<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
  <loc>https://efros.com/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/services/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/services/opengraph-image</image:loc>
    <image:title>EFROS Managed IT Services</image:title>
    <image:caption>Managed IT services overview — Help Desk, M365 admin, endpoint operations, network ops, cloud infrastructure.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/services/3cx/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/services/cloud-migration/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/services/managed-it/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/services/cybersecurity-assessment/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/services/email-security/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/services/cloud-infrastructure/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/services/compliance-readiness/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/services/network-security/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/services/ai-automation/</loc>
  <lastmod>2026-05-10</lastmod>
</url>
<url>
  <loc>https://efros.com/trust/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/why-efros/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/free-security-assessment/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/security/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/opengraph-image</image:loc>
    <image:title>EFROS Security Services</image:title>
    <image:caption>MDR, vCISO, SOC, incident response, Zero Trust, managed SIEM.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/soc-as-a-service/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/soc-as-a-service/opengraph-image</image:loc>
    <image:title>SOC as a Service</image:title>
    <image:caption>24/7 security operations center — Tier 1 to Tier 3, threat hunting, IR.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/managed-siem/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/managed-siem/opengraph-image</image:loc>
    <image:title>Managed SIEM</image:title>
    <image:caption>Microsoft Sentinel, Splunk, Elastic — operated by EFROS analysts.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/mdr/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/mdr/opengraph-image</image:loc>
    <image:title>MDR — Managed Detection &amp; Response</image:title>
    <image:caption>Detection-led security operations layered on top of existing tools.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/vciso/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/vciso/opengraph-image</image:loc>
    <image:title>vCISO Services</image:title>
    <image:caption>Fractional CISO — compliance program leadership without full-time hire.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/zero-trust/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/zero-trust/opengraph-image</image:loc>
    <image:title>Zero Trust Architecture</image:title>
    <image:caption>NIST SP 800-207 zero trust implementation — identity, network, device, data.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/incident-response/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/incident-response/opengraph-image</image:loc>
    <image:title>Incident Response Retainer</image:title>
    <image:caption>Pre-positioned IR — named contact, documented runbook, tested escalation.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/microsoft-365/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/microsoft-365/opengraph-image</image:loc>
    <image:title>Microsoft 365 Security</image:title>
    <image:caption>Defender XDR, Conditional Access, M365 tenant hardening.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/endpoint/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/endpoint/opengraph-image</image:loc>
    <image:title>Endpoint Security</image:title>
    <image:caption>EDR/XDR deployment, ASR rules, Tamper Protection, threat hunting.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/backup-dr/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/security/backup-dr/opengraph-image</image:loc>
    <image:title>Backup &amp; Disaster Recovery</image:title>
    <image:caption>Immutable backups, tested restore, 3-2-1-1-0 architecture.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/security/responsible-disclosure/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/security-score/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/security-score/methodology/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/industries/opengraph-image</image:loc>
    <image:title>EFROS Industries</image:title>
    <image:caption>Vertical programs — healthcare, finance, manufacturing, logistics, legal, retail.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/industries/healthcare/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/financial-services/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/retail/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/manufacturing/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/logistics/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/logistics-cybersecurity/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/freight-broker-email-security/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/dispatch-it-support/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/moving-company-cybersecurity/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/trucking-company-msp/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/tms-eld-gps-it-security/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/professional-services/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/industries/legal/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/case-studies/</loc>
  <lastmod>2026-05-12</lastmod>
  <image:image>
    <image:loc>https://efros.com/case-studies/opengraph-image</image:loc>
    <image:title>EFROS Case Studies</image:title>
    <image:caption>Real-world implementation case studies across verticals.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/case-studies/manufacturer-vendor-consolidation/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/case-studies/manufacturer-vendor-consolidation/opengraph-image</image:loc>
    <image:title>Manufacturer Vendor Consolidation</image:title>
    <image:caption>12 vendors to one accountable program for a regional manufacturer.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/case-studies/retail-uptime-140-locations/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/case-studies/retail-uptime-140-locations/opengraph-image</image:loc>
    <image:title>Retail Uptime — 140 Locations</image:title>
    <image:caption>99.95% uptime across 140 retail locations on a single SLA.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/case-studies/healthcare-hipaa-soc-migration/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/case-studies/healthcare-hipaa-soc-migration/opengraph-image</image:loc>
    <image:title>Healthcare HIPAA SOC Migration</image:title>
    <image:caption>Multi-specialty group transitioned to 24/7 HIPAA-aligned SOC operations.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/case-studies/financial-services-soc2-audit/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/case-studies/financial-services-soc2-audit/opengraph-image</image:loc>
    <image:title>Financial Services SOC 2 Audit</image:title>
    <image:caption>RIA passed SOC 2 Type II with zero exceptions, evidence pipeline standing up.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/case-studies/manufacturing-cmmc-level2/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/case-studies/manufacturing-cmmc-level2/opengraph-image</image:loc>
    <image:title>Manufacturing CMMC Level 2</image:title>
    <image:caption>Mid-sized defense subcontractor C3PAO-ready in 90 days with enclave scoping.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/compare/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/compare/opengraph-image</image:loc>
    <image:title>EFROS Comparisons</image:title>
    <image:caption>EFROS vs Arctic Wolf, Huntress, eSentire, ConnectWise; in-house vs managed SOC.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/compare/in-house-soc/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/typical-mssp/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/msp-vs-mssp/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/efros-vs-arctic-wolf/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/efros-vs-huntress/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/efros-vs-esentire/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/efros-vs-connectwise-mssp/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/compare/mssp-vs-law-firm-vs-grc-for-ai-governance/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/who-we-serve/</loc>
  <lastmod>2026-05-17</lastmod>
  <image:image>
    <image:loc>https://efros.com/who-we-serve/opengraph-image</image:loc>
    <image:title>Who EFROS Serves</image:title>
    <image:caption>Regulated SMB, mid-market, and enterprise organizations across the US.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/services/ai-governance/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/services/ai-governance/opengraph-image</image:loc>
    <image:title>AI Governance Service</image:title>
    <image:caption>NIST AI RMF, Colorado AI Act, ISO 42001, state-AI-law overlays for US clients.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/pricing/</loc>
  <lastmod>2026-05-17</lastmod>
  <image:image>
    <image:loc>https://efros.com/pricing/opengraph-image</image:loc>
    <image:title>EFROS Pricing</image:title>
    <image:caption>Core IT, Secure Operations, Fortress SOC — engagement tiers and what each includes.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/how-we-engage/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/partners/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/about/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/about/opengraph-image</image:loc>
    <image:title>About EFROS</image:title>
    <image:caption>Cybersecurity-first managed IT partner for US operational companies since 2009.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/about/stefan-efros/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/team/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/blog/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/blog/category/cybersecurity/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/blog/category/compliance/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/blog/category/cloud/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/blog/category/it-management/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/blog/top-cybersecurity-threats-2026/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/top-cybersecurity-threats-2026.png</image:loc>
    <image:title>Top Cybersecurity Threats Businesses Face in 2026</image:title>
    <image:caption>AI-powered phishing, triple-extortion ransomware, supply chain compromise, and cloud misconfigurations — the threats your SOC needs to be ready for.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/cloud-migration-strategy-guide/</loc>
  <lastmod>2026-05-17</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/cloud-migration-strategy-guide.png</image:loc>
    <image:title>A Complete Guide to Enterprise Cloud Migration Strategy</image:title>
    <image:caption>Assessment, dependency mapping, migration execution, and post-migration optimization — the methodology behind extensive cloud migration playbooks across AWS, Azure, and GCP.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/managed-it-services-benefits/</loc>
  <lastmod>2026-05-16</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/managed-it-services-benefits.png</image:loc>
    <image:title>Why Managed IT Services Matter for Growth</image:title>
    <image:caption>The cost, security, and operational case for outsourcing IT — and what separates a real MSP from a help desk with a website.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/compliance-guide-hipaa-pci-soc2/</loc>
  <lastmod>2026-05-15</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/compliance-guide-hipaa-pci-soc2.png</image:loc>
    <image:title>IT Compliance: HIPAA, PCI-DSS, SOC 2 Explained</image:title>
    <image:caption>What HIPAA, PCI-DSS, and SOC 2 actually require — and how to pass audits without scrambling. Written for CISOs and compliance leads.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/zero-trust-security-implementation/</loc>
  <lastmod>2026-05-14</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/zero-trust-security-implementation.png</image:loc>
    <image:title>Implementing Zero Trust Security: A Practical Framework</image:title>
    <image:caption>A phased implementation framework: identity-first access control, micro-segmentation, continuous verification, and maturity measurement.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/mdr-vs-edr-vs-xdr-complete-comparison-2026/</loc>
  <lastmod>2026-05-13</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/mdr-vs-edr-vs-xdr-comparison.png</image:loc>
    <image:title>MDR vs EDR vs XDR: Complete Comparison Guide for 2026</image:title>
    <image:caption>EDR monitors endpoints. XDR correlates across layers. MDR adds 24/7 human analysts and incident response. When to buy each — and how they fit together.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/soc-2-type-ii-readiness-12-week-checklist/</loc>
  <lastmod>2026-05-12</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/soc-2-type-ii-readiness-checklist.png</image:loc>
    <image:title>SOC 2 Type II Readiness: A 12-Week Checklist</image:title>
    <image:caption>The 12-week path to a SOC 2 Type II audit-ready state: gap assessment, control design, evidence pipeline, pre-audit dry run. What actually matters, what&apos;s optional.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/ransomware-response-playbook-first-24-hours/</loc>
  <lastmod>2026-05-11</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/ransomware-response-playbook-24-hours.png</image:loc>
    <image:title>Ransomware Response Playbook: The First 24 Hours</image:title>
    <image:caption>Hour 0-24 after ransomware hits: detection, containment, decisions on payment, stakeholder communication, evidence preservation. The playbook we run.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/cmmc-2-defense-subcontractors-compliance-roadmap/</loc>
  <lastmod>2026-05-10</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/cmmc-2-defense-compliance-roadmap.png</image:loc>
    <image:title>CMMC 2.0 Compliance Roadmap for Defense</image:title>
    <image:caption>CMMC 2.0 is now enforced in DoD contracts. Level 1 self-attestation, Level 2 third-party assessment, Level 3 government review — the practical roadmap.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/virtual-ciso-when-why-how-to-choose/</loc>
  <lastmod>2026-05-09</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/virtual-ciso-guide-2026.png</image:loc>
    <image:title>Virtual CISO: When, Why, and How to Choose One in 2026</image:title>
    <image:caption>A vCISO delivers executive security leadership at 0.25-0.5 FTE cost. When to hire one, what to expect, how to evaluate providers, and what a fair engagement looks like.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/blog/pci-dss-4-scope-reduction-guide/</loc>
  <lastmod>2026-05-08</lastmod>
  <image:image>
    <image:loc>https://efros.com/blog/pci-dss-4-scope-reduction-guide.png</image:loc>
    <image:title>PCI-DSS v4.0.1 Scope Reduction Guide</image:title>
    <image:caption>Reducing PCI scope cuts audit effort, breach risk, and compliance cost. The three techniques that work, the pitfalls, and a practical scope-reduction roadmap.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/glossary/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/tools/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/opengraph-image</image:loc>
    <image:title>EFROS Free Tools</image:title>
    <image:caption>Self-assessment quizzes and calculators for cybersecurity, AI governance, and compliance.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/mssp-tco-calculator/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/mssp-tco-calculator/opengraph-image</image:loc>
    <image:title>MSSP TCO Calculator</image:title>
    <image:caption>Side-by-side cost model — in-house vs managed SOC, fully loaded with hidden costs.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/cmmc-readiness/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/cmmc-readiness/opengraph-image</image:loc>
    <image:title>CMMC Readiness Quiz</image:title>
    <image:caption>20-question CMMC Level 2 readiness self-assessment across the 14 NIST 800-171 families.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/pci-scope-reduction/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/pci-scope-reduction/opengraph-image</image:loc>
    <image:title>PCI-DSS Scope Reduction</image:title>
    <image:caption>PCI-DSS v4.0.1 cardholder-data environment scope analysis.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/security-scan/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/security-scan/opengraph-image</image:loc>
    <image:title>Free Security Scan</image:title>
    <image:caption>60-second external posture scan — DNSSEC, SPF/DKIM/DMARC, TLS, headers, reputation.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/ai-risk-score/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/ai-risk-score/opengraph-image</image:loc>
    <image:title>AI Risk Score</image:title>
    <image:caption>5-minute AI risk classification — Colorado AI Act, NYC LL144, CA AB 2013, NIST AI RMF.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/cost-of-getting-hit/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/cost-of-getting-hit/opengraph-image</image:loc>
    <image:title>Cost of Getting Hit Calculator</image:title>
    <image:caption>Calculate your business&apos;s exposure to ransomware, BEC, and data breach incidents.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/tools/are-you-ready/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/tools/are-you-ready/opengraph-image</image:loc>
    <image:title>Are You Ready Quiz</image:title>
    <image:caption>6-question cybersecurity readiness assessment for owner-operators.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/incident-stories/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/incident-stories/ransomware-at-regional-law-firm/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/incident-stories/bec-fraud-at-manufacturer/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/incident-stories/insider-data-theft-at-clinic/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/incident-stories/supply-chain-compromise-at-logistics-company/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/incident-stories/ai-data-exposure-at-cpa-firm/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/for-owners/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/for-owners/clinics/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/for-owners/law-firms/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/for-owners/community-banks/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/for-owners/professional-services/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/for-owners/manufacturers/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/webinar/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/breach-simulation/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/insurance-renewal/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/insurance-renewal/what-changed-2026/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/insurance-renewal/ai-clause-decoder/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/insurance-renewal/application-cheat-sheet/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/insurance-renewal/ransomware-exclusions/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/soc-2-readiness-checklist/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/cmmc-level-2-scorecard/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/incident-response-runbook/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/vendor-risk-questionnaire/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/security-score-sample/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/microsoft-365-security-checklist/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/dmarc-rollout-guide/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/cyber-insurance-readiness-checklist/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/nist-ai-rmf-implementation-guide/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/ai-governance-for-law-firms/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/colorado-ai-act-healthcare/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/hipaa-msp-for-clinics-with-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/sr-11-7-community-banks-ai-governance/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/vciso-for-smb/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/resources/mdr-provider-comparison-2026/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/contact/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/contact/opengraph-image</image:loc>
    <image:title>Contact EFROS</image:title>
    <image:caption>Reach Stefan Efros for managed IT, MSSP, AI governance, or vendor diligence inquiries.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/sitemap/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/privacy/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/terms/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/</loc>
  <lastmod>2026-05-18</lastmod>
  <image:image>
    <image:loc>https://efros.com/research/opengraph-image</image:loc>
    <image:title>EFROS Research</image:title>
    <image:caption>Branded primary research — AI vendor governance index, sector reports, methodology.</image:caption>
    <image:license>https://creativecommons.org/licenses/by/4.0/</image:license>
  </image:image>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/methodology/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/changelog/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-sector/healthcare/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-sector/legal/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-sector/banking/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-sector/foundation/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-sector/productivity/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-state/california/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-state/colorado/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-state/new-york/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-state/illinois/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/by-state/texas/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/challenges/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/mssp-mcp-server-registry/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/state-ai-law-tracker/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/openai-chatgpt/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/anthropic-claude/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/google-gemini/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/meta-llama/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/perplexity/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/microsoft-365-copilot/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/notion-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/otter-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/salesforce-einstein/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/glean/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/harvey/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/thomson-reuters-cocounsel/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/lexis-plus-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/westlaw-precision-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/spellbook/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/ironclad-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/nuance-dax-copilot/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/abridge/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/suki/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/heidi-health/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/fico-falcon-fraud-manager/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/zest-ai/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/upstart/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/hummingbird/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/unit21/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/arctic-wolf/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/huntress/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/esentire/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/connectwise/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
<url>
  <loc>https://efros.com/research/us-ai-vendor-governance-index/sophos/</loc>
  <lastmod>2026-05-18</lastmod>
</url>
</urlset>
