-make-and-implement-successful-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-make-your-pci-program-easier-for-you-and-your-merchants</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-manage-third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-manage-your-business-associate-risk-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-pass-your-pci-audit-in-2025-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-perform-segmentation-checks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prepare-for-a-hipaa-audit-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prepare-for-a-pci-audit-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prepare-for-a-pci-dss-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prepare-for-a-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prepare-for-an-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prepare-for-pci-dss-v-4-0</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-prioritize-hipaa-compliance-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-properly-manage-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-protect-your-ecommerce-website-against-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-protect-your-ecommerce-website-against-eskimming</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-respond-to-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-secure-your-medical-devices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-spot-an-effective-security-practitioner</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-to-work-from-home-securely</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/how-train-your-workforce-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/identity-management-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/implement-and-maintain-pci-compliant-firewalls</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/implementing-your-hipaa-compliance-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/incident-response-plan-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/inside-gear-how-qsas-are-influencing-payment-security-standards</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/internal-penetration-testing-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/it-takes-all-kinds-of-cisos</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/jobs-in-cybersecurity-podcast</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/keeping-kids-safe-online</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/key-pci-dss-v4-0-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/keynote-securitymetrics-summit-2020</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/leadership-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/learn-and-grow-in-your-devops-career</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/legal-considerations-for-privacy-and-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/les-fondamentaux-de-la-conformite-pci</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/lessons-from-a-security-researcher</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/lessons-learned-from-2016-forensic-investigations-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/lessons-learned-from-2017-investigations-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/level-up-your-healthcare-services</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/los-fundamentales-de-pci-dss-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/making-your-trainings-less-boring</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/medical-data-encryption-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/meeting-merchant-needs-balance-value-and-simplicity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/mobile-device-management-how-to-securely-work-remote</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/mobile-penetration-testing-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/myth-of-the-cybersecurity-workforce-shortage</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/network-penetration-testing-101-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/network-segmentation-increasing-security-and-focus-on-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/overcoming-reality-hipaa-budgets</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/panscan-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-and-data-security-lessons-for-franchises-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-audit-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-audit-myth-busters-10-misconceptions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-audit-timeline</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-best-practices-for-2019-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-compliance-101-for-universities-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-compliance-in-a-year</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-compliance-scale-challenges-and-solutions-with-mars-global-team</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-compliance-support</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-compliance-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-4-0-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-4-expectations</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-40-one-organizations-experience</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-40-what-is-new-and-how-it-affects-you</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-penetration-testing-updates-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-scoping-updates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-v4-0-saq-updates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-v4-0-what-is-new-and-how-to-prepare</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-v4-guidance-document</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-version-4-0</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-version-v4-0-saqs-whats-changed</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-version-v4-0-universities</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-dss-whats-new-and-how-it-affects-you-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-game-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-it-checklist</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-multi-factor-authentication-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-participating-organizations-how-bt-supports-card-data-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-point-to-point-encryption-p2pe-basics-for-merchants</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-requirements-overview</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-saq-overview-chart</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-scoping-supplement-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-standards-all-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pci-v4-for-acquirers-what-to-expect</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/penetration-testing-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/penetration-testing-101-how-to-get-the-most-out-of-your-pen-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/penetration-testing-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/penetration-testing-humanity-behind-hacking</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/penetration-testing-timeline-checklist</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/penetration-testing-what-expect-when-youre-expecting-a-pen-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/phishing-and-malware-attacks-amidst-covid-19</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/practical-cybersecurity-for-merchants-cis-controls</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/preparing-for-a-pci-dss-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/preparing-for-pci-dss-version-4-0-pci-community-meeting</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/privacy-vs-security-finding-balance-in-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/protecting-apis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/pulse-demo-2023</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/questions-to-ask-when-choosing-a-pci-program-provider</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/ransomware-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/ready-or-not-new-pci-v4-0-1-requirements-are-now-live</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/reduce-your-pci-scope-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/remotely-working-from-home-securely</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/resolving-a-suspected-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/responding-to-hackers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/risk-assessments-where-to-begin</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/risk-bringing-together-business-and-cyber-understanding</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/saas-data-security-and-supply-chain-risks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/save-money-on-your-pci-audit-how-scoping-boosts-your-budget</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/securing-the-cde</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/securing-your-remote-desktop-connection</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/security-tools</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/securitymetrics-guide-to-hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/sending-hipaa-compliant-emails-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/shopping-cart-monitor-demo-2022</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/shopping-cart-monitor-demo-2023</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/smb-ecommerce-security-basics-for-new-pci-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/successful-pci-programs-at-large-organizations</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/teaching-data-security-to-children</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/the-ciso-role-social-strategies-for-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/the-future-of-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/the-future-of-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/the-language-of-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/the-threat-of-javascript-skimming</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/things-you-are-doing-wrong-to-keep-your-data-safe</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/tips-for-cybersecurity-automation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/top-10-breaches-of-2021</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/top-10-fatal-flaws-in-smb-networks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/top-10-online-scams</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/top-failing-saq-sections</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/top-of-breaches-2022</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/updates-to-the-software-security-framework</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/using-your-qsa-year-round-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/vulnerability-scanning-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/web-application-penetration-testing-101-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/web-application-penetration-testing-basics-webinar</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-happens-during-a-mobile-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-healthcare-needs-to-know-about-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-is-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-ive-learned-from-10-years-in-pci-compliance-program</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-to-expect-completing-a-pci-v4-saq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-to-expect-from-a-pci-v4-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/what-you-can-expect-from-a-hitrust-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/whats-changed-with-4-0-1-a-guide-to-the-new-pci-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/which-saq-type-is-right-for-my-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/why-partner-with-securitymetrics-for-data-security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/window-of-compromise</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/your-hipaa-risk-analysis-in-five-steps</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/your-pci-audit-questions-answered</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/your-pci-risk-assessment-in-five-steps</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/learn/zero-trust-tenets</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/1-way-help-your-hipaa-audits-go-faster</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-crucial-hipaa-reads</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-misconceptions-about-endpoint-security-and-why-you-need-it</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-misconceptions-about-security-audits</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-pci-security-standards-myths</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-qualities-look-when-selecting-approved-scanning-vendor</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-tips-increasing-it-budget-and-security-buy</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-tips-keeping-security-budget</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/10-ways-im-protecting-my-professional-identity-in-2026</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2-things-you-should-know-about-pci-32-multi-factor-authentication-updates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2014-hipaa-compliance-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2014-infographic-63-businesses-dont-encrypt-credit-cards</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2016-data-breach-predictions-securitymetrics-pci-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2017-hipaa-survey-results</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2017-panscan-study-how-better-protect-your-card-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2017-pci-dss-data-breach-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2018-hipaa-guide-highlights-business-associates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2018-panscan-results-storage-credit-card-data-rise</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2020-data-breach-predictions-2019-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2020-hipaa-guide-launch</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2021-data-breach-forensic-predictions-and-what-happened-2020-part-1</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2021-data-breach-forensic-predictions-and-what-happened-2020-part-2</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2021-data-breach-forensic-predictions-and-what-happened-2020-part-3</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2021-guide-pci-dss-compliance-has-launched</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2021-security-year-review</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2022-forensic-predictions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2023-forensic-predictions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2024-hipaa-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2024-pci-dss-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2025-forensic-predictions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2025-hipaa-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2025-pci-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/2026-cybersecurity-outlook-lessons</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/21-day-plan-hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/3-projects-get-you-into-infosec</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/3-projects-to-get-you-into-infosec</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/3-tips-light-pci-fire-under-your-merchants</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/4-data-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-commonly-overlooked-pci-security-errors</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-minimum-necessary-hipaa-phi-tips</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-most-bizarre-hipaa-violation-cases</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-p2pe-trends-2015</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-pci-compliance-tips-enterprise-organizations</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-security-best-practices-protecting-your-hipaa-compliant-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-simple-ways-get-pci-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-step-hipaa-risk-analysis-sample</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-steps-making-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-steps-to-secure-your-healthcare-organization</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-steps-your-journey-toward-data-privacy-and-protection-dpp</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-things-payments-industry-should-watch-2015</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-things-your-incident-response-plan-needs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-tips-boost-your-businesss-physical-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-tips-hipaa-compliant-mobile-devices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-tips-implement-security-awareness-your-company</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-tips-improve-hipaa-compliance-2018</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/5-ways-your-mobile-device-can-get-malware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/6-common-problems-merchants-face-pci-compliance-programs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/6-phases-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/6-steps-making-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/6-steps-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/6-ways-make-data-security-consistent-your-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-common-mistakes-to-avoid-during-your-first-pci-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-cybersecurity-mistakes-in-small-businesses-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-hearty-tips-avoid-costly-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-hipaa-myths-and-misunderstandings-debunked</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-it-security-internal-communications-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-pci-compliance-tips-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-security-questions-ask-your-pos-installer</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-things-prevent-dental-practice-growth</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/7-ways-recognize-phishing-email</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/9-ways-social-engineer-hospital</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/a-guide-to-new-requirements-in-pci-dss-4-0-1</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/achieving-lift-off-with-pci-dss-v4-0</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ai-acceptable-use-policy</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/amazon-scams-disney-hack-drone-hack-fake-cisco-tech-honda-car-hack</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/amazon-sidewalk-gives-users-one-week-opt-out-mass-wireless-sharing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/anedot-case-study</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/apache-struts-vulnerability-what-you-should-do</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/apples-forcedentry-patch-airbnb-spying-and-more</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/are-http-websites-insecure</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/are-patient-sign-sheets-hipaa-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/are-you-ready-pci-dss-32</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/artificial-intelligence-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/audit-logs-and-log-monitoring</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditing-archives-case-evil-javascript</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditing-archives-case-file-sharing-franchisee</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditing-archives-case-overly-helpful-front-desk-clerk</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-pci-dss-responsibilities-and-challenges</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-pci-dss-scope</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-10-audit-logs-and-log-monitoring</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-11-testing-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-12-pci-compliance-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-2-system-configuration</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-3-protect-cardholder-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-5-implement-and-update-your-anti-malware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-6-system-updating-and-software-development</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-7-restrict-access</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-8-use-unique-id-credentials</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-requirement-9-improve-your-physical-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/auditor-tips-sending-data-over-open-and-public-networks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/avoid-pci-audit-fatigue</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/badlock-combatting-new-samba-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/balancing-mobile-convenience-and-phi-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/beginners-guide-combat-phishing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/best-sites-to-learn-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/big-changes-for-saq-a</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/biometrics-future-payment-data-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/blackmatterransomwaresucceedsdarksideandrevil</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/blogenginenet-directory-traversal-listing-login-page-unvalidated-redirect</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/blogenginenet-directory-traversal-remote-code-execution-cve-2019-10719-cve-2019-10720</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/blogenginenet-xml-external-entity-attacks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/budgeting-for-pci-compliance-essential-software-costs-for-smbs-in-2025</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/buyers-guide-hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/calculating-your-hitrust-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/can-you-store-unencrypted-credit-card-data-2021-panscan-c2-ae-data-analysis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/card-data-discovery-unencrypted-credit-card-data-storage-up-significantly</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/case-studies-pci-compliance-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/changes-and-updates-to-the-40-saq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/close-security-gaps-2019-5-blog-topics-help-you-avoid-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cloud-security-what-businesses-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cmmc-compliance-roadmap</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/code-reviews-method-reveal-costly-mistakes</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/coding-culture-will-ruin-your-auditand-your-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/colonial-pipeline-breach-securitymetrics-news</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/common-hipaa-violations-hipaa-quizhipaa-test-hipaa-violation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/common-pci-dss-questions-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/comparing-pci-qsa-firms</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/compliance-hipaa-mental-health-professionals</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/comply-12-requirements-of-pci</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/complying-gdpr-what-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/computer-security-and-ftc-suing-hacked-companies</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/conduct-accurate-and-thorough-risk-analysis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/configuring-and-maintaining-your-firewall-securitymetrics-managed-firewall</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/configuring-your-remote-desktop-connection-what-youre-doing-wrong</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cost-effective-data-security-best-practices-workplace</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cost-hipaa-breach-insurance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cost-pci-security-policy-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/could-your-waiting-room-wi-fi-be-sabotaged</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/covid-19-cyber-attacks-security-update-center</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/covid-19-cyber-attacks-threat-report-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/covid-19-cyber-threats-attacks-update</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/covid-19-cybersecurity-and-threat-updates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cross-site-scripting-explained</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/crucial-security-advisory-patch-windows-immediately-against-winshock</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/crypto-exchanges-hacked</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/csf-hitrust-breakdown-faqs-guidance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/current-hacking-trends-remote-access</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cyber-breach-insurance-how-much-does-it-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cybersecurity-attack-surfaces-how-protect-all-your-locations</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cybersecurity-lessons-from-2024</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/cybersecurity-workforce-training-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/dangers-dirty-cow-vulnerability-should-you-be-worried</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/designing-api-connections-that-meet-hipaa-and-pci-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/different-types-penetration-tests-your-business-needs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/disturbing-trends-in-data-breach-responses</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ditch-typical-anti-virus-true-pci-requirement-5-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/do-you-know-where-you-store-card-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/do-you-need-web-application-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/does-your-third-party-vendor-put-you-risk</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/dos-and-donts-storing-card-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/drown-attack-and-ssl-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/e-commerce-payment-skimming-attacks-rise</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ecommerce-security-trends-2021</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ecommerce-smb-eskimming</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/eliminate-internet-browsing-check-machines</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/employee-data-security-training-tabletop-exercises</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/employee-data-security-training-what-you-should-do</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/employee-security-training-tips-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/emv-security-it-hackable</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ensuring-cloud-security-what-you-might-not-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/external-pen-testing-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/external-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/faqs-for-isos</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/fbi-remotely-hacking-computers-aid-microsoft-exchange-breach-securitymetrics-news-9</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/fighting-phishing-email-scams-what-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/finding-and-reducing-pci-scope-how-make-compliance-easier</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/fire-shred-pulp-how-properly-destroy-sensitive-documents</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/firewall-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/firewall-pci-compliance-5-things-youre-doing-wrong</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/firewalls-101-5-things-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/firewalls-101-what-is-a-firewall</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/five-things-consider-when-making-hipaa-security-budget</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/five-ways-make-security-training-memorable</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/forensic-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/forensic-files-case-mistaken-malware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/forensic-files-case-stockpiled-credit-cards</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/forensic-files-case-suspiciously-flawless-investigation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/four-steps-securing-your-medical-devices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/free-hipaa-compliance-software-demo</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/free-securitymetrics-pci-compliance-demo</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/garmin-ransomware-attack-soc-threat-analysis-and-10-lessons-learned</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/gdpr-101-part-1-should-i-be-worried</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/gdpr-101-part-2-what-are-requirements-gdpr</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/gdpr-101-part-3-what-should-i-do-now</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/gdpr-and-ccpa-overview-privacy-changes-and-your-role-data-protection</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/gdpr-explained-faqs-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/gdpr-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/getting-compliant-pci-requirement-1-basics-managing-your-firewall</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ghost-vulnerabilitynot-scary</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/google-privacy-update-pii-can-now-be-removed-from-searches</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/guidance-on-saq-a-updates</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/guide-hipaa-compliance-simplifies-data-security-and-privacy</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/guide-hipaa-security-rule-privacy-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hackers-changing-their-tactics-deepfakes-cpumalware-and-more</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hacking-scenario-how-hackers-choose-their-victims</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hacking-trends-2014-hackers-actually-clean-after-themselves</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcare-compliance-case-studies-hipaa-solutions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcare-plant-your-feet-road-hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcare-reception-desks-breeding-ground-hipaa-compromise</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcare-recognize-social-engineering-techniques</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcare-security-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcare-threat-imminent-secure-remote-access-now</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/healthcares-password-security-embarrassing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/here-comes-pci-dss-32-what-changes-you-should-expect</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hhs-hipaa-audit-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-alphabet-soup-unjumbling-jargon</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-and-status-healthcare-what-c-suites-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-audits-phase-2-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-business-associate-agreement-whos-really-responsible</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-business-associate-agreements-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-compliance-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-compliance-vs-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-compliant-passwords</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-data-storage-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-faq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-guidelines-simplified-2021-hipaa-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-guidelines-simplified-2022-hipaa-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-security-policy-free-download</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-security-rule-fulfilling-requirements-and-addressing-healthcare-security-issues</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-security-tip-understand-your-data-flow</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-security-vs-ehr-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-social-media-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-training-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-training-video-essential-healthcare-compliance-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hipaa-violationswho-responsible</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hippocratic-oath-and-doing-no-harm-information-age</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hitrust-assessment-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hitrust-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/hitrust-vs-hipaa-what-difference-between</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/holiday-online-shopping-and-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/holiday-security-tips</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-become-pci-compliant-2020-guide-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-can-you-tell-if-an-app-is-secure</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-configure-firewall-5-steps</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-confront-hospital-ransomware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-do-hackers-hack</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-do-merchant-levels-determine-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-do-new-penetration-test-requirements-affect-you</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-do-passwords-right-password-management-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-does-firewall-protect-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-does-network-segmentation-affect-pci-scope</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-find-time-hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-healthcare-remains-insecure-and-what-one-hie-decided-do-about-it</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-healthcare-security-complacency-killing-your-organization</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-hipaa-violation-may-have-ruined-football-stars-career</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-know-if-an-app-is-secure-smnews</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-long-are-businesses-vulnerable-security-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-maintain-security-when-employees-work-remotely</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-manage-data-breach-5-steps-keep-your-business-safe</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-manage-healthcare-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-meet-hipaa-documentation-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-credit-card-data-do-you-store-its-more-you-think</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-does-data-breach-cost-your-organization</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-does-gdpr-compliance-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-does-hipaa-compliance-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-does-hipaa-risk-management-plan-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-does-pci-compliance-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-much-does-pentest-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-permanently-delete-files-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-prepare-hipaa-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-prepare-pci-dss-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-prepared-are-uk-businesses-gdpr</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-prevent-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-protect-your-ecommerce-website-against-skimming</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-send-hipaa-compliant-email</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-start-hipaa-risk-analysis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-create-and-remember-strong-passwords</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-get-the-most-from-your-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-implement-and-maintain-hippa-compliant-firewalls</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-improve-your-ecommerce-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-make-pci-assessments-for-complex-environments-much-easier</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-manage-phi</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-perform-a-pci-40-saq-a-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-prevent-formjacking-ecommerce-skimming-magecart</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-start-a-career-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-start-a-cybersecurity-program-for-your-small-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/how-to-test-your-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/implement-encryption</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/implementing-hipaa-12-month-hipaa-plan-get-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/implementing-pci-compliant-remote-workforce-setup</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/importance-cybersecurity-education-securitymetrics-launches-free-academy</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/importance-log-management</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/importance-pci-dss-why-you-should-get-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/improve-your-security-posture-nist-cybersecurity-framework</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/incident-response-10-things-do-if-you-have-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/infographic-cybercriminals-love-when-you-use-remote-access</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/infographic-reduce-pci-scope-reduce-workload</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/infosend-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/integrate-2fa-tech-correctly-comply-pci-req-83</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/internal-penetration-testing-101-where-start</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/internet-explorer-apple-m1-russia-cyber-war</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/intrusion-detection-system-whats-missing-hipaa-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/iphone-hack-tesla-hack-printnightmare-return-5-trojans-and-more</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/it-checklists-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ivanti-pulse-secure-data-breach-securitymetrics-news</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/jen-stone-principal-security-analyst-cissp-cisa-qsa-ccsfp</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/kaseya-vsa-software-securitymetrics-response</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/kaseya-vsa-zero-day</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/kaseya-vsa-zero-day-update</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/keep-employees-need-know-basis-look-pci-requirement-7</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/know-your-phis-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/lapsus-okta-breach-timeline</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/latest-phishing-lures-cyber-security-month</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/latest-ssl-vulnerability-logjam</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/lessons-data-breaches-2017-and-what-expect-2018</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/log4j-vulnerability-securitymetrics-response</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/look-pci-sscs-e-commerce-guidance-what-know-about-pci-32</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/magento-1-end-of-life-vulnerability-scan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/make-your-auditor-happy-follow-pci-audit-checklist</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/making-hipaa-compliance-realistic-part-1</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/making-hipaa-compliance-realistic-part-2</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/matt-halbleib-director-assessments-cissp-qsa-pa-qsa-ccsfp-cisa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/medical-data-encryption-keeping-your-phi-secure</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/memory-scrapers-keyloggers-and-sniffers-oh-my</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/mfa-updates-in-pci-v4</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/microsoft-duck-duck-go-tail-os-pre-hijacking-and-phishing-chat-bots</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/microsoft-exchange-server-zero-day-exploit-cybersecurity-news</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/millions-home-wi-fi-routers-threatened-malware-how-find-it</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/minimum-necessary-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/mitreid-connect-cross-site-scripting-cve-2020-5497</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/mobile-pen-testing-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/monitor-your-business-associates-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/most-dangerous-phishing-lures-2021</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/most-popular-data-security-articles</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/my-ocr-audit-and-how-i-survived-hipaa-audit-checklist</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/natures-7-hacker-defense-mechanisms</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/navigating-ai-safely-in-your-small-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/network-diagrams-key-compliance-and-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/network-inventory-configuration-management-and-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/network-penetration-testing-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/networked-medical-devices-data-breach-time-bomb</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/new-32-requirements-penetration-testing-and-segmentation-what-you-dont-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/new-32-requirements-service-providers-what-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/new-and-old-apache-struts-flaw-cve-2016-1000031</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/new-ecommerce-security-tool-shopping-cart-monitor</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/new-multi-factor-authentication-clarification-and-supplement-principles-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/no-spreadsheets-needed-manage-hipaa-compliance-securitymetrics-health-network-portal</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/our-top-5-most-popular-blog-posts-2017</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/overcome-managements-budget-concerns</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pa-dss-32-what-why-and-when</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/partner-with-securitymetrics-for-data-security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/password-updates-and-requirements-in-pci-4</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/patching-shoplift-bug-what-you-should-be-doing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/patient-portals-secure-phi-better-email</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/payroll-phishing-emails-attack-hospital-and-healthcare-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-101-for-universities-your-schools-guide-for-success</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-30-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-31-stop-using-ssl-and-outdated-tls-immediately</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-40-summary-of-changes</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-66-why-you-need-web-application-firewall-and-network-firewall</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-advice-new-isos</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-assessment-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-audit-2025</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-audit-alphabet-soup-de-jumbling-jargon</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-compliance-cloud</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-compliance-management-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-compliance-scanning-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-consultants-say-reduce-pci-dss-scope</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-council-releases-pci-dss-321-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-council-security-awareness-guidance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-3-agent-training-isnt-enough-contact-center-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-30-10-commonly-asked-questions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-32-changes-what-your-business-needs-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-40-saq-questionnaires-qa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-40-what-is-new-and-how-it-affects-you-q-a</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-audit-basics</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-compliance-faq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-compliance-service-providers-faq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-requirement-12-leverage-policy-improve-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-requirement-12-policies-and-documentation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-requirement-3-what-you-need-be-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-requirement-9-upping-your-physical-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-supplemental-guide-scope-understanding-pci-dss-scope-and-segmentation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-v4-payment-card-industry-security-standard</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-dss-version-40-saq-changes</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-fundamentals-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-level-1-audit-costs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-pin-assessment-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-program-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-programs-how-acquirers-balance-value-and-simplicity-merchants</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-10-logging-and-log-monitoring</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-11-vulnerability-scans-and-penetration-tests</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-2-get-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-2-how-get-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-4-securing-your-networks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-5-protecting-your-system-anti-virus</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-6-updating-your-systems</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-7-5-reasons-you-should-limit-employee-access-your-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-7-limiting-employee-access</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-8</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-8-combatting-weak-passwords-and-usernames</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirement-nine</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-requirements-youre-not-done-yet</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-scope-categories-keeping-your-card-data-separate</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-standards-which-pci-saq-right-my-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-validation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-vs-gdpr-whats-difference</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pci-you-dont-have-be-perfect</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/penetration-testing-best-practices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/penetration-testing-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pentest-story</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pentesting-vs-vulnerability-scanning-whats-difference</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-a-saq-d-version-40-merchant-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-an-saq-b-ip-version-40-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-an-saq-b-version-40-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-an-saq-d-service-provider-version-40-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-an-saq-p2pe-version-40-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-saq-c-version-40-merchant-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/performing-saq-c-vt-version-40-self-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/perimeter-scan-vs-pci-asv-scan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/permanently-delete-files</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/petya-ransomware-outbreak-what-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/phi-its-literally-everywhere-infographic</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/phishing-types-tactics-and-techniques</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/php-git-breach-ubiquiti-and-ransomware-20</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/physical-security-what-you-arent-thinking-about</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/picking-your-vulnerability-scanner-questions-you-should-ask</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/piiscan-find-and-secure-unencrypted-personal-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/plug-and-play-pos-can-it-ever-be-secure</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/practicing-good-cyber-hygiene</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/prepare-and-train-cybersecurity-2021-these-5-blogs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/prepare-pci-dss-40</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/prevent-iot-ransomware-best-practices-securitymetrics-soc</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/prevent-security-breaches</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/preventing-stolen-patient-data-through-remote-access-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/printer-security-does-your-device-let-hackers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/prioritizing-hipaa-protected-health-information-101</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/problem-sha-1-updating-your-security-certificate</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/pros-and-cons-onsite-hipaa-audits</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/providers-should-work-toward-increased-data-security-2015</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/quick-look-saq-p2pe-reducing-your-pci-workload</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ransomware-trends-dont-panic-prepare</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/recap-securitymetrics-2020-virtual-cybersecurity-and-compliance-conference</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/recognizing-phishing-email-ai</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/recording-your-qir-securitymetrics-new-qir-feature</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/regularly-conduct-vulnerability-scans</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/remote-access-attacks-how-protect-against-malware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/remote-pci-dss-audits-during-covid-19-faqs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/requirement-1-establish-secure-firewall-rules</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/resolved-does-hipaa-compliance-satisfy-meaningful-use</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/resources-pci-council-payment-data-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/responding-to-5-common-pci-questions-from-franchisers-and-franchisees</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/rising-vishing-scams-apple-malware-twitter-breach-slack-leak</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/role-based-access-control-hipaa-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/russia-ukraine-cyber-war-rages-on</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-b-ip-protecting-your-card-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-b-what-your-business-needs-do</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-c-securing-your-payment-application</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-c-vt-basics-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-d-basics-protecting-card-data-merchants</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-d-whats-required-service-providers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-ep-what-and-how</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/saq-what-know-and-what-do</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/satisfaction-pci-dss-programs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/scoping-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/secure-data-deletion-permanently-deleting-phi-healthcare</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/secure-remote-access</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securing-healthcare-mobile-devices</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securing-keys-and-certificates-pci-auditors-perspective</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securing-mobile-devices-mobile-encryption</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-academy-a-resource-for-your-small-business</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-blogs-welcome-securitymetrics-blog</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-blunder-case-studies</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-bulletin-meltdown-and-spectre-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-patches-your-business-complying-pci-requirement-61</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/security-trends-data-breach-statistics-2018-and-predictions-2019</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-2019-pci-compliance-guide-helps-merchants-protect-credit-card-data</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-audit-sans-top-20-critical-security-controls-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-covid-19-coronavirus-update</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-customer-reviews</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-forensic-research-iframe-payment-gateway-now-targeted</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-hipaa-guide-simplifies-hipaa-guidelines</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-news-microsoft-source-code-exposed-t-mobile-breach-whirlpool-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-news-solarwinds-fireeye-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-nist-800-30-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-pci-dss-compliance-guide-wins-most-innovative-cybersecurity-book-award</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-podcast-cybersecurity-podcast-industry-tips-trends-and-ciso-communication</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-podcast-latest-cybersecurity-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-pulse-remote-location-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-summit-2021</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-summit-virtual-cybersecurity-and-compliance-conference</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-support-faq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-threat-intelligence-center-how-choose-safe-and-secure-vpn</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-top-blogs-2018</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-uncovers-a-700-site-global-skimming-operation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-vs-other-pci-program-providers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-vulnerability-scanning-faq</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/securitymetrics-workforce-security-and-compliance-training</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/sending-credit-card-info-over-email</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/sensitive-data-discovery-alert-61-dont-protect-customer-cards</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/set-your-intrusion-detectionprevention-system</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/shellshock-be-wary-dont-panic</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/should-i-outsource-my-ecommerce-payments</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/should-you-freak-out-about-newest-ssltls-exploit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/should-you-pay-ransomware-threat-intelligence-center</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/should-you-stay-with-your-pci-qsa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/small-business-cybersecurity-tools</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/snapshot-2017-securitymetrics-guide-hipaa-compliance-status-healthcare-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/snapshot-firewalls-hipaa-and-healthcare-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/snapshot-hipaa-and-healthcare-data-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/social-engineering-training-what-your-employees-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/solarwinds-data-breach-securitymetrics-response</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/spectre-ai-identifies-merchant-fraud</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/spotting-vulnerabilities-vulnerability-scanning-antiquated</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ssl-30-poodle-vulnerability-update</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ssl-tls-v12-tips-migration</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/stay-hhs-naughty-list</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/staying-compliant-visas-new-level-4-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/stop-looking-mobile-phone-security-standard</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/study-data-security-auditing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/sudo-vulnerability-emotet-netwalked-bonobos-cybersecurity-news-data-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/supercookies-delete-iot-recordings-morse-code-phishing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/system-configuration</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/system-hardening-standards-how-comply-pci-requirement-22</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/system-updating-and-software-development</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/t-mobile-breach-leaks-data-in-the-millions</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/t-mobile-breached-again</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/takeaways-our-2018-pci-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/takeaways-pci-dss-2016-data-breach-trends</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ten-mistakes-in-hipaa-security-rule-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-7-most-common-mistakes-in-small-business-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-best-online-cybersecurity-courses</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-ddos-threat-landscape-is-evolving-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-five-step-roadmap-for-tackling-cmmc</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-risks-of-emailing-credit-card-data-2026-compliance-standards</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-securitymetrics-guide-pci-dss-compliance-has-launched</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-securitymetrics-hipaa-portal-helps-streamline-your-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/the-top-five-pci-resources-for-enterprise-organizations</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/tiktok-t-mobile-settlement-twitter-breach-uber-breach</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/tips-acquirer-success-pci-dss-merchant-programs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/tips-for-if-your-identity-is-stolen</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-10-fatal-flaws-in-smb-networks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-10-network-security-audit-fails</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-10-pci-saq-areas-where-merchants-struggled</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-10-tax-scams-5-tips-avoid-getting-tricked</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-10-types-phishing-emails</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-5-bogs-prepare-2022</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-5-cybersecurity-and-pci-compliance-blogs-2020</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-5-pci-blog-posts-smbs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-5-security-vulnerabilities-every-business-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-7-pci-dss-v4-0-1-requirements-enterprises-must-prioritize-in-2025</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-asv-scan-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-cybersecurity-blogs-2021</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-cybersecurity-conferences-2020</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-cybersecurity-conferences-attend</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-faqs-acquirers-answered</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-five-things-to-ask-hiring-a-pentester</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-hitrust-providers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-pci-resources-for-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-qsas-for-universities</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-ten-pci-requirement-failures-where-your-business-struggling</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/top-ten-resources-2024</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/two-factor-authentication-security-beyond-passwords</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/types-penetration-testing-what-why-and-how</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ukraine-vs-russia-hackers-take-sides</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ultimate-cheat-sheet-making-online-pci-compliance-work-you</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/ultimate-guide-pci-30-changes</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/understanding-hipaa-application-firewalls</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/understanding-new-pci-saq-type-saq-spoc</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/understanding-pci-ssc-multi-factor-authentication-supplement</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/understanding-web-app-pen-testing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/unencrypted-data-security-plague</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/unique-id-passwords-and-passphrases</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/universities-choosing-a-pci-partner</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/updates-and-changes-in-pci-dss-40</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/updates-to-documentation</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/updates-to-pci-dss-v4-0-1</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/updates-to-vulnerability-scanning-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/updating-pci-dss-saqs-32-changes-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/vendor-supplied-defaults-are-serious-threat</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/verkada-security-camera-breach-weleakinfo-website-microsoft-server-exploit-update-securitymetrics-ne</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/visa-pci-enforcement-rules-2015</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/vita-companies-hitrust-certification</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/volkswagen-and-fujifilm-breaches-galore</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/vulnerability-scanners-101-what-why-and-how-comply</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/wannacrypt-ransomware-attacks-what-you-should-do</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/warbiking-hacking-your-helmet</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/web-application-firewall-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/western-digital-vulnerability-causes-data-loss-in-hard-drives</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/western-reserve-achieve-hitrust-certification</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-antivirus-should-i-use</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-are-12-requirements-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-are-addressable-hipaa-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-are-hipaa-compliant-system-logs</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-are-hitrust-requirements-3-steps-get-hitrust-certified</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-are-my-hipaa-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-are-service-provider-levels-and-how-do-they-affect-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-ccpa-compliance-california-consumer-privacy-act</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-do-if-your-business-hacked</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-do-when-you-get-hacked-step-step</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-does-cyber-forensic-investigation-do-and-how-much-does-it-cost</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-formjacking</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-healthcare-should-know-about-hipaa-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-hipaa-compliance-and-how-long-will-it-take</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-hipaa-privacy-rule</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-hitrust-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-include-in-an-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-is-a-brushing-scam</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-is-a-business-continuity-plan</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-is-it-like-working-with-securitymetrics-on-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-is-tokenization-and-how-can-i-use-it-for-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-managed-firewall-and-do-you-need-one</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-network-security</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-risk-assessment-and-why-does-your-business-need-one</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-social-engineering-social-engineering-examples</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-the-louvre-heist-teaches-us-about-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-tokenization-and-how-can-i-use-it-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/what-you-need-to-know-about-hitrust-assessments-according-to-an-assessor</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/whats-changed-cis-controls-v8</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/whats-inside-our-2018-pci-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/whats-new-with-the-saq-aep</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/whats-our-2018-securitymetrics-hipaa-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/which-penetration-test-is-right-you</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/who-owns-third-party-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-cheap-pci-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-encryption-sometimes-not-enough</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-many-merchant-pci-programs-fail-common-pitfalls-for-acquirers</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-partner-securitymetrics-data-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-some-penetration-tests-cost-10k-and-others-3k</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-you-need-both-hardware-and-software-firewall</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/why-you-need-know-about-pci-requirements-643-1161-eskimming-findings-securitymetrics-investigations</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/wikid-2fa-enterprise-server-cross-site-scripting</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/wikid-2fa-enterprise-server-csrf</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/wikid-2fa-enterprise-server-sql-injection</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/win-your-healthcare-security-marathon-7-steps</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/wireless-access-point-protection-finding-rogue-wi-fi-networks</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/working-home-hipaa-compliant</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/working-with-securitymetrics-for-pci-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/workload-overlap-between-hipaa-and-meaningful-use</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/wpa2-security-flaw-krack-puts-wi-fi-devices-risk</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/you-cant-hide-behind-hipaa-business-associate-agreement</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/your-business-infected-malware-trends-2016</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/your-business-prepared-physical-security-threat</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/your-crash-course-to-hitrust-csf-assessment-types</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/your-credit-card-data-leaking</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/your-hipaa-privacy-requirements-might-not-be-completed</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/youve-been-breached-what-should-you-do-now</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/youve-been-hacked-now-what-a-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/blog/zyxel-devices-vulnerable-cross-site-scripting-login-page</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/anedots-pci-audit</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/beyond-limits-physical-therapy</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/braintree</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/brightsquid-hipaa</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/burger-king</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/carnegie-mellon-university</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/christian-brothers-automotive</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/groupize</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/infosend</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/international-payment-services</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/m-t-bank</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/mooyah</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/ncmic</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/persolvent</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/prairie-cloudware</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/pulse-school-district</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/sharp</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/silvercreek-family-dentistry</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/szikman-dental-group</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/till-payments</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/transactis</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/usc</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/vita-companies-hitrust</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/case-studies/western-reserve</loc>
    </url>
    <url>
        <loc>https://www.securitymetrics.com/product/cmmc</loc>
    </url>
</urlset>