{"id":529,"date":"2023-10-16T11:51:55","date_gmt":"2023-10-16T11:51:55","guid":{"rendered":"http:\/\/cyphotech.com\/?page_id=529"},"modified":"2024-06-25T10:33:20","modified_gmt":"2024-06-25T10:33:20","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/cyphotech.com\/index.php\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"529\" class=\"elementor elementor-529\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7119248 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"7119248\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-427b03d0\" data-id=\"427b03d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22043ae3 elementor-widget elementor-widget-heading\" data-id=\"22043ae3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab767f4 elementor-widget elementor-widget-heading\" data-id=\"3ab767f4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fortify Your Defenses: Cutting-Edge Cybersecurity Solutions for Digital Resilience!<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-65664de elementor-section-content-middle elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"65664de\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-77f2867f\" data-id=\"77f2867f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40ef410e elementor-widget elementor-widget-elementskit-heading\" data-id=\"40ef410e\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-text_center\"><h2 class=\"ekit-heading--title elementskit-section-title \">CyberGuard <span><span>Sentry<\/span><\/span><\/h2><h3 class=\"ekit-heading--subtitle elementskit-section-subtitle  \">\n\t\t\t\t\t\tThe Threat Landscape Shifts\n\t\t\t\t\t<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Cybersecurity is vital for protecting data, ensuring digital integrity, and safeguarding against evolving threats in our interconnected world.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5cbb48ad\" data-id=\"5cbb48ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1cc1824e elementor-widget elementor-widget-elementskit-lottie\" data-id=\"1cc1824e\" data-element_type=\"widget\" data-widget_type=\"elementskit-lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div id=\"ekit_lottie_1cc1824e\" class=\"ekit_lottie\" data-autoplay=\"true\" data-on-scroll=\"\" data-speed=\"0.4\" data-direction=\"\" data-action=\"\" data-renderer=\"svg\" data-path=\"http:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Animation-1707365879082.json\" data-loop=\"true\">&nbsp;<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-58b6d71 elementor-section-content-middle elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"58b6d71\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-771f18a1\" data-id=\"771f18a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77baf689 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"77baf689\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-server-8\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722a9455 elementor-widget elementor-widget-heading\" data-id=\"722a9455\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technical Expertise<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-461e9c82 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"461e9c82\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e18e0c7 elementor-widget elementor-widget-text-editor\" data-id=\"3e18e0c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Benefit from our cybersecurity expertise, where we prioritize your safety and data protection by adeptly defending against various cyber threats.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4cbcc09e\" data-id=\"4cbcc09e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22dd0fac elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"22dd0fac\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-clock\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-376bf5db elementor-widget elementor-widget-heading\" data-id=\"376bf5db\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Immediate Responses<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1034880a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1034880a\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fd05e6f elementor-widget elementor-widget-text-editor\" data-id=\"2fd05e6f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We swiftly respond to cyberattacks, minimizing damage and maximizing protection for enhanced cybersecurity resilience.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4e460d72\" data-id=\"4e460d72\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6eb37847 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6eb37847\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-Computer\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c2339a6 elementor-widget elementor-widget-heading\" data-id=\"4c2339a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Remote Monitoring<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc4ffe2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4bc4ffe2\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-131c4faf elementor-widget elementor-widget-text-editor\" data-id=\"131c4faf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We conduct remote security monitoring to proactively identify and address potential threats, ensuring swift action before a cyber attack occurs.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7d0c7b7 elementor-section-content-middle elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"7d0c7b7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-73f45f4c\" data-id=\"73f45f4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4df4411f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4df4411f\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-tie\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c4206f elementor-widget elementor-widget-heading\" data-id=\"8c4206f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">User Training<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7822c483 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7822c483\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7622805e elementor-widget elementor-widget-text-editor\" data-id=\"7622805e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We provide user training to differentiate between legitimate and non-legitimate items, promoting cybersecurity awareness.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1017f6a2\" data-id=\"1017f6a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19756489 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"19756489\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-padlock-1\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c605864 elementor-widget elementor-widget-heading\" data-id=\"6c605864\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protection<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68708dfe elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"68708dfe\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2819c814 elementor-widget elementor-widget-text-editor\" data-id=\"2819c814\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We provide a comprehensive range of protection, covering email, network, data, and more for all-encompassing cybersecurity.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-40e6847e\" data-id=\"40e6847e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-380411fe elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"380411fe\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-biohazard\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1850593a elementor-widget elementor-widget-heading\" data-id=\"1850593a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Testing<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56d101f8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"56d101f8\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-572da53d elementor-widget elementor-widget-text-editor\" data-id=\"572da53d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We provide penetration testing services to ensure the resilience of your data and network, making it less susceptible to unauthorized access.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-63b1a53 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"63b1a53\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1723c93 elementor-widget elementor-widget-text-editor\" data-id=\"1723c93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 style=\"text-align: center;\"><strong>Protect Your Business with Managed Cyber Security Services<\/strong><\/h2><p>When it comes to Managed Cyber Security Services, no one does it better than Cyphotech. Your company&#8217;s data and operations are our top priority. Therefore, we&#8217;ve assembled a crack team to protect your company&#8217;s digital landscape.<\/p><p><strong>Why Choose Cyphotech?<\/strong><\/p><p>\u2022 Proactive Protection: Before problems may affect your network, our advanced monitoring and management software finds them. <br \/>\u2022 Remote Resolution: You may rest assured that most security issues can be quickly rectified online, causing minimal disturbance to your business operations.<\/p><p><strong>Cyber Security Service in Canada<\/strong><\/p><p>Our Canadian headquarters allows us to provide individualized Cyber Security Service Canada plans to suit each company&#8217;s demands. Focus on expanding your business as Cyphotech takes care of the intricate cyber security measures.<\/p><p>Protect your company with our effective and dependable cybersecurity solutions now.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-b97f32e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"b97f32e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7be372ad\" data-id=\"7be372ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6798365a elementor-widget elementor-widget-heading\" data-id=\"6798365a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why its important?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47f2c70e elementor-widget elementor-widget-text-editor\" data-id=\"47f2c70e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Cybersecurity is vital to safeguard sensitive data, protect against evolving cyber threats, intruders, and ensure the integrity, confidentiality, and availability of digital assets in an interconnected and vulnerable digital landscape.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-43e60b34\" data-id=\"43e60b34\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c32cd2a elementor-widget elementor-widget-image\" data-id=\"6c32cd2a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"409\" height=\"437\" src=\"https:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png\" class=\"attachment-full size-full wp-image-3667\" alt=\"digital defenses\" srcset=\"https:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png 409w, https:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580-281x300.png 281w\" sizes=\"(max-width: 409px) 100vw, 409px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-365dca9\" data-id=\"365dca9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b97c07e ha-infobox-media-dir-top ha-has-bg-overlay elementor-widget elementor-widget-ha-infobox happy-addon ha-infobox\" data-id=\"b97c07e\" data-element_type=\"widget\" data-widget_type=\"ha-infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t\n\t\t<div class=\"ha-infobox-body\">\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"ha-infobox-text\">\n\t\t\t\t\t<p>Cybersecurity is not just a cost; it\u2019s an investment in the future.<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<a class=\"ha-btn ha-btn--link\"><span class=\"ha-btn-text\">- Dr. Hamadoun Tour\u00e9<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-174c1a6 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"174c1a6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-312369d4\" data-id=\"312369d4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10c49e37 elementor-widget elementor-widget-heading\" data-id=\"10c49e37\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to fortify your digital defenses? Contact us using the button below to learn more about our customized solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eaf9fb6 elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2eaf9fb6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyphotech.com\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-0ef63ca e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"0ef63ca\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f159b96 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"f159b96\" data-element_type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69d96b401a330\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-f159b96\">\n                        <a href=\"#collapse-c34fcf069d96b401a330\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-c34fcf069d96b401a330\" aria-expanded=\"true\" aria-controls=\"Collapse-c34fcf069d96b401a330\">\n                            \n                            <span class=\"ekit-accordion-title\"> 1. How does Cyphotech&#039;s remote security monitoring work?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-c34fcf069d96b401a330\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-f159b96\" data-parent=\"#accordion-69d96b401a330\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Our remote security monitoring continuously scans your network for potential threats, allowing us to identify and address vulnerabilities before they can be exploited, ensuring maximum protection.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-f159b96\">\n                        <a href=\"#collapse-2ae4e4369d96b401a330\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-2ae4e4369d96b401a330\" aria-expanded=\"false\" aria-controls=\"Collapse-2ae4e4369d96b401a330\">\n                            \n                            <span class=\"ekit-accordion-title\">2. Why is user training important in cyber security?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-2ae4e4369d96b401a330\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-f159b96\" data-parent=\"#accordion-69d96b401a330\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Cyphotech provides user training to help your employees recognize and avoid cyber threats, enhancing overall security awareness and reducing the risk of successful cyber attacks.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-f159b96\">\n                        <a href=\"#collapse-385d61a69d96b401a330\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-385d61a69d96b401a330\" aria-expanded=\"false\" aria-controls=\"Collapse-385d61a69d96b401a330\">\n                            \n                            <span class=\"ekit-accordion-title\">3. What are the benefits of Cyphotech&#039;s penetration testing services?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-385d61a69d96b401a330\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-f159b96\" data-parent=\"#accordion-69d96b401a330\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Our penetration testing services identify and address security weaknesses in your network, ensuring robust defenses against unauthorized access and potential breaches.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-3-f159b96\">\n                        <a href=\"#collapse-abf718b69d96b401a330\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-abf718b69d96b401a330\" aria-expanded=\"false\" aria-controls=\"Collapse-abf718b69d96b401a330\">\n                            \n                            <span class=\"ekit-accordion-title\">4. How does Cyphotech ensure the integrity and confidentiality of my data?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-abf718b69d96b401a330\" class=\" collapse\" aria-labelledby=\"primaryHeading-3-f159b96\" data-parent=\"#accordion-69d96b401a330\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Cyphotech employs advanced encryption and security protocols to protect your data, ensuring its integrity and confidentiality throughout storage and transmission.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-4-f159b96\">\n                        <a href=\"#collapse-32e27dd69d96b401a330\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-32e27dd69d96b401a330\" aria-expanded=\"false\" aria-controls=\"Collapse-32e27dd69d96b401a330\">\n                            \n                            <span class=\"ekit-accordion-title\">5. What makes Cyphotech a trusted cyber security provider in Canada?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-32e27dd69d96b401a330\" class=\" collapse\" aria-labelledby=\"primaryHeading-4-f159b96\" data-parent=\"#accordion-69d96b401a330\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Cyphotech combines technical expertise, immediate response capabilities, and customized security plans to deliver reliable and effective cyber security solutions tailored to the needs of Canadian businesses.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-5-f159b96\">\n                        <a href=\"#collapse-c6c282569d96b401a330\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-c6c282569d96b401a330\" aria-expanded=\"false\" aria-controls=\"Collapse-c6c282569d96b401a330\">\n                            \n                            <span class=\"ekit-accordion-title\">6. What managed cyber security services does Cyphotech provide?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-c6c282569d96b401a330\" class=\" collapse\" aria-labelledby=\"primaryHeading-5-f159b96\" data-parent=\"#accordion-69d96b401a330\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Cyphotech offers comprehensive managed cyber security services, including proactive protection, remote resolution, and user training to safeguard your business against evolving cyber threats.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Fortify Your Defenses: Cutting-Edge Cybersecurity Solutions for Digital Resilience! CyberGuard Sentry The Threat Landscape Shifts Cybersecurity is vital for protecting data, ensuring digital integrity, and safeguarding against evolving threats in our interconnected world. &nbsp; Technical Expertise Benefit from our cybersecurity expertise, where we prioritize your safety and data protection by adeptly defending against various cyber threats. Immediate Responses We swiftly respond to cyberattacks, minimizing damage and maximizing protection for enhanced cybersecurity resilience. Remote Monitoring We conduct remote security monitoring to proactively identify and address potential threats, ensuring swift action before a cyber attack occurs. User Training We provide user training to differentiate between legitimate and non-legitimate items, promoting cybersecurity awareness. Protection We provide a comprehensive range of protection, covering email, network, data, and more for all-encompassing cybersecurity. Testing We provide penetration testing services to ensure the resilience of your data and network, making it less susceptible to unauthorized access. Protect Your Business with Managed Cyber Security Services When it comes to Managed Cyber Security Services, no one does it better than Cyphotech. Your company&#8217;s data and operations are our top priority. Therefore, we&#8217;ve assembled a crack team to protect your company&#8217;s digital landscape. Why Choose Cyphotech? \u2022 Proactive Protection: Before problems may affect your network, our advanced monitoring and management software finds them. \u2022 Remote Resolution: You may rest assured that most security issues can be quickly rectified online, causing minimal disturbance to your business operations. Cyber Security Service in Canada Our Canadian headquarters allows us to provide individualized Cyber Security Service Canada plans to suit each company&#8217;s demands. Focus on expanding your business as Cyphotech takes care of the intricate cyber security measures. Protect your company with our effective and dependable cybersecurity solutions now. Why its important? Cybersecurity is vital to safeguard sensitive data, protect against evolving cyber threats, intruders, and ensure the integrity, confidentiality, and availability of digital assets in an interconnected and vulnerable digital landscape. Cybersecurity is not just a cost; it\u2019s an investment in the future. &#8211; Dr. Hamadoun Tour\u00e9 Ready to fortify your digital defenses? Contact us using the button below to learn more about our customized solutions Contact Us 1. How does Cyphotech&#039;s remote security monitoring work? Our remote security monitoring continuously scans your network for potential threats, allowing us to identify and address vulnerabilities before they can be exploited, ensuring maximum protection. 2. Why is user training important in cyber security? Cyphotech provides user training to help your employees recognize and avoid cyber threats, enhancing overall security awareness and reducing the risk of successful cyber attacks. 3. What are the benefits of Cyphotech&#039;s penetration testing services? Our penetration testing services identify and address security weaknesses in your network, ensuring robust defenses against unauthorized access and potential breaches. 4. How does Cyphotech ensure the integrity and confidentiality of my data? Cyphotech employs advanced encryption and security protocols to protect your data, ensuring its integrity and confidentiality throughout storage and transmission. 5. What makes Cyphotech a trusted cyber security provider in Canada? Cyphotech combines technical expertise, immediate response capabilities, and customized security plans to deliver reliable and effective cyber security solutions tailored to the needs of Canadian businesses. 6. What managed cyber security services does Cyphotech provide? Cyphotech offers comprehensive managed cyber security services, including proactive protection, remote resolution, and user training to safeguard your business against evolving cyber threats.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"on","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-529","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed Cyber Security Services in Canada | CyphoTech<\/title>\n<meta name=\"description\" content=\"Secure your digital assets with advanced cybersecurity solutions, our expertise in threat detection ensures data and networks are resilient against cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyphotech.com\/index.php\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Cyber Security Services in Canada | CyphoTech\" \/>\n<meta property=\"og:description\" content=\"Secure your digital assets with advanced cybersecurity solutions, our expertise in threat detection ensures data and networks are resilient against cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyphotech.com\/index.php\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyphoTech\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T10:33:20+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed Cyber Security Services in Canada | CyphoTech","description":"Secure your digital assets with advanced cybersecurity solutions, our expertise in threat detection ensures data and networks are resilient against cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyphotech.com\/index.php\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Managed Cyber Security Services in Canada | CyphoTech","og_description":"Secure your digital assets with advanced cybersecurity solutions, our expertise in threat detection ensures data and networks are resilient against cyber threats.","og_url":"https:\/\/cyphotech.com\/index.php\/cyber-security\/","og_site_name":"CyphoTech","article_modified_time":"2024-06-25T10:33:20+00:00","og_image":[{"url":"http:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyphotech.com\/index.php\/cyber-security\/","url":"https:\/\/cyphotech.com\/index.php\/cyber-security\/","name":"Managed Cyber Security Services in Canada | CyphoTech","isPartOf":{"@id":"https:\/\/cyphotech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyphotech.com\/index.php\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/cyphotech.com\/index.php\/cyber-security\/#primaryimage"},"thumbnailUrl":"http:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png","datePublished":"2023-10-16T11:51:55+00:00","dateModified":"2024-06-25T10:33:20+00:00","description":"Secure your digital assets with advanced cybersecurity solutions, our expertise in threat detection ensures data and networks are resilient against cyber threats.","breadcrumb":{"@id":"https:\/\/cyphotech.com\/index.php\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyphotech.com\/index.php\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyphotech.com\/index.php\/cyber-security\/#primaryimage","url":"http:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png","contentUrl":"http:\/\/cyphotech.com\/wp-content\/uploads\/2024\/02\/Untitled-design-5-1-e1707368485580.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cyphotech.com\/index.php\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyphotech.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/cyphotech.com\/#website","url":"https:\/\/cyphotech.com\/","name":"CyphoTech","description":"Your Digital Transformation Partner","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyphotech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/pages\/529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/comments?post=529"}],"version-history":[{"count":27,"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/pages\/529\/revisions"}],"predecessor-version":[{"id":4522,"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/pages\/529\/revisions\/4522"}],"wp:attachment":[{"href":"https:\/\/cyphotech.com\/index.php\/wp-json\/wp\/v2\/media?parent=529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}