{"id":686,"date":"2026-04-07T10:32:46","date_gmt":"2026-04-07T10:32:46","guid":{"rendered":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/?page_id=686"},"modified":"2026-04-07T12:58:20","modified_gmt":"2026-04-07T12:58:20","slug":"cybersecurity-risk-management","status":"publish","type":"page","link":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/cybersecurity-risk-management\/","title":{"rendered":"Cybersecurity &amp; Risk Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"686\" class=\"elementor elementor-686\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a182054 e-flex e-con-boxed e-con e-parent\" data-id=\"a182054\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6e239a elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f6e239a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity &amp; Risk <br> Management\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6649746 e-flex e-con-boxed e-con e-parent\" data-id=\"6649746\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-917511a e-con-full e-flex e-con e-child\" data-id=\"917511a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c300d8 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"6c300d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"812\" src=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/18.webp\" class=\"attachment-large size-large wp-image-30\" alt=\"\" srcset=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/18.webp 800w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/18-296x300.webp 296w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/18-768x780.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e1c166 e-con-full e-flex e-con e-child\" data-id=\"8e1c166\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06bd75b elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"06bd75b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Strategy &amp; Risk Advisory\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b91a9 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"28b91a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Your Systems with Structured Security and Risk Control\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40c9413 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"40c9413\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Services in <\/span><b>Cybersecurity Risk Management<\/b><span style=\"font-weight: 400;\"> at Blue Swan Technologies INC. will aid organizations in defending their critical systems, data, and operations against world-wide threats and keep their business integrity in check.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">We provide a comprehensive evaluation of your security position, help you identify vulnerabilities, and ensure that appropriate controls are in place on your network, applications, and user access. With our <\/span><b>Cyber Risk Management <\/b><span style=\"font-weight: 400;\">we manage all aspects of security from threat detection and endpoint protection to Identity Management and Compliance Frameworks.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">We also offer a protective monitoring service, which continually watches for intrusions, minimizes your exposure and helps fortify your environment, all while keeping things operating smoothly.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-353e5bc e-grid e-con-full e-con e-child\" data-id=\"353e5bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9eeb833 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"9eeb833\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Risk Assessment &amp; Vulnerability Management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Identity &amp; Access Control Implementation<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ee3fb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"84ee3fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Threat Monitoring &amp; Incident Response<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Experienced Security Specialists<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36218f1 services-box e-flex e-con-boxed e-con e-parent\" data-id=\"36218f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cad2b7c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"cad2b7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">OUR WORK EXECUTION STRATEGY\n\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fa49b3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1fa49b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Cybersecurity Implementation Framework<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa4afe3 e-grid e-con-full e-con e-child\" data-id=\"fa4afe3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bcd5cb ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-image-box\" data-id=\"7bcd5cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                <a >\n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/20.webp\" class=\"attachment-full size-full wp-image-195\" alt=\"\" srcset=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/20.webp 750w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/20-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                <\/a>\n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h5 class=\"elementskit-info-box-title\">\n\n                        Security Assessment &amp; Risk Analysis\n                        \n                    <\/h5>\n                                                            <div class=\"elementskit-box-style-content\">\n                        We assess your systems, application and network architecture in order to discover flaws, incorrect settings and possible security vulnerabilities.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec2aad4 ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-image-box\" data-id=\"ec2aad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                <a >\n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img decoding=\"async\" width=\"1280\" height=\"853\" src=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/30.webp\" class=\"attachment-full size-full wp-image-218\" alt=\"\" srcset=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/30.webp 1280w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/30-300x200.webp 300w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/30-1024x682.webp 1024w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/30-768x512.webp 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\n                <\/div>\n                <\/a>\n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h5 class=\"elementskit-info-box-title\">\n\n                        Security Design &amp; Control Planning\n                        \n                    <\/h5>\n                                                            <div class=\"elementskit-box-style-content\">\n                        We establish security policies, access controls and protection mechanisms that suit your infrastructure and compliance requirements.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a50144a ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-image-box\" data-id=\"a50144a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                <a >\n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/19.webp\" class=\"attachment-full size-full wp-image-196\" alt=\"\" srcset=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/19.webp 750w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/19-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                <\/a>\n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h5 class=\"elementskit-info-box-title\">\n\n                        Implementation &amp; System Hardening\n                        \n                    <\/h5>\n                                                            <div class=\"elementskit-box-style-content\">\n                        To mitigate risk we apply a number of tools, we configure our firewalls, apply our security policies and harden our systems.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90f7a8c ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-image-box\" data-id=\"90f7a8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                <a >\n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/21.webp\" class=\"attachment-full size-full wp-image-197\" alt=\"\" srcset=\"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/21.webp 750w, https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-content\/uploads\/2026\/03\/21-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                <\/a>\n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h5 class=\"elementskit-info-box-title\">\n\n                        Monitoring &amp; Incident Response\n                        \n                    <\/h5>\n                                                            <div class=\"elementskit-box-style-content\">\n                        We have also implemented constant monitoring, logging and response procedures with our managed cyber security services, so that we can report, analyze and then take immediate action for security incidents. \n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a39add8 services-curve-pro e-flex e-con-boxed e-con e-parent\" data-id=\"a39add8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c43bae3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c43bae3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">OUR STRATEGIC EXECUTION APPROACH\n\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a3e546 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6a3e546\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk-Based Security Solutions for Organizational Protection\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90a6960 e-grid e-con-full e-con e-child\" data-id=\"90a6960\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0f8cc6 ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"f0f8cc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-   \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  \">\n                    <svg class=\"elementkit-infobox-icon ekit-svg-icon icon-laptop-phone\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M18.4 22.4h-12.8c-1.323 0-2.4-1.077-2.4-2.4v-12.8c0-1.323 1.077-2.4 2.4-2.4h20.8c1.323 0 2.4 1.077 2.4 2.4v1.6c0 0.442-0.358 0.8-0.8 0.8s-0.8-0.358-0.8-0.8v-1.6c0-0.441-0.359-0.8-0.8-0.8h-20.8c-0.441 0-0.8 0.359-0.8 0.8v12.8c0 0.441 0.359 0.8 0.8 0.8h12.8c0.442 0 0.8 0.358 0.8 0.8s-0.358 0.8-0.8 0.8zM18.4 28.8h-16c-1.323 0-2.4-1.077-2.4-2.4v-1.6c0-0.442 0.358-0.8 0.8-0.8h17.6c0.442 0 0.8 0.358 0.8 0.8s-0.358 0.8-0.8 0.8h-16.8v0.8c0 0.441 0.359 0.8 0.8 0.8h16c0.442 0 0.8 0.358 0.8 0.8s-0.358 0.8-0.8 0.8zM29.6 28.8h-6.4c-1.323 0-2.4-1.077-2.4-2.4v-12.8c0-1.323 1.077-2.4 2.4-2.4h6.4c1.323 0 2.4 1.077 2.4 2.4v12.8c0 1.323-1.077 2.4-2.4 2.4zM23.2 12.8c-0.441 0-0.8 0.359-0.8 0.8v12.8c0 0.441 0.359 0.8 0.8 0.8h6.4c0.441 0 0.8-0.359 0.8-0.8v-12.8c0-0.441-0.359-0.8-0.8-0.8h-6.4zM26.4 25.6c-0.21 0-0.416-0.085-0.566-0.235s-0.234-0.355-0.234-0.566 0.085-0.417 0.234-0.566c0.149-0.149 0.355-0.234 0.566-0.234s0.417 0.085 0.566 0.234c0.149 0.149 0.235 0.355 0.235 0.566s-0.085 0.417-0.235 0.566c-0.149 0.149-0.355 0.235-0.566 0.235z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h5 class=\"elementskit-info-box-title\">\n                    Threat &amp; Vulnerability Management                <\/h5>\n                        \t\t  \t<p>We identify, evaluate and map security risks to manage them in a timely manner and mitigate exposure of the system.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ebe077 ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"9ebe077\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-   \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  \">\n                    <svg class=\"elementkit-infobox-icon ekit-svg-icon icon-cloud1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M25.61 25.6h-16.010c-5.293 0-9.6-4.307-9.6-9.6s4.307-9.6 9.6-9.6c2.564 0 5.018 1.029 6.816 2.84 0.14-0.311 0.314-0.608 0.52-0.888 0.902-1.222 2.347-1.952 3.864-1.952 2.647 0 4.8 2.153 4.8 4.8 0 0.561-0.097 1.11-0.284 1.627 0.098-0.004 0.196-0.007 0.294-0.007 3.523 0 6.39 2.867 6.39 6.39s-2.867 6.39-6.39 6.39zM9.6 8c-4.411 0-8 3.589-8 8s3.589 8 8 8h16.010c2.641 0 4.79-2.149 4.79-4.79s-2.149-4.79-4.79-4.79c-0.567 0-1.119 0.097-1.641 0.288-0.349 0.128-0.74-0.002-0.944-0.312s-0.167-0.721 0.089-0.99c0.571-0.601 0.886-1.385 0.886-2.206 0-1.764-1.436-3.2-3.2-3.2-1.027 0-1.966 0.475-2.577 1.302-0.369 0.5-0.583 1.085-0.621 1.692-0.021 0.339-0.254 0.628-0.58 0.72s-0.677-0.031-0.872-0.309c-0.176-0.25-0.367-0.491-0.566-0.716-1.518-1.709-3.699-2.69-5.983-2.69z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h5 class=\"elementskit-info-box-title\">\n                    Understanding Risk Exposure                <\/h5>\n                        \t\t  \t<p>We undertake analysis of user access, data flows and system dependencies to identify areas of potential risk, and define controls accordingly.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6159ab ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"d6159ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-   \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  \">\n                    <svg class=\"elementkit-infobox-icon ekit-svg-icon icon-paint-brush\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.564 1.622c-0.918-0.918-2.759-0.394-5.794 1.649-2.578 1.735-5.671 4.364-8.709 7.401-4.503 4.503-7.926 8.924-9.066 11.654-0.188-0.068-0.382-0.122-0.583-0.162-1.179-0.233-2.461 0.065-3.515 0.818-1.513 1.080-1.914 2.623-1.972 2.883-0.319 1.189-0.922 2.324-1.745 3.283-0.265 0.308-0.235 0.772 0.068 1.043 1.058 0.948 2.411 1.424 3.819 1.424 1.357 0 2.764-0.442 4.005-1.328 0.582-0.416 1.023-0.875 1.108-0.966 1.054-1.133 1.502-2.619 1.28-3.977 2.678-0.96 7.347-4.511 12.054-9.219 3.037-3.037 5.666-6.13 7.401-8.709 2.043-3.035 2.566-4.876 1.648-5.794zM8.087 28.301c-0.040 0.043-0.406 0.428-0.883 0.769-1.733 1.238-3.855 1.381-5.397 0.428 0.722-0.99 1.258-2.105 1.566-3.266v-0c0.003-0.013 0.007-0.026 0.009-0.039 0.003-0.012 0.262-1.195 1.382-1.995 0.721-0.515 1.58-0.722 2.357-0.568 0.641 0.127 1.18 0.492 1.517 1.030 0.662 1.055 0.429 2.587-0.553 3.642zM9.951 23.941c-0.015-0.026-0.242-0.486-0.664-0.828 0.364-0.972 1.147-2.287 2.238-3.796l2.341 2.341c-1.647 1.185-2.996 1.958-3.915 2.282zM15.075 20.755l-2.644-2.644c0.457-0.588 0.951-1.197 1.478-1.82l2.988 2.988c-0.632 0.534-1.241 1.027-1.822 1.476zM28.447 6.917c-1.683 2.432-4.165 5.327-6.989 8.151-1.186 1.186-2.335 2.264-3.428 3.231l-3.141-3.141c0.996-1.127 2.082-2.284 3.229-3.43 2.824-2.824 5.719-5.307 8.151-6.99 2.995-2.072 4.028-2.075 4.227-2.048 0.027 0.198 0.024 1.232-2.049 4.227zM7.454 26.282c-0.361-0.199-0.816-0.067-1.015 0.294-0.020 0.037-0.044 0.071-0.072 0.102-0.056 0.058-0.239 0.236-0.43 0.372-0.289 0.207-0.602 0.355-0.928 0.44-0.399 0.104-0.638 0.513-0.534 0.912 0.088 0.336 0.391 0.558 0.722 0.558 0.063 0 0.126-0.008 0.19-0.024 0.503-0.132 0.98-0.357 1.418-0.67 0.281-0.201 0.654-0.568 0.657-0.571 0.111-0.12 0.207-0.254 0.286-0.398 0.199-0.361 0.067-0.816-0.294-1.015z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h5 class=\"elementskit-info-box-title\">\n                    Identity &amp; Access Management                <\/h5>\n                        \t\t  \t<p>We ensure system security by implementing role-based access, authentication controls, and user governance.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16dab1c ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"16dab1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-   \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  \">\n                    <svg class=\"elementkit-infobox-icon ekit-svg-icon icon-shield1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M26.337 5.475c-5.331 0-10.338-4.356-10.338-4.356s-5.006 4.294-10.338 4.294c-1.731 0-2.925-0.325-2.925-0.325v8.519c0 3.381 1.038 6.7 3.056 9.556 2.019 2.794 5.331 6.569 9.95 8.45l0.263 0.063 0.262-0.131c4.55-1.819 7.931-5.594 9.95-8.45 2.019-2.794 3.056-6.113 3.056-9.556v-8.387c-0.012 0-1.469 0.325-2.938 0.325zM26.469 6.775c0.587 0 1.106-0.063 1.625-0.131v6.894c0 0.769-0.056 1.525-0.169 2.275h-11.338v-12.606c1.7 1.244 5.531 3.569 9.881 3.569zM4.037 6.644c0.519 0.063 1.037 0.063 1.625 0.131 4.244 0 7.912-2.156 9.688-3.425v12.463h-11.144c-0.112-0.75-0.169-1.506-0.169-2.275v-6.894zM6.9 22.381c-1.181-1.625-2-3.431-2.456-5.331h10.906v12.938c-3.806-1.837-6.675-5.094-8.45-7.606zM25.231 22.381c-1.806 2.556-4.744 5.881-8.65 7.7v-13.031h11.106c-0.45 1.9-1.275 3.706-2.456 5.331z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h5 class=\"elementskit-info-box-title\">\n                    Network &amp; Endpoint Security                <\/h5>\n                        \t\t  \t<p>Firewalls, intrusion detection systems and endpoints protection are used to secure networks, servers and all endpoints.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e754d9 ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"2e754d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-   \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  \">\n                    <svg class=\"elementkit-infobox-icon ekit-svg-icon icon-database1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M28.907 2.574c-0.795-0.522-1.909-0.984-3.311-1.374-2.788-0.774-6.48-1.201-10.396-1.201s-7.609 0.426-10.396 1.201c-1.402 0.39-2.516 0.852-3.311 1.374-0.99 0.65-1.492 1.399-1.492 2.226v19.2c0 0.826 0.502 1.575 1.492 2.226 0.795 0.522 1.909 0.984 3.311 1.374 2.788 0.774 6.48 1.201 10.396 1.201s7.609-0.426 10.396-1.201c1.402-0.39 2.516-0.852 3.311-1.374 0.99-0.65 1.492-1.399 1.492-2.226v-19.2c0-0.826-0.502-1.575-1.492-2.226zM5.232 2.742c2.652-0.737 6.192-1.142 9.968-1.142s7.316 0.406 9.968 1.142c2.873 0.798 3.632 1.695 3.632 2.058s-0.759 1.26-3.632 2.058c-2.652 0.737-6.192 1.142-9.968 1.142s-7.316-0.406-9.968-1.142c-2.873-0.798-3.632-1.695-3.632-2.058s0.759-1.26 3.632-2.058zM25.168 26.058c-2.652 0.737-6.192 1.142-9.968 1.142s-7.316-0.406-9.968-1.142c-2.873-0.798-3.632-1.695-3.632-2.058v-4.106c0.786 0.494 1.863 0.933 3.204 1.305 2.788 0.774 6.48 1.201 10.396 1.201s7.609-0.426 10.396-1.201c1.341-0.372 2.417-0.811 3.204-1.305v4.106c0 0.363-0.759 1.26-3.632 2.058zM25.168 19.658c-2.652 0.737-6.192 1.142-9.968 1.142s-7.316-0.406-9.968-1.142c-2.873-0.798-3.632-1.695-3.632-2.058v-4.106c0.786 0.494 1.863 0.933 3.204 1.305 2.788 0.774 6.48 1.201 10.396 1.201s7.609-0.426 10.396-1.201c1.341-0.372 2.417-0.811 3.204-1.305v4.106c0 0.363-0.759 1.26-3.632 2.058zM25.168 13.258c-2.652 0.737-6.192 1.142-9.968 1.142s-7.316-0.406-9.968-1.142c-2.873-0.798-3.632-1.695-3.632-2.058v-4.106c0.786 0.494 1.863 0.933 3.204 1.305 2.788 0.774 6.48 1.201 10.396 1.201s7.609-0.426 10.396-1.201c1.341-0.372 2.417-0.811 3.204-1.305v4.106c0 0.363-0.759 1.26-3.632 2.058z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h5 class=\"elementskit-info-box-title\">\n                    Security Monitoring &amp; Compliance                <\/h5>\n                        \t\t  \t<p>We implement the required logging, monitoring and audit measures for activity monitoring and compliance.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e30c639 ekit-equal-height-disable elementor-invisible elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"e30c639\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-   \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  \">\n                    <svg class=\"elementkit-infobox-icon ekit-svg-icon icon-pie-chart\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M13.6 32c-3.633 0-7.048-1.415-9.617-3.983s-3.983-5.984-3.983-9.617c0-3.633 1.415-7.048 3.983-9.617s5.984-3.983 9.617-3.983c0.442 0 0.8 0.358 0.8 0.8v12h12c0.442 0 0.8 0.358 0.8 0.8 0 3.633-1.415 7.048-3.983 9.617s-5.984 3.983-9.617 3.983zM12.8 6.426c-6.245 0.413-11.2 5.626-11.2 11.974 0 6.617 5.383 12 12 12 6.348 0 11.56-4.955 11.974-11.2h-11.974c-0.442 0-0.8-0.358-0.8-0.8v-11.974zM29.6 16h-12.8c-0.442 0-0.8-0.358-0.8-0.8v-12.8c0-0.442 0.358-0.8 0.8-0.8 3.633 0 7.048 1.415 9.617 3.983s3.983 5.984 3.983 9.617c0 0.442-0.358 0.8-0.8 0.8zM17.6 14.4h11.174c-0.396-5.98-5.193-10.778-11.174-11.174v11.174z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h5 class=\"elementskit-info-box-title\">\n                    Ongoing Security Support                <\/h5>\n                        \t\t  \t<p>Monitoring, Updating &amp; Advising - we are continuously keeping up to date and providing advisory to ensure your security posture remains aligned to the risks<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ebc9112 e-flex e-con-boxed e-con e-parent\" data-id=\"ebc9112\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-feb54d6 e-con-full e-flex e-con e-child\" data-id=\"feb54d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9c5df6f e-con-full e-flex e-con e-child\" data-id=\"9c5df6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e604b77 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"e604b77\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">WHY BUSINESSES CHOOSE US\n\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8cf7c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2e8cf7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Built for Strong Protection and Controlled Risk\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b2c94a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"1b2c94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Our security strategy starts early to identify risk, applies controls that are workable and maintains visibility of a system. By providing <\/span><b>cyber risk management services<\/b><span style=\"font-weight: 400;\"> we enable organizations to transit from useful, short term fixes and reactive security to a formal security management process that minimizes risk and supports business continuity.<\/span><\/p><p><span style=\"font-weight: 400;\">Secure systems are developed by matching securities to the business processes thereby creating systems that are secure without impact on performance and usability.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa9ba82 e-con-full e-flex e-con e-child\" data-id=\"fa9ba82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bfa478 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"1bfa478\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSecurity Strategy &amp; Implementation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e426dd7 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"e426dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t24\/7 Monitoring &amp; Support\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e51b89b e-con-full e-flex e-con e-child\" data-id=\"e51b89b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f90d19e elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"f90d19e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t Certified Security Professionals\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14205df elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"14205df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tProven Risk Management Practices\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eef2393 e-flex e-con-boxed e-con e-parent\" data-id=\"eef2393\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f7a3112 e-con-full e-flex e-con e-child\" data-id=\"f7a3112\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7121c0c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7121c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">FAQs<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76ee4df elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"76ee4df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Answer to Common Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ad6b01 elementor-invisible elementor-widget elementor-widget-elementskit-accordion\" data-id=\"0ad6b01\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69ddc35ac3ef6\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-0ad6b01\">\n                        <a href=\"#collapse-6aafcf169ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-6aafcf169ddc35ac3ef6\" aria-expanded=\"true\" aria-controls=\"Collapse-6aafcf169ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">What is cybersecurity and risk management?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-6aafcf169ddc35ac3ef6\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">It is about defending systems, networks and data from attack, managing risk and identifying potential threats to the business.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-0ad6b01\">\n                        <a href=\"#collapse-c67283069ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-c67283069ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-c67283069ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">What makes cybersecurity relevant to our business?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-c67283069ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">It assists in avoiding data breaches, system crashes and financial loss, at the same time it also ensures compliance with industry regulations.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-0ad6b01\">\n                        <a href=\"#collapse-0e6b41f69ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-0e6b41f69ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-0e6b41f69ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">What does a security assessment comprise?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-0e6b41f69ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">This includes conducting a vulnerability scan, risk assessment, audit of system controls and tracing out the gaps in security controls.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-3-0ad6b01\">\n                        <a href=\"#collapse-53b2d6869ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-53b2d6869ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-53b2d6869ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">How do you defend yourself against cyber-attacks?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-53b2d6869ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-3-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">At Blue Swan Technologies INC we use firewalls, endpoint security, controls on access, monitoring systems and incident response procedures.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-4-0ad6b01\">\n                        <a href=\"#collapse-d5f6d0169ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-d5f6d0169ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-d5f6d0169ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">Is it possible to implement security measures in present systems?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-d5f6d0169ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-4-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">Yes, security controls can be implemented without disturbing existing operations.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-5-0ad6b01\">\n                        <a href=\"#collapse-bc20bf569ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-bc20bf569ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-bc20bf569ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">What is identity and access management?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-bc20bf569ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-5-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">It manages access to systems and data through use of authentication, authorization, and user role management.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-6-0ad6b01\">\n                        <a href=\"#collapse-f2cb07069ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f2cb07069ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-f2cb07069ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">How do you ensure compliance?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f2cb07069ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-6-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">Through: Resulting controls, recording audit trails and complying with regulations such as: GDPR, HIPAA, or ISO.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-7-0ad6b01\">\n                        <a href=\"#collapse-46fae1a69ddc35ac3ef6\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-46fae1a69ddc35ac3ef6\" aria-expanded=\"false\" aria-controls=\"Collapse-46fae1a69ddc35ac3ef6\">\n                            \n                            <span class=\"ekit-accordion-title\">Do you also provide long-term or continued security support?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-down-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.582 8.495c-0.578-0.613-1.544-0.635-2.153-0.059l-13.43 12.723-13.428-12.723c-0.61-0.578-1.574-0.553-2.153 0.059-0.579 0.611-0.553 1.576 0.058 2.155l14.477 13.715c0.293 0.277 0.67 0.418 1.047 0.418s0.756-0.14 1.048-0.418l14.477-13.715c0.611-0.579 0.637-1.544 0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<svg class=\"ekit-svg-icon icon-up-arrow1\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.524 22.15l-14.477-13.715c-0.587-0.556-1.509-0.556-2.095 0l-14.477 13.715c-0.611 0.579-0.637 1.544-0.058 2.155 0.579 0.613 1.544 0.637 2.153 0.058l13.428-12.721 13.43 12.721c0.294 0.279 0.67 0.418 1.048 0.418 0.402 0 0.806-0.159 1.105-0.475 0.579-0.611 0.553-1.576-0.058-2.155z\"><\/path><\/svg>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-46fae1a69ddc35ac3ef6\" class=\" collapse\" aria-labelledby=\"primaryHeading-7-0ad6b01\" data-parent=\"#accordion-69ddc35ac3ef6\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p><span style=\"font-weight: 400\">Yes, at Blue Swan Technologies INC we provide constant monitoring, threat detection and patching so the system remains protected all the time.<\/span><\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity &amp; Risk Management Cybersecurity Strategy &amp; Risk Advisory Protect Your Systems with Structured Security and Risk Control Services in Cybersecurity Risk Management at Blue Swan Technologies INC. will aid organizations in defending their critical systems, data, and operations against world-wide threats and keep their business integrity in check.\u00a0 We provide a comprehensive evaluation of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-686","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/pages\/686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/comments?post=686"}],"version-history":[{"count":22,"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/pages\/686\/revisions"}],"predecessor-version":[{"id":771,"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/pages\/686\/revisions\/771"}],"wp:attachment":[{"href":"https:\/\/demo1.varundigitalmedia.com\/blueswantech\/wp-json\/wp\/v2\/media?parent=686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}