<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://www.haekka.com/</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/about-us</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/contact-us</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/privacy-policy</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/pricing</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/workflows</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/streams</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/pulse</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/phishing</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/terms-of-service</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/demo</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/features</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/case-studies</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/bridge</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/billing-support</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/support</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/10-step-guide-to-complying-with-ccpa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/2021-predictions-for-security-awareness</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/5-ways-to-prevent-social-engineering-attacks</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/5-tasks-automate-with-slack-apps</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/8-tips-for-managing-team-permissions-on-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/5-things-to-consider-when-buying-a-security-awareness-training-program-in-2022</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/6-reasons-ransomware-attacks-are-on-the-rise</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/9-healthcare-startups-to-watch-in-2022</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/9-lms-features-slack-has-built-in</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/announcing-haekka-2</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/blog-compliance-keeping-promises</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/best-slack-apps-for-security-and-compliance</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/announcing-our-pre-seed-round-of-funding</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/challenges-for-hipaa-compliance</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/calculating-the-roi-of-security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/choosing-your-compliance-framework</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/a-simple-guide-to-managing-slack-permissions</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/dos-and-donts-for-using-phi-in-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/cybersecurity-organizations-dont-follow-best-practices</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/create-a-culture-of-security-at-your-organization</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/data-retention-in-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/hello-haekka</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/hitrust-and-data-regulations-part-5-of-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/hipaa-violations-and-how-to-avoid-them</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/hipaa-and-slack-app-directory-apps</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/hitrust-scoring-part-3-of-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/how-long-does-hipaa-require-you-to-store-medical-records</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/how-to-organize-your-slack-workspace</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/introduction-to-hitrust-part-1-of-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/how-often-do-you-train-on-security-awareness</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/leveraging-hitrust-at-your-company-part-6-of-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/make-slack-hipaa-compliant</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/introducing-tips-and-topics</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/microsoft-teams-phishing</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/is-slack-hipaa-compliant</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/one-in-four-healthcare-workers-dont-get-security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/phishing-on-the-rise-as-email-security-stalls</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/privacy-by-design-and-default</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/moving-to-paid-beta</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/privacy-compromises-during-covid-19</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/relaxing-hipaa-under-covid-19</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-course-for-modern-work</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/sec-proposes-new-cybersecurity-incident-disclosure-rules</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/raising-a-seed-round-on-zoom-during-covid</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/ransomware-attack-hits-global-meat-market</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-maturity-model-part-2</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-maturity-model-part-1</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-topics-for-remote-work</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-training-for-remote-work</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-engagement-in-the-flow-of-work</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-engagement-over-security-awareness</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-training-vs-privacy-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-training-topics-for-2021</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/shared-responsibility-and-hitrust-part-4-of-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-for-security-how-to-do-policy-acknowledgements-in-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-app-directory-permissions</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-as-a-modern-lms</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-for-security-how-to-make-security-announcements-in-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-permission-scopes</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-phishing</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/soc-2-primer-your-mini-guide-to-soc-2</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-for-security-user-risk-surveys-in-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/slack-for-security-using-slack-as-a-security-and-privacy-lms</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-5-best-cybersecurity-practices-for-remote-workers</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/social-pressure-good-security-hygeine</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-evolution-of-security-awareness</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-all-new-owasp-top-10-for-2021</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-format-of-training-on-haekka</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/types-of-hitrust-assessments-part-2-of-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/two-new-guides-on-remote-work</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-ultimate-guide-to-handling-protected-health-information-phi</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/understanding-hipaa-certification</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/twilios-lack-of-consistency-in-security-documentation</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-is-complianceops</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/we-are-doing-techstars-boulder-w2021</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-is-phishing-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-is-event-driven-security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/we-launched-haekka-on-product-hunt-today</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-is-micro-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-is-the-owasp-top-10</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-is-upskilling</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-does-cmmc-require-for-security-awareness</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-training-is-required-by-hipaa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-topics-should-should-you-include-in-your-security-and-privacy-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-you-should-know-about-the-colorado-privacy-act-cpa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-phishing-attacks-do-we-fall-for</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/why-should-you-do-security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/what-we-can-all-learn-from-twilios-recent-hack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/why-you-should-try-slack-groups</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/people-centric-security-or-bottoms-up</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/new-paradigm-in-endpoint-protection</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/no-code-low-code-for-social-engineering</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/watch-out-for-these-black-friday-scams</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/how-frequently-do-you-run-phishing-campaigns</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-lms-and-a-slack-lms</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-evolution-of-human-risk-in-the-world-of-saas</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/forrester-wave-security-awareness-training-solutions-sa-t</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-needs-a-new-experience-not-more-new-content</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/digest-stream-dont-use-pizza123-as-a-password</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/social-engineering-and-phishing-on-my-first-million-mfm</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/is-social-engineering-spooky</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-digest-the-stigma-of-human-error-in-security-incidents</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-vs-learning-management-systems</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/working-out-your-security-muscle</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/the-job-of-phishing-simulations</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/connecting-employees-to-security</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/workflows-feel-like-saas-security-training-magic</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/security-awareness-games-in-slack</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/blog/reading-a-url-to-tell-if-its-real-or-fake</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-3-4-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-3-3-2</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-3-2-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-public-api-documentation</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-3-0-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-2-2-8</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-2-2-4</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-2-2-1</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-2-2-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-2-1-6</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/pci-requirements-that-haekka-satisfies</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/how-to-download-training-evidence</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/user-levels</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-09-08-haekka-release-1-2-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/haekka-release-2-0-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-10-07-haekka-release-1-5-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-09-24-haekka-release-1-4-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/gdpr-training-requirements-that-haekka-satisfies</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-07-26-haekka-beta-release-v-0-9-8</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-10-21-haekka-release-1-6-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-09-02-haekka-release-1-0-0-and-1-1-0</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-07-15-haekka-beta-release-v-0-9-7</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/2021-12-08-haekka-release-1-6-5</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/adding-haekka-as-a-channel-integration</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/soc-2-controls-that-haekka-satisfies</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/documentation/hipaa-rules-that-haekka-satisfies</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/hitrust-for-startups-complete-guide-for-2022</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/training-for-gdpr-vs-ccpa-what-you-should-know</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/national-cybersecurity-awareness-month-ncsam-super-guide-2022</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/guide-to-training-remote-employees</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/free-soc-2-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/free-security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/free-pci-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/free-hipaa-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/free-gdpr-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/free-ccpa-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/creating-a-culture-of-privacy-in-2020-a-definitive-guide</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/complete-guide-to-security-awareness-training-updated-for-2021</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/compliance-and-privacy-training-the-ultimate-guide-2020</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/executive-summary-haekkas-comprehensive-compliance-guide-for-startups</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/10-features-of-effective-hipaa-training-in-2020</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/guides/complete-guide-to-cybersecurity-and-remote-work</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/case-studies/maestroqa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/case-studies/mpirik</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/case-studies/canceriq</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/case-studies/sift-healthcare</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/ccpa-primer-an-introduction-to-ccpa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/gdpr-primer-an-introduction-to-gdpr</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/datica-open-source-hipaa-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/diversity-equity-inclusion-and-justice-deij-level-1</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/diversity-equity-inclusion-and-justice-deij-level-2</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/harassment-training-for-employees</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/harassment-training-for-managers</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/hipaa-for-sales-and-marketing</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/hipaa-primer-introduction-to-hipaa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/digital-messaging-and-hipaa</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/hipaa-privacy-2020</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/hipaa-training-for-clinicians</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/hipaa-privacy-2021</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/hipaa-training-for-operations</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/owasp-top-10-2017</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/pci-primer-an-introduction-to-pci</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/pci-dss-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/recognizing-preventing-and-reporting-bribery</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/pipeda-training-2022</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/soc-2-primer-an-introduction-to-soc-2</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/pagerduty-open-source-security-awareness-training</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/pagerduty-open-source-security-training-for-engineers</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/security-awareness-training-adobe</loc>
   </url>
   <url>
      <loc>https://www.haekka.com/training-catalog/security-and-compliance-in-the-cloud-by-barr-advisory</loc>
   </url>

</urlset>