{"id":131,"date":"2022-06-05T01:41:12","date_gmt":"2022-06-05T01:41:12","guid":{"rendered":"https:\/\/wat20.wpengine.com\/?page_id=131"},"modified":"2022-11-06T22:04:50","modified_gmt":"2022-11-06T22:04:50","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:800px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1920\" height=\"639\" alt=\"Cyber Security\" title=\"banner-5217683_1920\" src=\"https:\/\/go.wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920.jpg\" class=\"img-responsive wp-image-334\" srcset=\"https:\/\/wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920-200x67.jpg 200w, https:\/\/wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920-400x133.jpg 400w, https:\/\/wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920-600x200.jpg 600w, https:\/\/wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920-800x266.jpg 800w, https:\/\/wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920-1200x399.jpg 1200w, https:\/\/wearetechnology.com\/wp-content\/uploads\/2022\/10\/banner-5217683_1920.jpg 1920w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-color:var(--awb-color7);--awb-text-font-family:Arial, Helvetica, sans-serif;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><h1 style=\"text-align: center;\">We Lost All Our Customer&#8217;s Data!<\/h1>\n<h1 style=\"text-align: center;\">We&#8217;ve Been Hacked!<\/h1>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-font-family:Arial, Helvetica, sans-serif;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p style=\"text-align: center;\"><strong>These are statements you never want to have to use.\u00a0<\/strong> While it is impossible to create a 100% failure free &#8220;hack proof&#8221; environment, a comprehensive plan can save the day.\u00a0 \u00a0Our experts know how to secure data and back it up.\u00a0 The goal is to keep things working 100% of the time.\u00a0 But if the unthinkable happens, getting your business back up and running without loss of information is just as important.<\/p>\n<p style=\"text-align: center;\">Your data is one of your most valuable assets.\u00a0 Keeping it secure and available keeps your customers&#8217; trust.<\/p>\n<p style=\"text-align: center;\"><strong>Let our experts help you with this key component of your business.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":86,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-131","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - We Are Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - We Are Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"We Are Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-06T22:04:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wearetechnology.com\\\/index.php\\\/services\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/wearetechnology.com\\\/index.php\\\/services\\\/cybersecurity\\\/\",\"name\":\"Cyber Security - We Are Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wearetechnology.com\\\/#website\"},\"datePublished\":\"2022-06-05T01:41:12+00:00\",\"dateModified\":\"2022-11-06T22:04:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wearetechnology.com\\\/index.php\\\/services\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wearetechnology.com\\\/index.php\\\/services\\\/cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wearetechnology.com\\\/index.php\\\/services\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wearetechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/wearetechnology.com\\\/index.php\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wearetechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/wearetechnology.com\\\/\",\"name\":\"We Are Technology\",\"description\":\"Keeping You Safe On The Cutting Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wearetechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - We Are Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - We Are Technology","og_url":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/","og_site_name":"We Are Technology","article_modified_time":"2022-11-06T22:04:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/","url":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/","name":"Cyber Security - We Are Technology","isPartOf":{"@id":"https:\/\/wearetechnology.com\/#website"},"datePublished":"2022-06-05T01:41:12+00:00","dateModified":"2022-11-06T22:04:50+00:00","breadcrumb":{"@id":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wearetechnology.com\/index.php\/services\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wearetechnology.com\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/wearetechnology.com\/index.php\/services\/"},{"@type":"ListItem","position":3,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/wearetechnology.com\/#website","url":"https:\/\/wearetechnology.com\/","name":"We Are Technology","description":"Keeping You Safe On The Cutting Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wearetechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/pages\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":0,"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/pages\/131\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/pages\/86"}],"wp:attachment":[{"href":"https:\/\/wearetechnology.com\/index.php\/wp-json\/wp\/v2\/media?parent=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}