{"id":473,"date":"2022-05-18T10:39:20","date_gmt":"2022-05-18T10:39:20","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=473"},"modified":"2022-12-01T13:31:47","modified_gmt":"2022-12-01T13:31:47","slug":"cybersecurity-services-5","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-5\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  data-label=\"About\" data-id=\"about--2\" data-export-id=\"about-9\" data-category=\"about\" class=\"about-9 content-section content-section-spacing\" id=\"about-2\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"><div  data-section-title-area=\"true\" class=\"row text-center\">   <div  class=\"section-title-col\" data-type=\"column\">       <h2  class=\"\"><span  style=\"color: rgb(3, 169, 244); font-weight: 700;\">Security Awareness Training<\/span><\/h2>       <p  class=\"lead\">The cybersecurity attacks are becoming much more sophisticated than in the past, so, you have to train your employees to be aware about these.<\/p>   <\/div><\/div> <div  class=\"row middle-sm text-center\"><div  class=\"col-sm-5 space-bottom-xs content-column content-right-sm\" data-type=\"column\">  <h2  class=\"\" style=\"text-align: center;\">Enjoy the best <br ><font  face=\"Playfair Display, sans-serif\"><b ><i >Security Awareness Training<\/i><\/b><\/font>&nbsp;<\/h2>  <\/div> <div  class=\"col-sm-7 flexbox flexbox middle-xs center-xs space-bottom-xs\"><div  class=\"overlay-box flexbox middle-xs center-xs overlay-holder \"> <div  class=\"overlay-box-offset offset-background shadow-medium bg-color2 hide-xs\"><\/div> <img decoding=\"async\"  class=\"flexbox shadow-large img1\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/05\/SA.jpg\" data-size=\"600x400\" title=\"SA\" alt=\"\"><\/div> <\/div><\/div> <\/div><\/div><div  data-label=\"Cta\" data-id=\"cta--1\" data-export-id=\"cta-centered-bg-section\" data-category=\"cta\" data-section-ov=\"1\" class=\"cta-centered-bg-section content-section content-section-spacing-medium white-text\" data-parallax-depth=\"20\" id=\"cta-1\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  data-type=\"column\" class=\"\"> <h2  class=\"\">Join us! <span  class=\"font-300\">It will only take a minute<\/span><\/h2> <a class=\"button color1\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\" rel=\"noopener\">GET STARTED TODAY<\/a><\/div> <\/div><\/div> <\/div><div  data-label=\"Features\" data-id=\"features--1\" data-export-id=\"features-13-card\" data-category=\"features\" class=\"features-13 content-section content-section-spacing\" id=\"features-1\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\">Security Awareness Training Modules<\/h2> <\/div> <\/div> <div  class=\"row spaced-cols\" data-type=\"row\"> <div  class=\" col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop bordered round big color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Handling Sensitive Information<\/span><\/h4>  <p  class=\"lead\">Properly handling<br >\nsensitive information is\ncrucial. So you need to\nknow how to protect,\nstore and dispose\nconfidential data.<\/p><\/div> <\/div> <div  class=\" col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Creating Strong Passwords<\/span><\/h4>  <p  class=\"lead\">A password,<br >\nsometimes called a\npasscode, is secret\ndata, typically a string\nof characters, usually\nused to confirm a\nuser\u2019s identity.<\/p><\/div> <\/div> <div  class=\" col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Mobile Device Security<\/span><\/h4>  <p  class=\"lead\">Mobile device security<br >\nrefers to the measures\ndesigned to protect\nsensitive information\nstored on and\ntransmitted by laptops,\nsmartphones, tablets,\nwearables, and other\nportable devices.<\/p><\/div> <\/div> <div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Safe Web Browsing<\/span><\/h4>  <p  class=\"lead\">Safe web browsing<br >\nrefers to the measures\nyou have to take in\norder to browse on\nthe internet safely.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Phishing<\/span><\/h4>  <p  class=\"lead\">Phishing is a type of<br >\nsocial engineering\nwhere an attacker\nsends a fraudulent\n(e.g., spoofed, fake, or\notherwise deceptive)\nmessage designed to\ntrick a person into\nrevealing sensitive\ninformation to the\nattacker or to deploy\nmalicious software on\nthe victim\u2019s\ninfrastructure like\nransomware.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Ransomware<\/span><\/h4>  <p  class=\"lead\">Ransomware is a type<br >\nof malware from\ncryptovirology that\nthreatens to publish\nthe victim\u2019s personal\ndata or permanently\nblock access to it\nunless a ransom is\npaid.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Social Engineering<\/span><\/h4>  <p  class=\"lead\">Social engineering is<br >\nthe psychological\nmanipulation of people\ninto performing\nactions or divulging\nconfidential\ninformation.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Vishing<\/span><\/h4>  <p  class=\"lead\">Voice phishing, or<br >\nvishing, is the use of\ntelephony (often Voice\nover IP telephony) to\nconduct phishing\nattacks.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Email Security<\/span><\/h4>  <p  class=\"lead\">Email security is a term<br >\nfor describing diferent\nprocedures and\ntechniques for\nprotecting email\naccounts, content, and\ncommunication\nagainst unauthorized\naccess, loss or\ncompromise.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Physical Security<\/span><\/h4>  <p  class=\"lead\">Physical security<br >\ndescribes security\nmeasures that are\ndesigned to deny\nunauthorized access\nto facilities, equipment\nand resources and to\nprotect personnel and\nproperty from damage\nor harm (such as\nespionage, theft, or\nterrorist attacks).<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Working from Home<\/span><\/h4>  <p  class=\"lead\">Working from<br >\nhome refers to the\nmeasures you have to\ntake in order to ensure\nyou can work remotely\nfrom home as securely\nas possible.<\/p><\/div> <\/div><div  class=\"col-sm-6 col-md-3 \"> <div  class=\"card\" data-type=\"column\"> <i  class=\"fa icon fa-connectdevelop big round bordered color1\"><\/i> <h4  class=\"\"><span  style=\"font-weight: 700;\">Travel Securely<\/span><\/h4>  <p  class=\"lead\">Travel securely refers<br >\nto the measures you\nhave to take in order\nto protect your data\nand device before,\nduring, and after your\ntrip.<\/p><\/div> <\/div><\/div> <\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Security Awareness Training The cybersecurity attacks are becoming much more sophisticated than in the past, so, you have to train your employees to be aware about these. Enjoy the best Security Awareness Training&nbsp; Join us! It will only take a minute GET STARTED TODAY Security Awareness Training Modules Handling Sensitive Information Properly handling sensitive information&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-5\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-473","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":0,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/473\/revisions"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}