{"id":393,"date":"2022-05-17T22:45:05","date_gmt":"2022-05-17T22:45:05","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=393"},"modified":"2023-04-06T10:54:24","modified_gmt":"2023-04-06T10:54:24","slug":"cybersecurity-services-3","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-3\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  data-label=\"Content\" data-id=\"content--1\" data-export-id=\"content-15\" data-category=\"content\" class=\"content-15 content-section content-section-spacing\" id=\"content-1\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"><div  data-section-title-area=\"true\" class=\"row text-center\">   <div  class=\"section-title-col\" data-type=\"column\">       <h2  class=\"\"><span  style=\"color: rgb(3, 169, 244); font-weight: 700;\">Security Audit<\/span><\/h2>       <p  class=\"lead\" style=\"text-align: justify;\">\u201cAn information security audit is an audit on the level of information security in an organization. It is an independent review and examination of system records, activities and related documents. These audits are intended to improve the level of information security, avoid improper information security designs, and optimize the efficiency of the security safeguards and security processes\u201d\n<br ><br >\n<span  style=\"font-weight: 700;\">Wondering if your IT infrastructure is secure?\n<\/span><br >\nYou need to consider a security audit, which will provide invaluable information about your real security controls.<\/p>   <\/div><\/div> <div  class=\"row middle-sm\"><div  class=\"col-sm-6 flexbox around-xs top-xs space-bottom-xs space-top-xs\"> <div  class=\"overlay-box flexbox middle-xs center-xs overlay-holder\"><div  class=\"overlay-box-offset offset-border shadow-medium border-color2 hide-xs\"><\/div> <img decoding=\"async\"  class=\"flexbox shadow-large img1\" data-size=\"500x500\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/05\/laptop.jpeg\" title=\"laptop\" alt=\"\"><\/div> <\/div> <div  class=\"col-sm-6\" data-type=\"column\"> <h3  class=\"\" style=\"text-align: center;\"><span  style=\"font-weight: 700; color: rgb(3, 169, 244);\">Security standards which require an audit:<\/span><\/h3>  <p  class=\"lead\" style=\"text-align: center;\"><span  style=\"font-weight: 600;\">ISO 9001:2015<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeff<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: center;\"><span  style=\"font-weight: 600;\">ISO\/IEC 27001:2022<\/span><\/p><p  class=\"lead\" style=\"text-align: center;\"><span  style=\"font-weight: 600;\">PCI DSS<\/span><\/p><\/div> <\/div><\/div> <\/div><div  data-label=\"Cta\" data-id=\"cta--1\" data-export-id=\"cta-centered-bg-section\" data-category=\"cta\" data-section-ov=\"1\" class=\"cta-centered-bg-section content-section content-section-spacing-medium white-text\" data-parallax-depth=\"20\" id=\"cta-1\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  data-type=\"column\" class=\"\"> <h2  class=\"\">Join us! <span  class=\"font-300\">It will only take a minute<\/span><\/h2> <a class=\"button color1\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\" rel=\"noopener\">GET STARTED TODAY<\/a><\/div> <\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Security Audit \u201cAn information security audit is an audit on the level of information security in an organization. It is an independent review and examination of system records, activities and related documents. These audits are intended to improve the level of information security, avoid improper information security designs, and optimize the efficiency of the security&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-3\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-393","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":1,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/393\/revisions"}],"predecessor-version":[{"id":1043,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/393\/revisions\/1043"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}