{"structure":{"type":"Page","styleId":"p1","id":"tqcu0","components":[{"type":"Container","styleId":"strc1","id":"comp-jn9uyyso","components":[{"type":"Container","styleId":"mc1","id":"comp-jn9uyytb","components":[{"type":"Component","styleId":"txtNew","id":"comp-jn9uyytu","dataQuery":"#dataItem-jn9uyytz","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":925,"height":27,"x":28,"y":29,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyyu0","mobileHintsQuery":"mobileHints-jn9uz1gz","connectionQuery":"connection-jn9uyyu2","componentType":"wysiwyg.viewer.components.WRichText"},{"type":"Component","styleId":"style-jn9uyyuv","id":"comp-jn9uyyun","skin":"wysiwyg.viewer.skins.line.SolidLine","layout":{"width":920,"height":5,"x":31,"y":61,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyyut","mobileHintsQuery":"mobileHints-jn9uz1h8","connectionQuery":"connection-jn9uyyv0","componentType":"wysiwyg.viewer.components.FiveGridLine"},{"type":"Component","styleId":"txtNew","id":"comp-jn9uyyvw","dataQuery":"#dataItem-jn9uyyw4","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":920,"height":1794,"x":31,"y":73,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyyw6","mobileHintsQuery":"mobileHints-jn9uz1hk","connectionQuery":"connection-jn9uyyw61","componentType":"wysiwyg.viewer.components.WRichText"},{"type":"Component","styleId":"style-jodxi8nk","id":"comp-jodxg0nw","dataQuery":"#dataItem-jodxg112","skin":"wysiwyg.viewer.skins.photo.NoSkinPhoto","layout":{"width":599,"height":388,"x":191,"y":1907,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jodxg11d","connectionQuery":"connection-jodxg13c","componentType":"wysiwyg.viewer.components.WPhoto"},{"type":"Component","styleId":"txtNew","id":"comp-jodxitjn","dataQuery":"#dataItem-jodxitoj","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":920,"height":106,"x":31,"y":2343,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jodxitop","mobileHintsQuery":"mobileHints-jodxitwg","connectionQuery":"connection-jodxitpb","componentType":"wysiwyg.viewer.components.WRichText"}],"designQuery":"#dataItem-jn9uyytm","layout":{"width":980,"height":2482,"x":-1,"y":0,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyytl","mobileHintsQuery":"mobileHints-jn9uyytq","behaviorQuery":"behavior-jn9uyytp","connectionQuery":"connection-jn9uyytr","componentType":"wysiwyg.viewer.components.Column"}],"designQuery":"#dataItem-jn9uyyt2","layout":{"width":1903,"height":2482,"x":0,"y":34,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyyt0","mobileHintsQuery":"mobileHints-jn9uyyt3","connectionQuery":"connection-jn9uyyt4","componentType":"wysiwyg.viewer.components.StripColumnsContainer"}],"mobileComponents":[{"type":"Container","styleId":"strc1","id":"comp-jn9uyyso","components":[{"type":"Container","styleId":"mc1","id":"comp-jn9uyytb","components":[{"type":"Component","styleId":"txtNew","id":"comp-jn9uyytu","dataQuery":"#dataItem-jn9uyytz","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":280,"height":26,"x":20,"y":20,"scale":0.95,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"mobile_propItem-jn9uyyu0","connectionQuery":"connection-jn9uyyu2","componentType":"wysiwyg.viewer.components.WRichText"},{"type":"Component","styleId":"style-jn9uyyuv","id":"comp-jn9uyyun","skin":"wysiwyg.viewer.skins.line.SolidLine","layout":{"width":280,"height":5,"x":20,"y":66,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyyut","connectionQuery":"connection-jn9uyyv0","componentType":"wysiwyg.viewer.components.FiveGridLine"},{"type":"Component","styleId":"txtNew","id":"comp-jn9uyyvw","dataQuery":"#dataItem-jn9uyyw4","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":300,"height":1753,"x":10,"y":81,"scale":1.1666666666666667,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"mobile_propItem-jn9uyyw6","connectionQuery":"connection-jn9uyyw61","componentType":"wysiwyg.viewer.components.WRichText"},{"type":"Component","styleId":"style-jodxi8nk","id":"comp-jodxg0nw","dataQuery":"#dataItem-jodxg112","skin":"wysiwyg.viewer.skins.photo.NoSkinPhoto","layout":{"width":280,"height":181,"x":10,"y":1844,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jodxg11d","connectionQuery":"connection-jodxg13c","componentType":"wysiwyg.viewer.components.WPhoto"},{"type":"Component","styleId":"txtNew","id":"comp-jodxitjn","dataQuery":"#dataItem-jodxitoj","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":300,"height":319,"x":10,"y":2035,"scale":1.1666666666666667,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"mobile_propItem-jodxitop","mobileHintsQuery":"mobileHints-jodxitwg","connectionQuery":"connection-jodxitpb","componentType":"wysiwyg.viewer.components.WRichText"}],"designQuery":"#dataItem-jn9uyytm","layout":{"width":320,"height":2364,"x":0,"y":0,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyytl","mobileHintsQuery":"mobileHints-jn9uyytq","behaviorQuery":"behavior-jn9uyytp","connectionQuery":"connection-jn9uyytr","componentType":"wysiwyg.viewer.components.Column"}],"designQuery":"#dataItem-jn9uyyt2","layout":{"width":320,"height":2364,"x":0,"y":10,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-jn9uyyt0","mobileHintsQuery":"mobileHints-jn9uyyt3","connectionQuery":"connection-jn9uyyt4","componentType":"wysiwyg.viewer.components.StripColumnsContainer"}],"dataQuery":"#tqcu0","skin":"wysiwyg.viewer.skins.page.TransparentPageSkin","layout":{"width":1903,"height":2516,"x":0,"y":0,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"tqcu0","mobileHintsQuery":"tqcu0","connectionQuery":"tqcu0","componentType":"mobile.core.components.Page"},"data":{"document_data":{"dataItem-jn9uyytz":{"type":"StyledText","id":"dataItem-jn9uyytz","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"text":"<p class=\"font_7\" style=\"font-size:20px\"><span style=\"font-family:basic,sans-serif\"><span class=\"color_11\"><span style=\"font-size:20px\">Cyber Security Consultation</span></span></span></p>","stylesMapId":"CK_EDITOR_PARAGRAPH_STYLES","linkList":[]},"dataItem-jn9uyyw4":{"type":"StyledText","id":"dataItem-jn9uyyw4","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"text":"<p class=\"font_8\">Cyber security is a forever changing landscape with new threats released daily so its vital to get appropriate protection in place and this can be daunting. Fortunately, our team can do the heavy-lifting and can assess your business, detect what is missing, install the protection necessary. We offer a wide range of cyber security consultancy services to help build a robust security plan to mitigate risk.</p>\n\n<p class=\"font_8\">We believe a strong defence and detection and better cyber skills are essential in every organization. It&rsquo;s important to understand that defence alone will not solve this problem and detection plays a very important role as the sooner we can detect a threat that has bypassed defences the less damage it can cause.</p>\n\n<p class=\"font_8\"><span class=\"wixGuard\">​</span></p>\n\n<p class=\"font_7\"><span style=\"color:#FFFFFF\">Packages:</span></p>\n\n<p class=\"font_7\"><span style=\"color:#FFFFFF\"><span class=\"wixGuard\">​</span></span></p>\n\n<p class=\"font_7\"><span style=\"font-weight:bold;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"color:#FFFFFF\">Cyber Security Essential Consultation - Health Check</span></span></span></p>\n\n<p class=\"font_8\">To measure your security exposure and to oversee the design of a robust and secure&nbsp;systems, our experts will help you identify the correct course of action, safeguarding critical assets and ensuring complete compliance.</p>\n\n<p class=\"font_8\">Whether your organization is embarking on a new project or reviewing the security of an existing application or network, our expert consultants will work with you every step to ensure your systems are reliable and secure as possible.</p>\n\n<p class=\"font_8\">We live in the real world and because we focus on the SME (Small and Medium-sized Enterprises) market we understand that you don&rsquo;t want to spend a large majority of your budget on having us writing reports, so instead we take a more proactive approach and happy to discuss and asses your network and provide a tailored solution to help keep your business safe.</p>\n\n<p class=\"font_7\"><span style=\"color:#FFFFFF\">Key Benefits:</span></p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Provides your business with a snapshot of your key Cyber Security Risks</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identifies areas requiring immediate attention, and cost-effective remediation solutions, in prioritized terms</p>\n\t</li>\n</ul>\n\n<p class=\"font_7\"><span style=\"color:#FFFFFF\">Engagement: </span></p>\n\n<p class=\"font_8\">1 day</p>\n\n<p class=\"font_8\">Agenda:</p>\n\n<p class=\"font_8\">Step 1: Pre Assessment Phase (Off- Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Meeting with key staff members</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Walkthrough of engagement activities, and agree roles.</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify all required documentation to support</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Walkthrough of existing Information Security Policy (If Applicable)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Walkthrough of existing Network Diagram</p>\n\t</li>\n</ul>\n\n<p class=\"font_8\">Step 2: Cyber Security Risk Assessment (On-Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Identify the key Cyber Risks to your business</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify key digital assets, including Personally Identifiable Information (PII)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify the key relevant cyber risks to the critical digital assets</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify your organizational appetite to Risk on a scale (Risk Adverse vs Risk Seeking)</p>\n\t</li>\n</ul>\n\n<p class=\"font_8\">Step 3: Reporting (Off- Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Preparation of Cybersecurity Health Check Report</p>\n\t</li>\n</ul>\n\n<p>&nbsp;</p>\n\n<p class=\"font_8\"><span class=\"wixGuard\">​</span></p>\n\n<p>&nbsp;</p>\n\n<p class=\"font_8\"><span class=\"wixGuard\">​</span></p>\n\n<p class=\"font_8\"><span style=\"font-style:normal\"><span style=\"font-size:17px\"><span style=\"font-weight:bold\"><span style=\"font-family:open sans,sans-serif\"><span style=\"color:#FFFFFF\">Cyber Security Assessment - Consultation </span></span></span></span></span></p>\n\n<p class=\"font_8\"><span style=\"font-style:normal\"><span style=\"font-weight:400\"><span style=\"font-size:17px\"><span style=\"font-family:basic,sans-serif\"><span style=\"color:#FFFFFF\">SME Cyber Security Consultation</span></span></span></span></span></p>\n\n<p class=\"font_8\">ABCTech understands that cyber threats can be very daunting to a small business and we also understand that this may not be a priority to your business given all the other pressures you have to deal with.</p>\n\n<p class=\"font_8\">SME face more of a threat to Cyber Security because Cyber Criminals know that they hold just as much value in terms of financial or data and are an easier target because of the lack of defense and general cyber security. We are aware of all kinds of threats that different businesses face across an entire spectrum of industries.</p>\n\n<p class=\"font_8\">It is our job to be aware of threats happening now in the world and what new techniques and vulnerabilities are out there so that we can respond and keep you protected.</p>\n\n<p class=\"font_8\">We provide a tiered service, designed to help you establish and improve your cyber posture in line with the growth and nature of your business.</p>\n\n<p class=\"font_8\"><span style=\"font-style:normal\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-weight:400\"><span style=\"font-size:17px\"><span style=\"color:#FFFFFF\">Key Benefits:</span></span></span></span></span></p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Provides your business with a snapshot of your key Cyber Security Risks</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identifies areas requiring immediate attention, and cost-effective remediation solutions, in prioritised terms</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Provides a measure of Cyber Security Control maturity within your business as recommended by Australian Cyber Security Centre (ACSC)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Assists with Cyber Security cost forecasting, and budget justification</p>\n\t</li>\n</ul>\n\n<p class=\"font_7\"><span style=\"color:#FFFFFF\">Engagement: </span></p>\n\n<p class=\"font_8\">3 days</p>\n\n<p class=\"font_8\">Agenda:</p>\n\n<p class=\"font_8\">Step 1: Pre Assessment Phase (Off- Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Meeting with key staff members</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Walkthrough of engagement activities, and agree roles.</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify all required documentation to support</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Walkthrough of existing Information Security Policy (If Applicable)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Walkthrough of existing Network Diagram</p>\n\t</li>\n</ul>\n\n<p class=\"font_8\">Step 2: Cyber Security Risk Assessment (On-Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Identify the key Cyber Risks to your business</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify key digital assets, including Personally Identifiable Information (PII)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify the key relevant cyber risks to the critical digital assets</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify your organizational appetite to Risk on a scale (Risk Adverse vs Risk Seeking)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Identify the key Legal, Regulatory and Contractual obligations such as FCA, DPA etc</p>\n\t</li>\n</ul>\n\n<p class=\"font_8\">Step 3: Cyber Security Controls Assessment (On-Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Perform an on-site review of controls in order to review the following 10 key areas of risk in-line with the NCSC 10 Steps to Cyber Security.</p>\n\n\t<ul class=\"font_8\">\n\t\t<li>\n\t\t<p class=\"font_8\">Information Risk Management Regime</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Secure Configuration</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Network Security</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Managing User Privileges</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">User Education and Awareness</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Incident Management</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Malware Prevention</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Monitoring</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Removable Media Controls</p>\n\t\t</li>\n\t\t<li>\n\t\t<p class=\"font_8\">Home and Mobile Working</p>\n\t\t</li>\n\t</ul>\n\t</li>\n</ul>\n\n<p class=\"font_8\">Step 4: Reporting (Off- Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Preparation of Cybersecurity Health Check Report</p>\n\t</li>\n</ul>\n\n<p class=\"font_8\">Step 5: Stake Holder Review and Future Planning (Off-Site)</p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Workshop or meeting walkthrough&nbsp;of findings&nbsp;with key stakeholders/team leaders.</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">&nbsp;Define a vendor-neutral plan outlining tactical, and strategic changes required to improve Cyber Risk posture.</p>\n\t</li>\n</ul>\n\n<p class=\"font_8\">This work will vary; from internal changes, assisting and managing the changes, to recommending assistance from specific 3rd Party&nbsp;vendors.</p>\n\n<p class=\"font_8\"><span class=\"wixGuard\">​</span></p>\n\n<p class=\"font_7\"><span style=\"color:#FFFFFF;\">Deliverables</span></p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">Cyber Security Assessment Executive Summary Report &ndash; high-level summary, overall Cyber Risk Status, identification of any critical issues and exposures, and a prioritised set of recommendations required to align with agreed business risk appetite.</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Cyber Security Controls Analysis&ndash; (In Place, Partially In-Place, Not In Place, Risk Exposure)</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Strategic Remediation Actions- Detailed set of recommendations, and options for remediation.</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Remediation Project Plan &ndash; High-level plan identifying the tasks, resources and proposed timeframes required to immediately reduce any identified exposures, and any strategic items identified above.</p>\n\t</li>\n</ul>\n\n<p>&nbsp;\n<p class=\"font_8\"><span class=\"wixGuard\">​</span></p>\n</p>\n\n<p class=\"font_8\"><span class=\"wixGuard\">​</span></p>","stylesMapId":"CK_EDITOR_PARAGRAPH_STYLES","linkList":[]},"dataItem-jodxg112":{"type":"Image","id":"dataItem-jodxg112","metaData":{"isPreset":false,"schemaVersion":"2.0","isHidden":false},"title":"","uri":"a2b8fc_991a39b905b34847adc86ebc112cf64d~mv2.jpg","description":"","width":599,"height":388,"alt":"strip05.jpg","name":"strip05.jpg"},"dataItem-jodxitoj":{"type":"StyledText","id":"dataItem-jodxitoj","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"text":"<p class=\"font_8\"><span style=\"font-style:normal\"><span style=\"font-weight:400\"><span style=\"font-size:17px\"><span style=\"font-family:basic,sans-serif\"><span style=\"color:#FFFFFF\">ABCTech offers:</span></span></span></span></span></p>\n\n<ul class=\"font_8\">\n\t<li>\n\t<p class=\"font_8\">One-stop cyber security consultancy</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Flexible approach to ensure you have the cyber security policies and processes your organization needs</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">End to end service from planning through implementation and delivery of your cyber security strategy</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">We can tailor a solution to suit your security needs</p>\n\t</li>\n\t<li>\n\t<p class=\"font_8\">Deep knowledge of network functionality</p>\n\t</li>\n</ul>","stylesMapId":"CK_EDITOR_PARAGRAPH_STYLES","linkList":[]},"tqcu0":{"type":"Page","id":"tqcu0","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"title":"Cyber Security Consultation","hideTitle":true,"icon":"","descriptionSEO":"","metaKeywordsSEO":"","pageTitleSEO":"","pageUriSEO":"copy-of-services","hidePage":false,"isMobileLandingPage":false,"underConstruction":false,"tpaApplicationId":0,"pageSecurity":{"requireLogin":false,"passwordDigest":""},"isPopup":false,"indexable":true,"isLandingPage":false,"pageBackgrounds":{"desktop":{"custom":true,"ref":"#tqcu0_desktop_bg","isPreset":false},"mobile":{"custom":true,"ref":"#tqcu0_mobile_bg","isPreset":true,"mediaSizing":"viewport"}},"translationData":{"uriSEOTranslated":false}},"tqcu0_desktop_bg":{"type":"BackgroundMedia","id":"tqcu0_desktop_bg","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"mediaRef":"#tqcu0_desktop_mediaRef","color":"#000000","alignType":"right","fittingType":"fill","scrollType":"parallax","colorOverlay":"","colorOverlayOpacity":0.0},"tqcu0_desktop_mediaRef":{"type":"Image","id":"tqcu0_desktop_mediaRef","metaData":{"isPreset":false,"schemaVersion":"2.0","isHidden":false},"title":"Web Consultation","uri":"0ba5583727e04a07a2b0920b3359f2c0.jpg","description":"public/491df47b-5958-4dc7-9029-37f428755d45/c2a37dfc-36cf-4bfd-b940-55bac7bdc9e6","width":6000,"height":1972,"alt":"","artist":{"id":"","name":""},"opacity":0.6},"tqcu0_mobile_bg":{"type":"BackgroundMedia","id":"tqcu0_mobile_bg","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"mediaRef":"#tqcu0_mobile_mediaRef","color":"#000000","alignType":"right","fittingType":"fill","scrollType":"scroll","colorOverlay":"","colorOverlayOpacity":0.0},"tqcu0_mobile_mediaRef":{"type":"Image","id":"tqcu0_mobile_mediaRef","metaData":{"isPreset":false,"schemaVersion":"2.0","isHidden":false},"title":"Web Consultation","uri":"0ba5583727e04a07a2b0920b3359f2c0.jpg","description":"public/491df47b-5958-4dc7-9029-37f428755d45/c2a37dfc-36cf-4bfd-b940-55bac7bdc9e6","width":6000,"height":1972,"alt":"","artist":{"id":"","name":""},"opacity":0.6}},"design_data":{"dataItem-jn9uyyt2":{"type":"MediaContainerDesignData","id":"dataItem-jn9uyyt2","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"background":"#dataItem-jn9uyzyj"},"dataItem-jn9uyytm":{"type":"MediaContainerDesignData","id":"dataItem-jn9uyytm","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"background":"#dataItem-jn9uyzzo","charas":"design-jeyniowa","dataChangeBehaviors":[]},"dataItem-jn9uyzyj":{"type":"BackgroundMedia","id":"dataItem-jn9uyzyj","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"color":"#FFFFFF","colorOpacity":0.0,"alignType":"center","fittingType":"fill","scrollType":"none","colorOverlay":"","colorOverlayOpacity":1.0},"dataItem-jn9uyzzo":{"type":"BackgroundMedia","id":"dataItem-jn9uyzzo","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"color":"#000000","colorOpacity":0.7,"alignType":"center","fittingType":"fill","scrollType":"none","colorOverlay":"","colorOverlayOpacity":0.0,"showOverlayForMediaType":"WixVideo"}},"behaviors_data":{"behavior-jn9uyytp":{"type":"ObsoleteBehaviorsList","id":"behavior-jn9uyytp","items":"[{\"name\":\"BackgroundFadeIn\",\"action\":\"bgScrub\",\"duration\":1,\"delay\":0,\"viewMode\":\"DESKTOP\"}]"}},"connections_data":{"connection-jn9uyyt4":{"type":"ConnectionList","id":"connection-jn9uyyt4","items":[{"type":"WixCodeConnectionItem","role":"columnStrip1"}]},"connection-jn9uyytr":{"type":"ConnectionList","id":"connection-jn9uyytr","items":[{"type":"WixCodeConnectionItem","role":"column1"}]},"connection-jn9uyyu2":{"type":"ConnectionList","id":"connection-jn9uyyu2","items":[{"type":"WixCodeConnectionItem","role":"text19"}]},"connection-jn9uyyv0":{"type":"ConnectionList","id":"connection-jn9uyyv0","items":[{"type":"WixCodeConnectionItem","role":"line10"}]},"connection-jn9uyyw61":{"type":"ConnectionList","id":"connection-jn9uyyw61","items":[{"type":"WixCodeConnectionItem","role":"text21"}]},"connection-jodxg13c":{"type":"ConnectionList","id":"connection-jodxg13c","items":[{"type":"WixCodeConnectionItem","role":"image1"}]},"connection-jodxitpb":{"type":"ConnectionList","id":"connection-jodxitpb","items":[{"type":"WixCodeConnectionItem","role":"text36"}]},"tqcu0":{"type":"ConnectionList","id":"tqcu0","items":[{"type":"WixCodeConnectionItem","role":"page1"}]}},"theme_data":{"style-jn9uyyuv":{"type":"ComponentStyle","id":"style-jn9uyyuv","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"style":{"properties":{"alpha-brd":"1","brd":"#E32100","lnw":"1px"},"propertiesSource":{"brd":"value","lnw":"value"},"groups":{}},"componentClassName":"wysiwyg.viewer.components.FiveGridLine","pageId":"","compId":"","styleType":"custom","skin":"wysiwyg.viewer.skins.line.SolidLine"},"style-jodxi8nk":{"type":"ComponentStyle","id":"style-jodxi8nk","metaData":{"isPreset":true,"schemaVersion":"1.0","isHidden":false},"style":{"properties":{},"propertiesSource":{},"groups":{}},"componentClassName":"wysiwyg.viewer.components.WPhoto","pageId":"","compId":"","styleType":"custom","skin":"wysiwyg.viewer.skins.photo.NoSkinPhoto"}},"component_properties":{"mobile_propItem-jn9uyyu0":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"brightness":1.0,"packed":true},"mobile_propItem-jn9uyyw6":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"brightness":1.0,"packed":true},"mobile_propItem-jodxitop":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":true},"brightness":1.0,"packed":false},"propItem-jn9uyyt0":{"type":"StripColumnsContainerProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"fullWidth":true,"columnsMargin":0,"frameMargin":0,"rowMargin":0,"siteMargin":0},"propItem-jn9uyytl":{"type":"ColumnProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"alignment":50},"propItem-jn9uyyu0":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0"},"brightness":1.0,"packed":true},"propItem-jn9uyyut":{"type":"FiveGridLineProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"isHidden":false,"isCollapsed":false,"fullScreenModeOn":false},"propItem-jn9uyyw6":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"brightness":1.0,"packed":true},"propItem-jodxg11d":{"type":"WPhotoProperties","metaData":{"schemaVersion":"1.0"},"displayMode":"fill","onClickBehavior":"goToLink","autoFill":false},"propItem-jodxitop":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"brightness":1.0,"packed":true},"tqcu0":{"type":"PageProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"desktop":{"minHeight":1263}}},"mobile_hints":{"mobileHints-jn9uyyt3":{"type":"MobileHints","id":"mobileHints-jn9uyyt3","author":"studio","recommendedScale":1.0,"recommendedWidth":320},"mobileHints-jn9uyytq":{"type":"MobileHints","id":"mobileHints-jn9uyytq","author":"studio","offsetX":0,"offsetY":0,"offsetOrigin":"leftTop","recommendedScale":1.0,"recommendedWidth":320,"orderIndex":0},"mobileHints-jodxitwg":{"type":"MobileHints","id":"mobileHints-jodxitwg","author":"duplicate","originalCompId":"comp-jn9uyyvw","recommendedScale":1.1666666,"recommendedWidth":300,"recommendedHeight":10},"tqcu0":{"type":"MobileHints","id":"tqcu0","hidden":false}}},"title":"Cyber Security Consultation","pageUriSEO":"copy-of-services"}