{"id":833,"date":"2022-04-05T15:55:00","date_gmt":"2022-04-05T15:55:00","guid":{"rendered":"https:\/\/net2web.ca\/?page_id=833"},"modified":"2022-04-07T17:15:54","modified_gmt":"2022-04-07T17:15:54","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/net2web.ca\/index.php\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"833\" class=\"elementor elementor-833\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1b77302d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b77302d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-555f22e\" data-id=\"555f22e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41a595d2 elementor-widget elementor-widget-heading\" data-id=\"41a595d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><div class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d45a305 elementor-widget elementor-widget-heading\" data-id=\"5d45a305\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Shield Your Business From Modern Digital Security Threats<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-12b63c45\" data-id=\"12b63c45\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1950d602 elementor-widget elementor-widget-text-editor\" data-id=\"1950d602\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Protecting your digital assets \u2014 from servers, applications, all the way down to individual files \u2014 is multi-layered and complex. Your IT security needs will look completely different from another company\u2019s. That\u2019s why we audit your IT infrastructure and current security protections before devising and implementing your unique IT security plan. With custom IT security services from Connectability, you get the attention and level of protection your business needs at an affordable monthly cost.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2bb1c37 home-section3 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"2bb1c37\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e7ad1e0\" data-id=\"e7ad1e0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-594f14de elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"594f14de\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b413f6e\" data-id=\"b413f6e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-383a728f elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"383a728f\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-image-box .elementor-image-box-content{width:100%}@media (min-width:768px){.elementor-widget-image-box.elementor-position-left .elementor-image-box-wrapper,.elementor-widget-image-box.elementor-position-right .elementor-image-box-wrapper{display:flex}.elementor-widget-image-box.elementor-position-right .elementor-image-box-wrapper{text-align:right;flex-direction:row-reverse}.elementor-widget-image-box.elementor-position-left .elementor-image-box-wrapper{text-align:left;flex-direction:row}.elementor-widget-image-box.elementor-position-top .elementor-image-box-img{margin:auto}.elementor-widget-image-box.elementor-vertical-align-top .elementor-image-box-wrapper{align-items:flex-start}.elementor-widget-image-box.elementor-vertical-align-middle .elementor-image-box-wrapper{align-items:center}.elementor-widget-image-box.elementor-vertical-align-bottom .elementor-image-box-wrapper{align-items:flex-end}}@media (max-width:767px){.elementor-widget-image-box .elementor-image-box-img{margin-left:auto!important;margin-right:auto!important;margin-bottom:15px}}.elementor-widget-image-box .elementor-image-box-img{display:inline-block}.elementor-widget-image-box .elementor-image-box-title a{color:inherit}.elementor-widget-image-box .elementor-image-box-wrapper{text-align:center}.elementor-widget-image-box .elementor-image-box-description{margin:0}<\/style><div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/net2web.ca\/wp-content\/uploads\/2022\/04\/security.png\" class=\"elementor-animation-push attachment-full size-full wp-image-1891\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><div class=\"elementor-image-box-title\">Comprehensive Data Security Management<\/div><p class=\"elementor-image-box-description\">Managing employee access & implementing security protocols is the first step to simple yet effective data security. Increase productivity with data security management that keeps your information safe, available, & accessible only to those that truly require it.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-79502bb3\" data-id=\"79502bb3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-beaad76 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"beaad76\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/net2web.ca\/wp-content\/uploads\/2022\/04\/antivirus.png\" class=\"elementor-animation-push attachment-full size-full wp-image-1893\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><div class=\"elementor-image-box-title\">Industry-Leading Intrusion Detection and Prevention<\/div><p class=\"elementor-image-box-description\">Track and thwart digital threats with advanced intrusion detection and prevention services from Connectability. <br>\nOur solutions will help defend your network against threats, expose weak spots and continually strengthen your digital walls.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-424ba6e7\" data-id=\"424ba6e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ec2d9f3 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"4ec2d9f3\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/net2web.ca\/wp-content\/uploads\/2022\/04\/padlock.png\" class=\"elementor-animation-push attachment-full size-full wp-image-1898\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><div class=\"elementor-image-box-title\">Advanced Network <br>Security<\/div><p class=\"elementor-image-box-description\">Malware, viruses & malicious users can take down a network fast. With state-of-the-art network security infrastructure & network monitoring, you can prevent threats from entering your network in the first place \u2013 reducing downtime & enabling productivity from your team.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-28ea5fa2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"28ea5fa2\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6eded11a\" data-id=\"6eded11a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75c17b9a elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"75c17b9a\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/net2web.ca\/wp-content\/uploads\/2022\/04\/shield.png\" class=\"elementor-animation-push attachment-full size-full wp-image-1911\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><div class=\"elementor-image-box-title\">Expert IT Security Services<\/div><p class=\"elementor-image-box-description\">Our security experts protect your IT infrastructure and answer your questions.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4bcf957\" data-id=\"4bcf957\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b1a4486 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"4b1a4486\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/net2web.ca\/wp-content\/uploads\/2022\/04\/locked.png\" class=\"elementor-animation-push attachment-full size-full wp-image-2032\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><div class=\"elementor-image-box-title\">Email Encryption Software<\/div><p class=\"elementor-image-box-description\">These softwares protect your outgoing information from phishing, viruses &amp; scam.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-70f935cf\" data-id=\"70f935cf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7edb32e6 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"7edb32e6\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/net2web.ca\/wp-content\/uploads\/2022\/04\/wifi.png\" class=\"elementor-animation-push attachment-full size-full wp-image-2036\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><div class=\"elementor-image-box-title\">Wi-Fi Configurations<\/div><p class=\"elementor-image-box-description\">Managed Wi-Fi configurations with strict user access and inbound traffic controls<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Shield Your Business From Modern Digital Security Threats Protecting your digital assets \u2014 from servers, applications, all the way down to individual files \u2014 is multi-layered and complex. Your IT security needs will look completely different from another company\u2019s. That\u2019s why we audit your IT infrastructure and current security protections before devising and<br \/><a class=\"moretag\" href=\"https:\/\/net2web.ca\/index.php\/cyber-security\/\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":2136,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/page-builder.php","meta":{"footnotes":""},"class_list":["post-833","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/pages\/833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/comments?post=833"}],"version-history":[{"count":88,"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/pages\/833\/revisions"}],"predecessor-version":[{"id":2138,"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/pages\/833\/revisions\/2138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/media\/2136"}],"wp:attachment":[{"href":"https:\/\/net2web.ca\/index.php\/wp-json\/wp\/v2\/media?parent=833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}