{"id":369,"date":"2022-05-17T14:27:10","date_gmt":"2022-05-17T14:27:10","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=369"},"modified":"2022-09-07T08:10:20","modified_gmt":"2022-09-07T08:10:20","slug":"cybersecurity-services-2","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-2\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  data-label=\"Content\" data-id=\"content--1\" data-export-id=\"content-9\" data-category=\"content\" class=\"content-9 content-section content-section-spacing\" id=\"content-1\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\"><span  style=\"color: rgb(3, 169, 244); font-weight: 700;\">Security Assessment<\/span><\/h2> <p  class=\"lead\" style=\"text-align: justify;\">\u201cThe goal of a security assessment is to ensure that necessary security controls are integrated into the design and implementation of a project.\u201d<br >\nWe can provide a view of your existing attack surface and your business impact of potential attacks for Industrial Control Systems or Business Application and their components.<\/p><\/div> <\/div> <div  class=\"row space-bottom text-center\" data-type=\"row\"> <div  class=\"col-sm-4 col-padding-small\"> <i  class=\"color1 fa icon bordered round fa-area-chart\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Vulnerability Assessment<\/span><\/h4> <p  class=\"lead\" style=\"text-align: justify;\"><span  style=\"font-weight: 400;\">We will identify, classify and prioritize all security vulnerabilities in an information system. A full vulnerability assessment evaluates if an information system is exposed to known public vulnerabilities, assigns severity levels to the identified vulnerabilities, and recommends mitigation steps where is the case.<\/span><\/p><\/div> <div  class=\"col-sm-4 col-padding-small\"><i  class=\"fa icon bordered round fa-chrome color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Threat Assessment<\/span><\/h4> <p  class=\"lead\" style=\"text-align: justify;\"><span  style=\"font-weight: 400;\">We will determine the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality that can adversely affect operations and\/or specific assets.<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 400;\">\ufeff<\/span><\/span><\/p><\/div> <div  class=\"col-sm-4 col-padding-small\"><i  class=\"fa icon bordered round fa-gg color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">IT Risk Assessment<\/span><\/h4> <p  class=\"lead\" style=\"text-align: justify;\"><span  style=\"font-weight: 400;\">IT risk assessments are performed to allow organizations to assess, identify and modify their overall security posture and to enable security, operations, organizational management and other personnel to collaborate and view the entire organization from an attacker\u2019s perspective.<\/span><\/p><\/div> <\/div> <div  class=\"row center-xs middle-xs\"> <div  class=\"col-sm-12\" data-type=\"column\"> <img decoding=\"async\"  class=\"shadow-large\" src=\"\/\/extendthemes.com\/assets\/mesmerize\/sections-images\/apple-1838564-big.jpg\" data-size=\"950x633\"> <\/div><\/div> <\/div><\/div><div  data-label=\"Cta\" data-id=\"cta--2\" data-export-id=\"cta-centered-section-grid\" data-category=\"cta\" class=\"cta-centered-section-grid content-section content-section-spacing-medium bg-color1 white-text\" id=\"cta-2\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"col-xs-12 col-sm-10 col-sm-offset-1 col-md-8 col-md-offset-2\" data-type=\"column\"> <h2  class=\"\">Join us! <span  class=\"font-300\">It will only take a minute<\/span><\/h2>  <a class=\"button color2\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\" rel=\"noopener\">GET STARTED TODAY<\/a><\/div> <\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Security Assessment \u201cThe goal of a security assessment is to ensure that necessary security controls are integrated into the design and implementation of a project.\u201d We can provide a view of your existing attack surface and your business impact of potential attacks for Industrial Control Systems or Business Application and their components. Vulnerability Assessment We&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-2\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-369","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":0,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/369\/revisions"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}