{"id":161,"date":"2016-06-26T03:22:38","date_gmt":"2016-06-26T03:22:38","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?page_id=161"},"modified":"2022-10-02T16:11:39","modified_gmt":"2022-10-02T16:11:39","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-bottom:-40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\">\t\t\t\t\t<div class=\"fusion-slider-container fusion-slider-sc-cybersecurity fusion-slider-9 full-width-slider\" style=\"height:300px; max-width:100%;\" data-id=\"9\" data-full_height=\"\">\n\t\t\t\t\t\t<style type=\"text\/css\">.fusion-slider-9 .flex-direction-nav a {width:63px;height:63px;line-height:63px;font-size:25px;}<\/style>\t\t\t\t\t\t<div class=\"fusion-slider-loading\">Loading...<\/div>\n\t\t\t\t\t\t<div class=\"tfs-slider flexslider main-flex full-width-slider\" data-slider_width=\"100%\" data-slider_height=\"300px\" data-full_screen=\"0\" data-parallax=\"0\" data-nav_arrows=\"0\" data-nav_box_width=\"63px\" data-nav_box_height=\"63px\" data-nav_arrow_size=\"25px\" data-pagination_circles=\"0\" data-autoplay=\"0\" data-loop=\"0\" data-animation=\"fade\" data-slideshow_speed=\"7000\" data-animation_speed=\"600\" data-typo_sensitivity=\"1\" data-typo_factor=\"1.5\" style=\"max-width:100%;\">\n\t\t\t\t\t\t\t<ul class=\"slides\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li data-mute=\"yes\" data-loop=\"yes\" data-autoplay=\"yes\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"slide-content-container slide-content-left\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-content\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"heading \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title-sc-wrapper\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#fff;--awb-margin-bottom:0px;--awb-sep-color:#fff;--awb-font-size:50px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:50;line-height:1.2;\">Cybersecurity<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"caption \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title-sc-wrapper\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#fff;--awb-margin-bottom:0px;--awb-sep-color:#fff;--awb-font-size:34px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:34;line-height:1.2;\">Reliability Through Cybersecurity Resilience<sup><h7 style=\"color:white;font-size:16px;\">TM<\/h7><\/sup><\/h3><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"background background-image lazyload\" style=\"background-image:inherit;max-width:100%;height:300px;filter: progid:DXImageTransform.Microsoft.AlphaImageLoader(src='https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti_cybersecurity_hdr.jpg', sizingMethod='scale');\" data-imgwidth=\"1950\" data-bg-image=\"url(https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti_cybersecurity_hdr.jpg)\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#f4f4f4;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-large button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type fusion-has-button-gradient\" style=\"--button_accent_color:#002868;--button_border_color:#ffaa22;--button_accent_hover_color:#002868;--button_border_hover_color:#ffaa22;--button_border_width-top:1px;--button_border_width-right:1px;--button_border_width-bottom:1px;--button_border_width-left:1px;--button-border-radius-top-left:3px;--button-border-radius-top-right:3px;--button-border-radius-bottom-right:3px;--button-border-radius-bottom-left:3px;--button_gradient_top_color:#ffed64;--button_gradient_bottom_color:#ffaa22;--button_gradient_top_color_hover:#ffaa22;--button_gradient_bottom_color_hover:#ffed64;--button_margin-top:10px;--button_margin-bottom:10px;\" target=\"_self\" href=\"\/contact\/\"><span class=\"fusion-button-text\">CONTACT US<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p style=\"font-weight: 400;\">Cybersecurity threats are evolving, footprints are expanding, and attackers have become even more sophisticated. The threat landscape is expanding as companies extend technology to accommodate employee, customer, and vendor needs. Organizations must now consider the impact from service disruption, data destruction and ransomware, and erosion of customer confidence in terms of operational cost, regulatory penalties, and brand or reputational damage.<\/p>\n<p style=\"font-weight: 400;\">To operate, organizations require the reliability of their information technology systems and IT\/OT managed assets. Well-designed cybersecurity programs defend against and withstand most hacks but, despite best efforts, a motivated hacker will break into a system they target. There is no doubt, no question. What happens next depends on incident planning and preparedness. Cybersecurity Resilience builds on good cybersecurity programs by addressing demands for business continuity, information protection, and crisis communications.<\/p>\n<ul style=\"font-weight: 400;\">\n<li>How will business operations and customer service continue until technology is restored?<\/li>\n<li>What did the hackers take, was sensitive data encrypted, and is it usable by these criminals?<\/li>\n<li>How, when, and what is communicated to leadership, employees, customers, and the community and by whom?<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">ITEGRITI designs and implements programs that help companies avoid hacks, detects breaches when they occur, minimize business disruption during a cybersecurity event, and reduce incident recovery time. We work with organizations to align cybersecurity programs with enterprise risks and first consider existing security hardware, software, and security\/compliance controls. We help companies establish and evaluate specific control objectives and internal controls, measure operational effectiveness, and establish an improvement plan that includes actionable remediation activities.<\/p>\n<p style=\"font-weight: 400;\">Through our strategic partnership with HCL Technologies, and a network of 150 alliance partners, we implement the items selected by our clients for remediation in terms of policy and procedure, hardware and software implementation or configuration, and internal control and audit program to measure, manage and report ongoing control effectiveness.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-animated\" style=\"--awb-bg-size:cover;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><h3 style=\"text-align: center;\"><span style=\"color: #002868;\">How We Help Clients<\/span><\/h3>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-animated\" style=\"--awb-padding-top:0px;--awb-bg-size:cover;--awb-margin-bottom:-5px;width:30.6666%; margin-right: 4%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><ul style=\"--awb-iconcolor:#002868;--awb-line-height:23.8px;--awb-icon-width:23.8px;--awb-icon-height:23.8px;--awb-icon-margin:9.8px;--awb-content-margin:33.6px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Account management: user, service, and privileged<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Asset inventory, change and configuration management<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Attack surface reduction: service, port, asset, and application rationalization<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Business continuity planning and testing<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Cloud solutions and security controls<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Crisis communications<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Cyber and physical security convergence<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-one-third fusion-animated\" style=\"--awb-padding-top:0px;--awb-bg-size:cover;--awb-margin-bottom:-5px;width:30.6666%; margin-right: 4%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><ul style=\"--awb-iconcolor:#002868;--awb-line-height:23.8px;--awb-icon-width:23.8px;--awb-icon-height:23.8px;--awb-icon-margin:9.8px;--awb-content-margin:33.6px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Disaster recovery planning and testing<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Employee enablement: BYOD and secure remote access<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Incident response and recovery:\u00a0 process, tools and information<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Information protection: classification, identification, and storage<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Network security architecture design, segmentation, and redundancy<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Organizational change management<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:0px;--awb-bg-size:cover;width:30.6666%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><ul style=\"--awb-iconcolor:#002868;--awb-line-height:23.8px;--awb-icon-width:23.8px;--awb-icon-height:23.8px;--awb-icon-margin:9.8px;--awb-content-margin:33.6px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Penetration testing and social engineering, security assessments<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Secure asset configuration and hardening, including IOT\/IIOT<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Security patching: source and file validation and implementation<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Security training and awareness<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Site walkdowns<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Supply chain management: policy and supplier assessments<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:1px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-color:#002868;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-min-height:25vh;--awb-background-color:#f4f4f4;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:-20px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-right:0px;--awb-bg-position:right center;--awb-bg-size:cover;--awb-border-color:#d1d1d1;--awb-border-right:0;--awb-border-style:solid;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0;--awb-margin-bottom-large:40px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-zoomin\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/itegriti.com\/kw022024\/staging\/2021\/blog\/smb-cybersecurity-guide-to-asset-inventory\/\" target=\"_self\" aria-label=\"IBMThreatIntel-Itegriti\"><img decoding=\"async\" width=\"800\" height=\"450\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg\" alt class=\"img-responsive wp-image-1785 lazyload\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti-200x113.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti-400x225.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti-600x338.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg 800w\" data-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/450;\" \/><\/a><\/span><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:0px;border-bottom-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-right:0px;--awb-bg-position:right center;--awb-bg-size:cover;--awb-border-color:#d1d1d1;--awb-border-right:0;--awb-border-style:solid;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0;--awb-margin-bottom-large:40px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:0px;border-bottom-width:0px;\"><\/div><\/div><div class=\"fusion-text fusion-text-3\"><h2 class=\"entry-title fusion-post-title fusion-responsive-typography-calculated\" data-fontsize=\"32\" data-lineheight=\"41.28px\"><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\">10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure<\/a><\/h2>\n<p>Cybercriminals depend on teams, bots, harvested intelligence, brute force, and relentless targeting. Sometimes, an attacker is fortunate to encounter just dumb luck. Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets.<\/p>\n<p>How can you make your organization more resilient? Here is a checklist to achieve these goals.<\/p>\n<p><strong>Written by Michael Sanchez for Homeland Security Today<\/strong><\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\">[READ MORE]<\/a><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:20px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#002868;border-color:#002868;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-4\"><h3 style=\"text-align: center;\"><span style=\"color: #002868;\">WHAT&#8217;S YOUR CYBER RISK BASELINE?<\/span><\/h3>\n<p style=\"text-align: center;\">Take the free ITEGRITI assessment available via secure portal:<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-large button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type fusion-has-button-gradient\" style=\"--button_accent_color:#002868;--button_border_color:#ffaa22;--button_accent_hover_color:#002868;--button_border_hover_color:#ffaa22;--button-border-radius-top-left:3px;--button-border-radius-top-right:3px;--button-border-radius-bottom-right:3px;--button-border-radius-bottom-left:3px;--button_gradient_top_color:#ffed64;--button_gradient_bottom_color:#ffaa22;--button_gradient_top_color_hover:#ffaa22;--button_gradient_bottom_color_hover:#ffed64;--button_margin-top:10px;--button_margin-bottom:10px;\" target=\"_self\" href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity-risk-baseline\/\"><span class=\"fusion-button-text\">TAKE ASSESSMENT<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:1px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-color:#002868;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-position:right center;--awb-bg-size:cover;--awb-border-color:#e8e8e8;--awb-border-style:solid;--awb-margin-bottom:-20px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\"><h2>RELATED ARTICLES<\/h2>\n<\/div><div class=\"fusion-blog-shortcode fusion-blog-shortcode-1 fusion-blog-archive fusion-blog-layout-grid-wrapper fusion-blog-infinite fusion-blog-layout-center\"><style type=\"text\/css\">.fusion-blog-shortcode-1 .fusion-blog-layout-grid .fusion-post-grid{padding:15px;}.fusion-blog-shortcode-1 .fusion-posts-container{margin-left: -15px !important; margin-right:-15px !important;}<\/style><div class=\"fusion-posts-container fusion-posts-container-infinite fusion-posts-container-load-more fusion-blog-layout-grid fusion-blog-layout-grid-3 isotope fusion-blog-equal-heights\" data-pages=\"20\" data-grid-col-space=\"30\" style=\"margin: -15px -15px 0;min-height:500px;\"><article id=\"blog-1-post-4897\" class=\"fusion-post-grid post-4897 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cybersecurity tag-energy-sector tag-finance-sector tag-healthcare-sector tag-water-sector\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,1);border:1px solid rgba(141,183,225,0.3);border-bottom-width:3px;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(141,183,225,0.3);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/itegriti.com\/kw022024\/2024\/cybersecurity\/mitre-attck-framework\/\" aria-label=\"Leveraging MITRE Frameworks in Critical Infrastructure\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/02\/179.png\" class=\"attachment-full size-full wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/02\/179-200x113.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/02\/179-400x225.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/02\/179-600x338.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/02\/179.png 800w\" data-sizes=\"(min-width: 2200px) 100vw, (min-width: 824px) 370px, (min-width: 732px) 555px, (min-width: 640px) 732px,\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/450;\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 25px 20px 25px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/itegriti.com\/kw022024\/2024\/cybersecurity\/mitre-attck-framework\/\">Leveraging MITRE Frameworks in Critical Infrastructure<\/a><\/h2><p class=\"fusion-single-line-meta\"><span class=\"updated\" style=\"display:none;\">2024-02-12T12:19:08+00:00<\/span>By <span class=\"vcard\"><span class=\"fn\"><a href=\"https:\/\/itegriti.com\/kw022024\/author\/stefanie-shank\/\" title=\"Posts by Stefanie Shank\" rel=\"author\">Stefanie Shank<\/a><\/span><\/span><span class=\"fusion-inline-sep\">|<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a><span class=\"fusion-inline-sep\">|<\/span><\/p><div class=\"fusion-content-sep sep-none\"><\/div><\/div><div class=\"fusion-meta-info\"><div class=\"fusion-aligncenter\"><a class=\"fusion-read-more\" href=\"https:\/\/itegriti.com\/kw022024\/2024\/cybersecurity\/mitre-attck-framework\/\" aria-label=\"More on Leveraging MITRE Frameworks in Critical Infrastructure\">Read More<\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4872\" class=\"fusion-post-grid post-4872 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cybersecurity tag-energy-sector tag-healthcare-sector\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,1);border:1px solid rgba(141,183,225,0.3);border-bottom-width:3px;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(141,183,225,0.3);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/securing-5g-and-iot-in-the-energy-and-healthcare-sectors\/\" aria-label=\"Securing 5G and IoT in the Energy and Healthcare Sectors\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1065\" height=\"597\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2.webp\" class=\"attachment-full size-full wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2-200x112.webp 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2-400x224.webp 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2-600x336.webp 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2-768x431.webp 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2-800x448.webp 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/11\/172-v2.webp 1065w\" data-sizes=\"(min-width: 2200px) 100vw, (min-width: 824px) 370px, (min-width: 732px) 555px, (min-width: 640px) 732px,\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1065px; --smush-placeholder-aspect-ratio: 1065\/597;\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 25px 20px 25px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/securing-5g-and-iot-in-the-energy-and-healthcare-sectors\/\">Securing 5G and IoT in the Energy and Healthcare Sectors<\/a><\/h2><p class=\"fusion-single-line-meta\"><span class=\"updated\" style=\"display:none;\">2023-11-29T11:39:41+00:00<\/span>By <span class=\"vcard\"><span class=\"fn\"><a href=\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\" title=\"Posts by Anastasios Arampatzis\" rel=\"author\">Anastasios Arampatzis<\/a><\/span><\/span><span class=\"fusion-inline-sep\">|<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a><span class=\"fusion-inline-sep\">|<\/span><\/p><div class=\"fusion-content-sep sep-none\"><\/div><\/div><div class=\"fusion-meta-info\"><div class=\"fusion-aligncenter\"><a class=\"fusion-read-more\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/securing-5g-and-iot-in-the-energy-and-healthcare-sectors\/\" aria-label=\"More on Securing 5G and IoT in the Energy and Healthcare Sectors\">Read More<\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4849\" class=\"fusion-post-grid post-4849 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-energy-sector tag-finance-sector tag-healthcare-sector tag-water-sector\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,1);border:1px solid rgba(141,183,225,0.3);border-bottom-width:3px;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(141,183,225,0.3);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/will-your-security-strategy-handle-ai-ml-security-threats\/\" aria-label=\"Will Your Security Strategy Handle AI\/ML Security Threats?\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/168-v2.png\" class=\"attachment-full size-full wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/168-v2-200x113.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/168-v2-400x225.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/168-v2-600x338.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/168-v2.png 800w\" data-sizes=\"(min-width: 2200px) 100vw, (min-width: 824px) 370px, (min-width: 732px) 555px, (min-width: 640px) 732px,\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/450;\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 25px 20px 25px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/will-your-security-strategy-handle-ai-ml-security-threats\/\">Will Your Security Strategy Handle AI\/ML Security Threats?<\/a><\/h2><p class=\"fusion-single-line-meta\"><span class=\"updated\" style=\"display:none;\">2023-10-26T14:14:39+00:00<\/span>By <span class=\"vcard\"><span class=\"fn\"><a href=\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\" title=\"Posts by Katrina Thompson\" rel=\"author\">Katrina Thompson<\/a><\/span><\/span><span class=\"fusion-inline-sep\">|<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a><span class=\"fusion-inline-sep\">|<\/span><\/p><div class=\"fusion-content-sep sep-none\"><\/div><\/div><div class=\"fusion-meta-info\"><div class=\"fusion-aligncenter\"><a class=\"fusion-read-more\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/will-your-security-strategy-handle-ai-ml-security-threats\/\" aria-label=\"More on Will Your Security Strategy Handle AI\/ML Security Threats?\">Read More<\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-infinite-scroll-trigger\"><\/div><div class=\"pagination infinite-scroll clearfix\" style=\"display:none;\"><span class=\"current\">1<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/161\/page\/2\/\" class=\"inactive\">2<\/a><a class=\"pagination-next\" rel=\"next\" href=\"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/161\/page\/2\/\"><span class=\"page-text\">Next<\/span><span class=\"page-next\"><\/span><\/a><\/div><div class=\"fusion-clearfix\"><\/div><button class=\"fusion-load-more-button fusion-blog-button fusion-clearfix\">Load More Posts<\/button><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"categories":[],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-02T16:11:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\",\"name\":\"Cybersecurity - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"datePublished\":\"2016-06-26T03:22:38+00:00\",\"dateModified\":\"2022-10-02T16:11:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity","og_url":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_modified_time":"2022-10-02T16:11:39+00:00","twitter_card":"summary_large_image","twitter_site":"@itegriti","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/","url":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/","name":"Cybersecurity - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"datePublished":"2016-06-26T03:22:38+00:00","dateModified":"2022-10-02T16:11:39+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/161"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=161"}],"version-history":[{"count":47,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/161\/revisions"}],"predecessor-version":[{"id":4749,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/161\/revisions\/4749"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}