{"id":1213,"date":"2022-05-09T09:48:24","date_gmt":"2022-05-09T09:48:24","guid":{"rendered":"http:\/\/192.168.1.100\/waretech\/?page_id=1213"},"modified":"2024-10-16T11:50:27","modified_gmt":"2024-10-16T11:50:27","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/ksrit.com\/index.php\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1213\" class=\"elementor elementor-1213\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acfe1f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acfe1f6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1a4247cf\" data-id=\"1a4247cf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-314054df elementor-widget elementor-widget-image\" data-id=\"314054df\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"620\" height=\"720\" src=\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp\" class=\"attachment-full size-full wp-image-6827\" alt=\"\" srcset=\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp 620w, https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about-258x300.webp 258w, https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about-600x697.webp 600w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-707def33\" data-id=\"707def33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d0b71ce elementor-widget elementor-widget-react-heading\" data-id=\"1d0b71ce\" data-element_type=\"widget\" data-widget_type=\"react-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"react-heading default \">\r\n        \t<div class=\"title-inner no\">        \t\t      \t\t\r\n\t            <h3 class=\"title\"><span class=\"watermark\"><\/span>It is all about security<\/h3>\t        <\/div>\r\n\t                    \t<div class=\"description\">\r\n            \t\t<p>In an increasingly digital world, cyber security has become a critical aspect of protecting sensitive information and maintaining the integrity of IT systems. Cyber security encompasses a range of practices, technologies, and processes designed to safeguard networks, devices, programs, and data from attack, damage, or unauthorized access.<\/p>            \t\t\r\n            \t<\/div>\r\n        \t\r\n\t            \r\n        <\/div>\r\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-656e9bef elementor-widget elementor-widget-rt-service-grid\" data-id=\"656e9bef\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style7\">\r\n    <div class=\"single-work d-flex align-items-center justify-content-between\">\r\n\t\t<span>\r\n\t\t\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t\t    \t\t\t<img decoding=\"async\" class=\"service-img7\" src=\"https:\/\/reactheme.com\/products\/wordpress\/waretech\/wp-content\/uploads\/2022\/05\/s-5a.png\" alt=\"image\"\/>\r\n\t\t    \t\t\t    \t\t\r\n\t    \t\t\t<\/span>\r\n\t\t<h5 class=\"title\">Looking For A First Class For Business Plan Consultant?<\/h5>\r\n\t\t\t\t\t\t\t\t<i class=\"rt-angle-right ml-5 style7-chevron\"><\/i>\t\r\n\t\t\t\t\t\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b03a996 elementor-widget elementor-widget-text-editor\" data-id=\"6b03a996\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We help our clients succeed by creating brand identities, digital IT experiences, and print materials.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-167b485e elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"167b485e\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-14673d5d\" data-id=\"14673d5d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45d0c4c6 elementor-widget elementor-widget-rt-service-grid\" data-id=\"45d0c4c6\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Network Security<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>Network security involves measures to protect the integrity, confidentiality, and accessibility of computer networks and data using both hardware and software technologies.<br \/><br \/><br \/><\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">01<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a374201 elementor-widget elementor-widget-rt-service-grid\" data-id=\"a374201\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Cloud Security<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>Cloud security involves protecting data, applications, and services that are hosted in the cloud.<\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">01<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5c3547a3\" data-id=\"5c3547a3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63d23429 elementor-widget elementor-widget-rt-service-grid\" data-id=\"63d23429\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Information Security<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>\u00a0Information security focuses on protecting data from unauthorized access and alterations, whether in storage, processing, or transit.<\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">02<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe2d3b elementor-widget elementor-widget-rt-service-grid\" data-id=\"4fe2d3b\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Identity and Access Management (IAM)<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>\u00a0IAM ensures that the right individuals access the right resources at the right times for the right reasons.<\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">02<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-14b67592\" data-id=\"14b67592\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5361feaf elementor-widget elementor-widget-rt-service-grid\" data-id=\"5361feaf\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Application Security<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>Application security involves enhancing the security of applications by finding, fixing, and preventing security vulnerabilities.<\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">03<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-651af9f elementor-widget elementor-widget-rt-service-grid\" data-id=\"651af9f\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Incident Response<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>Incident response is the approach taken to handle and manage the aftermath of a security breach or cyber attack.<\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">03<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-125460e2\" data-id=\"125460e2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61f7acf0 elementor-widget elementor-widget-rt-service-grid\" data-id=\"61f7acf0\" data-element_type=\"widget\" data-widget_type=\"rt-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"react-addon-services services-style5\">\r\n    <div class=\"services-part\">\r\n    \t\t\t    \t\t       \r\n\t    <div class=\"services-text style5\">\r\n\t    \t\t\t    \t<div class=\"services-title\">\t\t    \t\t\r\n\t\t    \t\t\r\n\t\t    \t\t\t\t    \t\t\t<h2 class=\"title\">\t\t    \t\t\t\r\n\t\t    \t\t\t Endpoint Security<\/h2>\r\n\t\t    \t\t\t\t\t\t    \t\t\r\n\t\t    \t<\/div>\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t<div class=\"services-txt\">  <p>Endpoint security refers to securing end-user devices such as desktops, laptops, and mobile devices.<\/p><\/div>\t\r\n\t    \t\t\r\n\r\n\t    \t\t    \t\t\t    \t    \t<div class=\"shadow-text\">04<\/div>\r\n\t    \t    \r\n\t    <\/div>\r\n\t<\/div>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-bf81081 e-flex e-con-boxed e-con e-parent\" data-id=\"bf81081\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0755ee1 elementor-widget elementor-widget-react-heading\" data-id=\"0755ee1\" data-element_type=\"widget\" data-widget_type=\"react-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"react-heading default \">\r\n        \t<div class=\"title-inner no\">        \t\t      \t\t\r\n\t            <h3 class=\"title\"><span class=\"watermark\"><\/span>Cyber Security Best Practices<\/h3>\t        <\/div>\r\n\t                    \t<div class=\"description\">\r\n            \t\t<p>Cyber security is an ongoing process that requires vigilance, regular updates, and a proactive approach to protect against evolving threats. By implementing comprehensive cyber security measures, businesses can safeguard their critical assets, maintain customer trust, and ensure compliance with regulatory requirements.<\/p>            \t\t\r\n            \t<\/div>\r\n        \t\r\n\t            \r\n        <\/div>\r\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d1e254 elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9d1e254\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regular Updates and Patch Management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Employee Training and Awareness<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Strong Password Policies<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data Encryption<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Backup and Recovery<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>It is all about security In an increasingly digital world, cyber security has become a critical aspect of protecting sensitive information and maintaining the integrity of IT systems. Cyber security encompasses a range of practices, technologies, and processes designed to safeguard networks, devices, programs, and data from attack, damage, or unauthorized access. Looking For A&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1213","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - IT SOLUTIONS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ksrit.com\/index.php\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - IT SOLUTIONS\" \/>\n<meta property=\"og:description\" content=\"It is all about security In an increasingly digital world, cyber security has become a critical aspect of protecting sensitive information and maintaining the integrity of IT systems. Cyber security encompasses a range of practices, technologies, and processes designed to safeguard networks, devices, programs, and data from attack, damage, or unauthorized access. Looking For A...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ksrit.com\/index.php\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IT SOLUTIONS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T11:50:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/\",\"url\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/\",\"name\":\"Cyber Security - IT SOLUTIONS\",\"isPartOf\":{\"@id\":\"https:\/\/ksrit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp\",\"datePublished\":\"2022-05-09T09:48:24+00:00\",\"dateModified\":\"2024-10-16T11:50:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ksrit.com\/index.php\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp\",\"contentUrl\":\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp\",\"width\":620,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ksrit.com\/index.php\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ksrit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ksrit.com\/#website\",\"url\":\"https:\/\/ksrit.com\/\",\"name\":\"IT SOLUTIONS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/ksrit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ksrit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ksrit.com\/#organization\",\"name\":\"IT SOLUTIONS\",\"url\":\"https:\/\/ksrit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ksrit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/06\/cropped-logo_1.png\",\"contentUrl\":\"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/06\/cropped-logo_1.png\",\"width\":1080,\"height\":1334,\"caption\":\"IT SOLUTIONS \"},\"image\":{\"@id\":\"https:\/\/ksrit.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - IT SOLUTIONS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ksrit.com\/index.php\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - IT SOLUTIONS","og_description":"It is all about security In an increasingly digital world, cyber security has become a critical aspect of protecting sensitive information and maintaining the integrity of IT systems. Cyber security encompasses a range of practices, technologies, and processes designed to safeguard networks, devices, programs, and data from attack, damage, or unauthorized access. Looking For A...","og_url":"https:\/\/ksrit.com\/index.php\/cyber-security\/","og_site_name":"IT SOLUTIONS","article_modified_time":"2024-10-16T11:50:27+00:00","og_image":[{"width":620,"height":720,"url":"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ksrit.com\/index.php\/cyber-security\/","url":"https:\/\/ksrit.com\/index.php\/cyber-security\/","name":"Cyber Security - IT SOLUTIONS","isPartOf":{"@id":"https:\/\/ksrit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ksrit.com\/index.php\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/ksrit.com\/index.php\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp","datePublished":"2022-05-09T09:48:24+00:00","dateModified":"2024-10-16T11:50:27+00:00","breadcrumb":{"@id":"https:\/\/ksrit.com\/index.php\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ksrit.com\/index.php\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ksrit.com\/index.php\/cyber-security\/#primaryimage","url":"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp","contentUrl":"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/04\/h4-about.webp","width":620,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/ksrit.com\/index.php\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ksrit.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/ksrit.com\/#website","url":"https:\/\/ksrit.com\/","name":"IT SOLUTIONS","description":"","publisher":{"@id":"https:\/\/ksrit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ksrit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ksrit.com\/#organization","name":"IT SOLUTIONS","url":"https:\/\/ksrit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ksrit.com\/#\/schema\/logo\/image\/","url":"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/06\/cropped-logo_1.png","contentUrl":"https:\/\/ksrit.com\/wp-content\/uploads\/2022\/06\/cropped-logo_1.png","width":1080,"height":1334,"caption":"IT SOLUTIONS "},"image":{"@id":"https:\/\/ksrit.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/pages\/1213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/comments?post=1213"}],"version-history":[{"count":3,"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/pages\/1213\/revisions"}],"predecessor-version":[{"id":9335,"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/pages\/1213\/revisions\/9335"}],"wp:attachment":[{"href":"https:\/\/ksrit.com\/index.php\/wp-json\/wp\/v2\/media?parent=1213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}