{"id":2194,"date":"2023-08-22T13:58:29","date_gmt":"2023-08-22T17:58:29","guid":{"rendered":"https:\/\/inversetech.com\/?page_id=2194"},"modified":"2023-10-09T14:11:58","modified_gmt":"2023-10-09T18:11:58","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/inversetech.com\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000d2b&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;90deg&#8221; background_color_gradient_stops=&#8221;rgba(0,13,43,0.78) 44%|rgba(0,13,43,0) 80%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,13,43,0.93)&#8221; background_color_gradient_end=&#8221;rgba(0,13,43,0.82)&#8221; background_image=&#8221;https:\/\/inversetech.com\/wp-content\/uploads\/2023\/09\/shutterstock_2179907155-min.jpg&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;100px||100px||true|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; title_text=&#8221;shutterstock_2179907155-min&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;e864d11f-3dab-4fa3-ac06-4f0e1a260807&#8243; header_font=&#8221;Barlow Condensed||||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;85px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;|||15px|false|false&#8221; header_font_size_tablet=&#8221;85px&#8221; header_font_size_phone=&#8221;63px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; header_text_shadow_style=&#8221;preset3&#8243; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#2ED4EA&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h1>Cybersecurity<\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;20px||||false|false&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;13px&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; text_text_shadow_blur_strength=&#8221;0.75em&#8221; text_text_shadow_color=&#8221;#000000&#8243; header_text_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>We have partnered with a US-based, leading cybersecurity firm to ensure that we help our clients keep their businesses safe from cyber attacks. As organizations manage increasingly remote workforces (via mobile phones, laptops, and tablets), they are exposed to a greater variety of cybersecurity and cloud security threats than ever before.\u00a0<\/p>\n<p>With our partner, we work to prevent network-based and social-based cyber attacks.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_color_gradient_direction=&#8221;-130deg&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;75px|75px|75px|75px|true|true&#8221; custom_padding_tablet=&#8221;75px||75px||true|true&#8221; custom_padding_phone=&#8221;30px|30px|30px|30px|true|true&#8221; custom_css_main_element=&#8221;align-items: center&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#2ED4EA&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|30px||30px|true|true&#8221; custom_padding_phone=&#8221;76px|20px|76px|20px|true|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;#e8702f&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Barlow Semi Condensed|700||on|||||&#8221; header_3_text_color=&#8221;#002975&#8243; header_3_font_size=&#8221;20px&#8221; header_3_letter_spacing=&#8221;5px&#8221; header_3_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||16px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Together we offer a range of comprehensive solutions to safeguard your entire IT environment.<\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.72)&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; width=&#8221;85%&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>It\u2019s important to know that these solutions are\u00a0<strong>not<\/strong>\u00a0cookie-cutter but customized to your unique situation and needs. We always aim to provide the end-to-end protection you need while relieving your internal team from the security burden.<\/p>\n<p>As your cybersecurity provider, we know it is not a \u201cone and done.\u201d Our team stays on the job 24\/7. As cybersecurity tools evolve, so do the cyber threats to our clients. We are committed to always staying ahead and proactively safeguarding your IT environment.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|30px||30px|true|true&#8221; custom_padding_phone=&#8221;76px|20px|76px|20px|true|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;#e8702f&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/inversetech.com\/wp-content\/uploads\/2023\/08\/Inverse-Icons-05b.png&#8221; title_text=&#8221;Inverse-Icons-05b&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;130%|130%&#8221; transform_scale_tablet=&#8221;100%|100%&#8221; transform_scale_phone=&#8221;100%|100%&#8221; transform_scale_last_edited=&#8221;on|phone&#8221; transform_translate_tablet=&#8221;&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|phone&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; body_font_size_tablet=&#8221;13px&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;52px&#8221; header_2_line_height=&#8221;1.1em&#8221; width=&#8221;78%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||16px||false|false&#8221; custom_margin_tablet=&#8221;||16px||false|false&#8221; custom_margin_phone=&#8221;||16px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|100px||100px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;52px&#8221; header_2_font_size_phone=&#8221;36px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Cyber threats include:<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;ORGANIZATIONS WITH A SIGNIFICANT NUMBER OF REMOTE WORKERS&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe066;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed||||||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\"><span>The number of work-from-home employees and 1099 contractors was already at an all-time high before the Covid-19 pandemic. It has skyrocketed since and remains high. These individuals each can represent an \u201copen door\u201d to threats if all precautions are not taken.<\/span><\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;ORGANIZATIONS RELYING ON THE CLOUD. &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe070;||divi||400&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed||||||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>Recent surveys have shown that the average organization uses five clouds. Gone are the days when servers were on-site and easily reached, and security issues were quickly addressed. While working in the cloud has many advantages, it has increased cyber risk.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Barlow Semi Condensed|700||on|||||&#8221; header_3_text_color=&#8221;#002975&#8243; header_3_font_size=&#8221;20px&#8221; header_3_letter_spacing=&#8221;5px&#8221; header_3_line_height=&#8221;1.1em&#8221; width=&#8221;80%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||16px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Another real and present danger of cyber attacks is through your company email and employees.<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;EMAIL&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf658;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed||||||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>It is said that 91% of all cyber attacks start with a phishing email. It is critical to have a best-in-breed email security provider to stop harmful malware in its tracks. BEFORE it gets in. So whether your email users are on-site or remote, leveraging the security \u201cgate\u201d should be a priority for all companies.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;EMPLOYEES &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf509;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed||||||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>While security measures are necessary, companies still need to be able to count on their employees to \u201ckeep the gates closed.\u201d That\u2019s why we provide security awareness training for our client\u2019s employees and provide them with the information they need to recognize threats. As hackers are becoming more sophisticated in their efforts, training users to spot a phishing email is more important than ever. It only takes one click on one email.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||50px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Barlow Semi Condensed|700||on|||||&#8221; header_3_text_color=&#8221;#002975&#8243; header_3_font_size=&#8221;20px&#8221; header_3_letter_spacing=&#8221;5px&#8221; header_3_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||16px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Together with our cybersecurity partner, we are committed to keeping your organization safe. Call today to schedule an assessment of your risks and our solutions.<\/h2>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/calendly.com\/raymond-richeson\/30min&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Schedule a free consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;94ef7aca-dcd9-4f9d-93b2-efa3466cebc7&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;19px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#0096d0&#8243; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_direction=&#8221;152deg&#8221; button_bg_color_gradient_stops=&#8221;#267cc1 0%|#2ed4ea 100%&#8221; button_bg_color_gradient_start=&#8221;#267cc1&#8243; button_bg_color_gradient_end=&#8221;#2ed4ea&#8221; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#2ED4EA&#8221; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;1px&#8221; button_font=&#8221;Barlow Condensed|600||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;15px||15px||true|false&#8221; custom_padding=&#8221;15px|80px|15px|80px|true|true&#8221; button_text_size_tablet=&#8221;19px&#8221; button_text_size_phone=&#8221;16px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; box_shadow_style=&#8221;preset3&#8243; global_module=&#8221;800&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_use_color_gradient__hover=&#8221;off&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_color_gradient_end__hover=&#8221;#00bfbf&#8221; button_bg_color_gradient_start__hover=&#8221;#002975&#8243; button_bg_color_gradient_start_position__hover=&#8221;0%&#8221; button_bg_color_gradient_end_position__hover=&#8221;100%&#8221; button_bg_color_gradient_stops__hover=&#8221;#002975 0%|#00bfbf 100%&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#002975&#8243; button_border_width__hover_enabled=&#8221;off|desktop&#8221; button_border_width__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>CybersecurityWe have partnered with a US-based, leading cybersecurity firm to ensure that we help our clients keep their businesses safe from cyber attacks. As organizations manage increasingly remote workforces (via mobile phones, laptops, and tablets), they are exposed to a greater variety of cybersecurity and cloud security threats than ever before.\u00a0 With our partner, we [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2194","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comprehensive Cybersecurity Solutions for Your Business<\/title>\n<meta name=\"description\" content=\"Empower your business with robust cybersecurity solutions. Partnered with a leading US-based firm, we offer customized protection against evolving cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inversetech.com\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comprehensive Cybersecurity Solutions for Your Business\" \/>\n<meta property=\"og:description\" content=\"Empower your business with robust cybersecurity solutions. Partnered with a leading US-based firm, we offer customized protection against evolving cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inversetech.com\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Inverse\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-09T18:11:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/inversetech.com\/cybersecurity\/\",\"url\":\"https:\/\/inversetech.com\/cybersecurity\/\",\"name\":\"Comprehensive Cybersecurity Solutions for Your Business\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/#website\"},\"datePublished\":\"2023-08-22T17:58:29+00:00\",\"dateModified\":\"2023-10-09T18:11:58+00:00\",\"description\":\"Empower your business with robust cybersecurity solutions. Partnered with a leading US-based firm, we offer customized protection against evolving cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/inversetech.com\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/inversetech.com\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/inversetech.com\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/inversetech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/inversetech.com\/#website\",\"url\":\"https:\/\/inversetech.com\/\",\"name\":\"Inverse\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/inversetech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/inversetech.com\/#organization\",\"name\":\"Inverse\",\"url\":\"https:\/\/inversetech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"width\":202,\"height\":130,\"caption\":\"Inverse\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comprehensive Cybersecurity Solutions for Your Business","description":"Empower your business with robust cybersecurity solutions. Partnered with a leading US-based firm, we offer customized protection against evolving cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inversetech.com\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Comprehensive Cybersecurity Solutions for Your Business","og_description":"Empower your business with robust cybersecurity solutions. Partnered with a leading US-based firm, we offer customized protection against evolving cyber threats.","og_url":"https:\/\/inversetech.com\/cybersecurity\/","og_site_name":"Inverse","article_modified_time":"2023-10-09T18:11:58+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/inversetech.com\/cybersecurity\/","url":"https:\/\/inversetech.com\/cybersecurity\/","name":"Comprehensive Cybersecurity Solutions for Your Business","isPartOf":{"@id":"https:\/\/inversetech.com\/#website"},"datePublished":"2023-08-22T17:58:29+00:00","dateModified":"2023-10-09T18:11:58+00:00","description":"Empower your business with robust cybersecurity solutions. Partnered with a leading US-based firm, we offer customized protection against evolving cyber threats.","breadcrumb":{"@id":"https:\/\/inversetech.com\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inversetech.com\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/inversetech.com\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/inversetech.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/inversetech.com\/#website","url":"https:\/\/inversetech.com\/","name":"Inverse","description":"","publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inversetech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/inversetech.com\/#organization","name":"Inverse","url":"https:\/\/inversetech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","width":202,"height":130,"caption":"Inverse"},"image":{"@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages\/2194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/comments?post=2194"}],"version-history":[{"count":13,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages\/2194\/revisions"}],"predecessor-version":[{"id":2494,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages\/2194\/revisions\/2494"}],"wp:attachment":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media?parent=2194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}