{"id":616,"date":"2022-03-24T02:57:40","date_gmt":"2022-03-24T02:57:40","guid":{"rendered":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/?page_id=616"},"modified":"2022-03-24T03:01:24","modified_gmt":"2022-03-24T03:01:24","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/solutions\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"616\" class=\"elementor elementor-616\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-1f9be6a1 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"1f9be6a1\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62a81c40\" data-id=\"62a81c40\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c1be556 systima-footer-image elementor-absolute elementor-widget elementor-widget-image\" data-id=\"5c1be556\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.6 - 28-02-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"40\" src=\"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/wp-content\/uploads\/2022\/03\/footer-curve.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/wp-content\/uploads\/2022\/03\/footer-curve.png 1000w, https:\/\/infallible-cerf.45-76-122-129.plesk.page\/wp-content\/uploads\/2022\/03\/footer-curve-300x12.png 300w, https:\/\/infallible-cerf.45-76-122-129.plesk.page\/wp-content\/uploads\/2022\/03\/footer-curve-768x31.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-33147b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33147b5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-top-column elementor-element elementor-element-62bcb99\" data-id=\"62bcb99\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-5c49c41\" data-id=\"5c49c41\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3affa2e elementor-widget elementor-widget-heading\" data-id=\"3affa2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.6 - 28-02-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-335150d elementor-widget elementor-widget-text-editor\" data-id=\"335150d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.6 - 28-02-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p style=\"margin-bottom: 1rem; text-align: center; color: #212529; font-family: AvenirNextLT, sans-serif; font-size: 16px; font-style: normal; font-weight: 400;\">Maintaining the integrity of your system is a critical component of your overall cyber security strategy. The threat landscape has broadened due to the numerous SaaS services currently offered, creating an increased security risk as a result of multiple profiles. In addition, each system is built differently, hosted in multiple locations, accessed by numerous users, and constantly under threat from sophisticated hacking programs trying to obtain user sensitive information.<br \/><br \/>Securing your data has become increasingly complicated and vital to the survival of your business. Many off-the-shelf software programs include built-in security services, however, it is the responsibility of the purchaser to configure these programs and ensure they remain compliant. While there are insurances in place, they rely on active security measures to avoid key security risks.<br \/><br \/>Systima assess the security of your system&#8217;s configuration, software, information handling processes, and usability. We help you identify gaps in the perimeter of your network including installation of software to monitor your domain credentials, that could be compromised due to hacking and sold on the dark web. We educate your users on the new policies, governance, risk and compliance, and conduct incident response training. We ensure your organisation enjoys a stable, base level of security and advise on how to improve the risk profile by guiding you through our comprehensive suite of cyber security services to strengthen any weaknesses identified.<\/p><div>\u00a0<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-112997a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"112997a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/contact\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-top-column elementor-element elementor-element-8953876\" data-id=\"8953876\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Maintaining the integrity of your system is a critical component of your overall cyber security strategy. The threat landscape has broadened due to the numerous SaaS services currently offered, creating an increased security risk as a result of multiple profiles. In addition, each system is built differently, hosted in multiple locations, accessed by &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/solutions\/cyber-security\/\"> <span class=\"screen-reader-text\">Cyber Security<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":16,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-616","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":4,"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/616\/revisions"}],"predecessor-version":[{"id":623,"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/616\/revisions\/623"}],"up":[{"embeddable":true,"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/16"}],"wp:attachment":[{"href":"https:\/\/infallible-cerf.45-76-122-129.plesk.page\/index.php\/wp-json\/wp\/v2\/media?parent=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}