<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://symbolsecurity.com/social/twitter/</loc></url><url><loc>https://symbolsecurity.com/company/team/craig-sandman/</loc></url><url><loc>https://symbolsecurity.com/social/linkedin/</loc></url><url><loc>https://symbolsecurity.com/company/team/antonio-pagano/</loc></url><url><loc>https://symbolsecurity.com/company/team/carlos-morales/</loc></url><url><loc>https://symbolsecurity.com/social/youtube/</loc></url><url><loc>https://symbolsecurity.com/company/team/cristian-pelaez/</loc></url><url><loc>https://symbolsecurity.com/company/team/andres-martinez/</loc></url><url><loc>https://symbolsecurity.com/company/team/samuel-pinillos/</loc></url><url><loc>https://symbolsecurity.com/company/team/daniel-muriel/</loc></url><url><loc>https://symbolsecurity.com/company/team/karolaith-orozco/</loc></url><url><loc>https://symbolsecurity.com/company/team/rafael-tamara/</loc></url><url><loc>https://symbolsecurity.com/company/team/hillary-rivera/</loc></url><url><loc>https://symbolsecurity.com/company/team/manuel-perez/</loc></url><url><loc>https://symbolsecurity.com/company/team/mario-henriquez/</loc></url><url><loc>https://symbolsecurity.com/legal/dpa/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/eula/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/reseller-terms/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/privacy-policy/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/services/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-criminals/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-security-awareness/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/cybersecurity-threats-your-employees-must-be-ready-for-in-2026/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/tags/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-risk/</loc><lastmod>2026-02-28T12:02:43+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/security-awareness-training/</loc><lastmod>2026-02-28T12:02:43+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/security-awareness-training-cost-2026-complete-pricing-guide/</loc><lastmod>2026-02-28T12:02:43+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/7-best-phishing-simulation-tools-in-2026-expert-reviewed/</loc><lastmod>2026-02-28T12:02:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/5-best-security-awareness-training-for-non-technical-employees/</loc><lastmod>2026-02-28T12:01:21+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-awareness-training/</loc><lastmod>2026-02-28T12:01:21+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/best-security-awareness-training-tools-for-mssps-in-2026/</loc><lastmod>2026-01-29T11:59:29+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/comparison/</loc><lastmod>2026-01-29T11:59:29+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/5-best-security-awareness-training-tools-to-prepare-for-2026/</loc><lastmod>2026-01-29T11:58:48+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/12-cybersecurity-statistics-every-business-needs-to-know-for-2026/</loc><lastmod>2026-01-29T11:57:37+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/24-cybersecurity-stats-for-msps-mssps-in-2026/</loc><lastmod>2026-01-29T11:57:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/6-best-infosec-iq-alternatives-for-security-training/</loc><lastmod>2026-01-29T11:07:46+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-6-best-metacompliance-alternatives-for-security-awareness-training/</loc><lastmod>2026-01-08T17:11:25+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-4-best-mimecast-alternatives-for-security-awareness-training/</loc><lastmod>2026-01-08T17:10:02+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/7-best-hoxhunt-alternatives/</loc><lastmod>2026-01-08T17:08:18+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/6-best-keepnet-labs-alternatives/</loc><lastmod>2026-01-08T17:06:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-9-best-phin-security-alternatives-for-cybersecurity-teams/</loc><lastmod>2026-01-08T17:03:55+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/top-5-cofense-alternatives-for-security-awareness-training/</loc><lastmod>2026-01-08T17:02:14+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/top-4-sosafe-alternatives-for-security-training/</loc><lastmod>2025-11-11T17:14:39+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/6-best-ninjio-alternatives-for-security-training/</loc><lastmod>2025-11-11T17:11:34+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-top-7-knowbe4-alternatives-for-security-awareness-training-in-2025/</loc><lastmod>2025-11-11T16:45:22+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-evolution-from-security-awareness-to-human-risk-management/</loc><lastmod>2025-10-29T14:57:47+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-7-core-components-of-a-security-awareness-program-that-works/</loc><lastmod>2025-10-20T13:22:31+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/why-a-security-awareness-program-is-non-negotiable-in-2025/</loc><lastmod>2025-10-20T13:16:08+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/terms-and-conditions/</loc><lastmod>2025-10-16T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/best-free-cybersecurity-resources-for-awareness-month-2025/</loc><lastmod>2025-10-06T18:07:52+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-power-of-microlearning-in-security-awareness-training/</loc><lastmod>2025-10-02T20:27:28+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/7-common-security-mistakes-your-employees-are-making/</loc><lastmod>2025-10-02T20:19:47+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/10-critical-security-awareness-topics-every-employee-should-know/</loc><lastmod>2025-09-26T15:11:23+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/what-is-an-insider-threat-a-guide-for-businesses/</loc><lastmod>2025-09-23T19:57:19+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/benefits-of-security-awareness-training-for-organizations/</loc><lastmod>2025-09-23T19:56:50+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/creating-your-annual-security-awareness-training-plan/</loc><lastmod>2025-09-23T19:56:07+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/building-a-security-first-culture-beyond-the-compliance-checklist/</loc><lastmod>2025-09-22T14:54:48+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/how-24-7-darknet-monitoring-turned-a-credential-leak-into-a-security-win/</loc><lastmod>2025-08-08T19:57:57+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/symbol-security-and-powerpsa-partner-to-boost-msp-cyber-capabilities/</loc><lastmod>2025-03-12T15:55:32+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/symbol-and-aura-personal-cyber/</loc><lastmod>2024-07-25T13:29:02+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/modern-slavery-and-human-trafficking-statement/</loc><lastmod>2024-02-07T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/what-is-an-authentic-security-awareness-training-program/</loc><lastmod>2023-06-14T21:30:13+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/where-security-training-falls-short/</loc><lastmod>2023-06-14T21:30:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/welcome-to-symbol-security/</loc><lastmod>2023-06-14T21:29:58+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/top-five-ways-to-improve-your-personal-cybersecurity/</loc><lastmod>2023-06-14T21:29:49+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/why-are-security-awareness-training-programs-doomed-to-fail/</loc><lastmod>2023-06-14T21:26:20+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/wine-tasting-and-cyber-awareness/</loc><lastmod>2023-06-09T21:20:17+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/winning-the-war-on-phishing-scams-wait-i-didnt-realize-i-was-in-a-war/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/why-you-should-make-2020-the-year-of-cyber-security-awareness-in-your-company/</loc><lastmod>2019-12-16T11:53:21+00:00</lastmod></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/april/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/august/</loc></url><url><loc>https://symbolsecurity.com/marketing/aura-personal-security/</loc></url><url><loc>https://symbolsecurity.com/quotes/claire-hart-vp/</loc></url><url><loc>https://symbolsecurity.com/quotes/</loc></url><url><loc>https://symbolsecurity.com/company/</loc></url><url><loc>https://symbolsecurity.com/compare/</loc></url><url><loc>https://symbolsecurity.com/contact/</loc></url><url><loc>https://symbolsecurity.com/contact/partner/</loc></url><url><loc>https://symbolsecurity.com/product/cyber-threat-surveillance/</loc></url><url><loc>https://symbolsecurity.com/quotes/david-okonkwo-compliance/</loc></url><url><loc>https://symbolsecurity.com/quotes/deana-joe-andruzzi/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/december/</loc></url><url><loc>https://symbolsecurity.com/product/domain-threat-alerts/</loc></url><url><loc>https://symbolsecurity.com/product/email-threat-alerts/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/february/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/january/</loc></url><url><loc>https://symbolsecurity.com/quotes/jason-torres-ciso/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/july/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/june/</loc></url><url><loc>https://symbolsecurity.com/quotes/karen-liu-operations/</loc></url><url><loc>https://symbolsecurity.com/product/managed-program-services/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/march/</loc></url><url><loc>https://symbolsecurity.com/quotes/matt-webster-harbor/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/may/</loc></url><url><loc>https://symbolsecurity.com/company/team/</loc></url><url><loc>https://symbolsecurity.com/quotes/michael-gray-thrive/</loc></url><url><loc>https://symbolsecurity.com/partners/mssp/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/november/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/october/</loc></url><url><loc>https://symbolsecurity.com/product/phishing-simulation/</loc></url><url><loc>https://symbolsecurity.com/product/policy-pro/</loc></url><url><loc>https://symbolsecurity.com/product/</loc></url><url><loc>https://symbolsecurity.com/quotes/rachel-simmons-vp/</loc></url><url><loc>https://symbolsecurity.com/resources/cyber-insurance-and-cybersecurity/</loc></url><url><loc>https://symbolsecurity.com/resources/cyber-secure-culture-resources/</loc></url><url><loc>https://symbolsecurity.com/resources/dark-web-exposure-report/</loc></url><url><loc>https://symbolsecurity.com/resources/domain-impersonation-scanner/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-training-tco-calculator/</loc></url><url><loc>https://symbolsecurity.com/resources/</loc></url><url><loc>https://symbolsecurity.com/partners/sales/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/</loc></url><url><loc>https://symbolsecurity.com/product/security-awareness-training/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/september/</loc></url><url><loc>https://symbolsecurity.com/social/</loc></url><url><loc>https://symbolsecurity.com/quotes/sudeep-unhale-motus/</loc></url><url><loc>https://symbolsecurity.com/marketing/symbol-and-aura/</loc></url><url><loc>https://symbolsecurity.com/partners/vciso/</loc></url></urlset>