<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    
    <url>
        <loc>https://www.mspinsights.ca/about-us</loc>
        <lastmod>2025-12-31</lastmod>
    </url><url>
        <loc>https://www.mspinsights.ca/contactus</loc>
        <lastmod>2026-01-08</lastmod>
    </url><url>
        <loc>https://www.mspinsights.ca/</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/website/info</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/feed</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-impossible-travel-alerts-are-failing-your-business-and-what-it-could-cost-you-41</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-mfa-alone-may-not-protect-your-microsoft-365-environment-40</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-trusted-office-locations-can-weaken-your-microsoft-365-security-39</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/hybrid-identity-security-the-hidden-risk-most-businesses-dont-see-until-its-too-late-37</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/mfa-fatigue-attacks-the-overlooked-risk-increasing-business-costs-36</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-smbs-should-block-high-risk-sign-ins-in-microsoft-365-before-it-costs-you-35</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/identity-protection-without-alerts-is-a-silent-security-failure-and-clients-still-pay-for-it-34</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/microsoft-365-identity-protection-alerts-alone-do-not-prevent-attacks-and-this-gap-can-be-costly-33</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/identity-protection-alerts-do-not-automatically-prevent-attacks-implications-for-your-business-31</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/when-break-glass-accounts-fail-the-hidden-business-risk-and-cost-for-msps-30</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/entra-id-sign-in-logs-the-hidden-risk-msps-need-to-explain-to-clients-29</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/microsoft-entra-id-defaults-a-risk-msps-should-not-overlook-28</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-device-trust-is-often-assumed-rather-than-verified-27</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/guest-users-the-silent-lateral-movement-risk-most-msps-miss-26</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/when-break-glass-accounts-let-msps-down-the-most-25</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/the-hidden-risks-of-all-users-in-conditional-access-and-why-msps-get-burned-24</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-sign-in-risk-user-risk-and-how-msps-get-burned-by-confusing-them-23</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/how-session-cookies-bypass-mfa-entirely-and-why-mfa-enabled-is-no-longer-enough-for-msps-22</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-identity-breaches-bypass-controls-and-why-msps-see-them-first-21</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/how-spf-dkim-and-dmarc-work-together-and-why-msps-cant-ignore-them-20</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/inbox-rules-the-email-attack-most-smbs-dont-see-until-the-money-is-gone-19</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/data-leaks-start-with-just-share-the-link-18</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/shared-inboxes-shared-risk-the-hidden-email-security-gap-in-smbs-17</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/email-security-roi-for-smbs-why-one-good-decision-pays-for-itself-15</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-phishing-costs-smbs-thousands-and-why-it-keeps-happening-14</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/identity-security-gaps-that-are-quietly-costing-smbs-real-money-13</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-excess-admin-access-leads-to-breaches-11</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/what-happens-when-admins-lock-themselves-out-10</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-smbs-should-block-risky-countries-and-why-we-do-this-by-default-9</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-smbs-outgrow-security-defaults-faster-than-they-think-8</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-backups-still-fail-canadian-smbs-7</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-mfa-alone-doesnt-mean-youre-secure-6</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-legacy-auth-is-still-the-1-smb-breach-vector-5</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-most-msp-security-incidents-start-with-we-thought-we-were-covered-4</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/5-ways-msps-can-stand-out-in-todays-marketplace-3</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/the-top-5-cybersecurity-mistakes-canadian-smbs-still-make-in-2025-2</loc>
    </url><url>
        <loc>https://www.mspinsights.ca/blog/insights-for-msps-who-own-the-risk-1/why-smbs-are-still-the-primary-target-for-cyber-attacks-in-2025-1</loc>
    </url>
</urlset>