{"id":1286,"date":"2024-04-27T17:27:01","date_gmt":"2024-04-27T17:27:01","guid":{"rendered":"https:\/\/grosynk.com\/?page_id=1286"},"modified":"2024-06-03T08:08:18","modified_gmt":"2024-06-03T08:08:18","slug":"cyber-security-2","status":"publish","type":"page","link":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div id=\"pl-1286\"  class=\"panel-layout\" ><div id=\"pg-1286-0\"  class=\"panel-grid panel-has-style\" ><div data-overlay-opactity=\"1\" class=\"panel-row-style panel-row-style-for-1286-0\" ><div id=\"pgc-1286-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-0-0-0\" class=\"so-panel widget widget_themegrill_flash_heading tg-widget section-title-wrapper panel-first-child panel-last-child\" data-index=\"0\" >\t<div class=\"heading heading-center divider-without-icon heading-divider\">\r\n\t<h3 class=\"section-title\">Cyber Security<\/h3>\r\n\t<div class=\"section-description\">At GroSynk, our cyber security expertise is essential in safeguarding your digital landscape.<\/div>\r\n<\/div>\r\n<\/div><\/div><\/div><\/div><div id=\"pg-1286-1\"  class=\"panel-grid panel-has-style\" ><div data-overlay-opactity=\"1\" class=\"panel-row-style panel-row-style-for-1286-1\" ><div id=\"pgc-1286-1-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-1286-2\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-1286-2\" data-siteorigin-parallax=\"{&quot;backgroundUrl&quot;:&quot;https:\\\/\\\/grosynk.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/pexels-pixabay-60504-scaled.jpg&quot;,&quot;backgroundSize&quot;:[2560,1707],&quot;backgroundSizing&quot;:&quot;scaled&quot;,&quot;limitMotion&quot;:&quot;auto&quot;}\" data-stretch-type=\"full\" data-overlay-opactity=\"1\" ><div id=\"pgc-1286-2-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-1286-3\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-1286-3\" data-stretch-type=\"full\" data-overlay-opactity=\"1\" ><div id=\"pgc-1286-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-3-0-0\" class=\"so-panel widget widget_themegrill_flash_tab tg-widget tg-tab-widget panel-first-child panel-last-child\" data-index=\"1\" ><div class=\"panel-widget-style panel-widget-style-for-1286-3-0-0\" ><div class=\"flash-tabs-container tab-left\">\r\n\t<div id=\"flash-tabs\" class=\"tg-tabs\">\r\n\t\t\t\t<div class=\"tab-list\">\r\n\t\t\t\t<ul class= \"nav-tab\">\r\n\t\t\t\t\t\t\t\t\t\t\t<li class= \"tab-head\">\r\n\t\t\t\t\t\t\t<a href=\"#tab-0\">\r\n\t\t\t\t\t\t\t\t<i class=\"fa fa-lock\"><\/i>\r\n\t\t\t\t\t\t\t\tRisk Management\/Assessment\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t<\/div>\r\n\r\n\t\t  \t\t\t\t\t<div class=\"tab-content\" id=\"tab-0\" >\r\n\t\t\t\t\t<p>\r\n\t\t\t\t\t\tOur approach begins with a thorough identification of potential threats and vulnerabilities within your business. We don't stop at detection; we develop comprehensive rescue and recovery plans to ensure your business remains resilient in the face of cyber threats.\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/div>\r\n\t\t  \t\t\t\t<\/div>\r\n<\/div>\r\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-1286-4\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-1286-4\" data-stretch-type=\"full\" data-overlay-opactity=\"1\" ><div id=\"pgc-1286-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-4-0-0\" class=\"so-panel widget widget_themegrill_flash_tab tg-widget tg-tab-widget panel-first-child panel-last-child\" data-index=\"2\" ><div class=\"flash-tabs-container tab-right\">\r\n\t<div id=\"flash-tabs\" class=\"tg-tabs\">\r\n\t\t\t\t<div class=\"tab-list\">\r\n\t\t\t\t<ul class= \"nav-tab\">\r\n\t\t\t\t\t\t\t\t\t\t\t<li class= \"tab-head\">\r\n\t\t\t\t\t\t\t<a href=\"#tab-0\">\r\n\t\t\t\t\t\t\t\t<i class=\"fa fa-user\"><\/i>\r\n\t\t\t\t\t\t\t\tConsultancy &amp; Training\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t<\/div>\r\n\r\n\t\t  \t\t\t\t\t<div class=\"tab-content\" id=\"tab-0\" >\r\n\t\t\t\t\t<p>\r\n\t\t\t\t\t\tOur specialized knowledge translates into bespoke solutions tailored to protect your business. Beyond solutions, we empower your team through education on cyber security principles and practices, instilling a culture of vigilance.\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/div>\r\n\t\t  \t\t\t\t<\/div>\r\n<\/div>\r\n<\/div><\/div><\/div><\/div><div id=\"pg-1286-5\"  class=\"panel-grid panel-has-style\" ><div data-overlay-opactity=\"1\" class=\"panel-row-style panel-row-style-for-1286-5\" ><div id=\"pgc-1286-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-5-0-0\" class=\"so-panel widget widget_themegrill_flash_heading tg-widget section-title-wrapper panel-first-child panel-last-child\" data-index=\"3\" >\t<div class=\"heading heading-center divider-without-icon heading-divider\">\r\n\t<h3 class=\"section-title\">Top 7 Cyber Security Breaches<\/h3>\r\n<\/div>\r\n<\/div><\/div><\/div><\/div><div id=\"pg-1286-6\"  class=\"panel-grid panel-has-style\" ><div data-overlay-opactity=\"1\" class=\"panel-row-style panel-row-style-for-1286-6\" ><div id=\"pgc-1286-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-6-0-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-113ccd71f3e6-1286\"\n\t\t\t\n\t\t>\n\n<div class=\"sow-image-container\">\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/grosynk.com\/wp-content\/uploads\/2024\/04\/Cyber-security-middle2-768x306.png\" width=\"768\" height=\"306\" srcset=\"https:\/\/grosynk.com\/wp-content\/uploads\/2024\/04\/Cyber-security-middle2-768x306.png 768w, https:\/\/grosynk.com\/wp-content\/uploads\/2024\/04\/Cyber-security-middle2-300x120.png 300w, https:\/\/grosynk.com\/wp-content\/uploads\/2024\/04\/Cyber-security-middle2.png 1019w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" title=\"Cyber security middle2\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-1286-7\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-1286-7\" data-stretch-type=\"full\" data-overlay-opactity=\"1\" ><div id=\"pgc-1286-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-7-0-0\" class=\"so-panel widget widget_themegrill_flash_tab tg-widget tg-tab-widget panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"flash-tabs-container tab-left\">\r\n\t<div id=\"flash-tabs\" class=\"tg-tabs\">\r\n\t\t\t\t<div class=\"tab-list\">\r\n\t\t\t\t<ul class= \"nav-tab\">\r\n\t\t\t\t\t\t\t\t\t\t\t<li class= \"tab-head\">\r\n\t\t\t\t\t\t\t<a href=\"#tab-0\">\r\n\t\t\t\t\t\t\t\t<i class=\"fa fa-product-hunt\"><\/i>\r\n\t\t\t\t\t\t\t\tOwner &amp; Service Provider Assessments\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t<\/div>\r\n\r\n\t\t  \t\t\t\t\t<div class=\"tab-content\" id=\"tab-0\" >\r\n\t\t\t\t\t<p>\r\n\t\t\t\t\t\tWe undertake meticulous assessments of the risks related to your business's data and intellectual property, extending our scrutiny to the security measures and protocols of third-party (3P) vendors. Our objective is to manage all facets of data risk, maintaining the integrity and confidentiality of your valuable information.\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/div>\r\n\t\t  \t\t\t\t<\/div>\r\n<\/div>\r\n<\/div><\/div><\/div><\/div><div id=\"pg-1286-8\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-1286-8\" data-stretch-type=\"full\" data-overlay-opactity=\"1\" ><div id=\"pgc-1286-8-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1286-8-0-0\" class=\"so-panel widget widget_themegrill_flash_tab tg-widget tg-tab-widget panel-first-child panel-last-child\" data-index=\"6\" ><div class=\"flash-tabs-container tab-right\">\r\n\t<div id=\"flash-tabs\" class=\"tg-tabs\">\r\n\t\t\t\t<div class=\"tab-list\">\r\n\t\t\t\t<ul class= \"nav-tab\">\r\n\t\t\t\t\t\t\t\t\t\t\t<li class= \"tab-head\">\r\n\t\t\t\t\t\t\t<a href=\"#tab-0\">\r\n\t\t\t\t\t\t\t\t<i class=\"fa fa-unlock\"><\/i>\r\n\t\t\t\t\t\t\t\tSecure Product Development Lifecycle\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t<\/div>\r\n\r\n\t\t  \t\t\t\t\t<div class=\"tab-content\" id=\"tab-0\" >\r\n\t\t\t\t\t<p>\r\n\t\t\t\t\t\tSecurity is not an afterthought but is integrated into every phase of your product's development lifecycle. We ensure that security practices are embedded from the ground up, safeguarding your product from inception to deployment and beyond.\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/div>\r\n\t\t  \t\t\t\t<\/div>\r\n<\/div>\r\n<\/div><\/div><\/div><\/div><div id=\"pg-1286-9\"  class=\"panel-grid panel-has-style\" ><div data-overlay-opactity=\"1\" class=\"panel-row-style panel-row-style-for-1286-9\" ><div id=\"pgc-1286-9-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber Security At GroSynk, our cyber security expertise is essential in safeguarding your digital landscape. Risk Management\/Assessment Our approach begins [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1286","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - GroSynk<\/title>\n<meta name=\"description\" content=\"Network Security Solutions, Data Protection, Cyber Threat Detection, IT Security Consulting, Managed Security Services, Cyber Risk Management, Penetration Testing, Incident Response, Cybersecurity Compliance\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - GroSynk\" \/>\n<meta property=\"og:description\" content=\"Network Security Solutions, Data Protection, Cyber Threat Detection, IT Security Consulting, Managed Security Services, Cyber Risk Management, Penetration Testing, Incident Response, Cybersecurity Compliance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"GroSynk\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T08:08:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/\",\"url\":\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/\",\"name\":\"Cyber Security - GroSynk\",\"isPartOf\":{\"@id\":\"https:\/\/grosynk.com\/#website\"},\"datePublished\":\"2024-04-27T17:27:01+00:00\",\"dateModified\":\"2024-06-03T08:08:18+00:00\",\"description\":\"Network Security Solutions, Data Protection, Cyber Threat Detection, IT Security Consulting, Managed Security Services, Cyber Risk Management, Penetration Testing, Incident Response, Cybersecurity Compliance\",\"breadcrumb\":{\"@id\":\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/grosynk.com\/index.php\/cyber-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/grosynk.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/grosynk.com\/#website\",\"url\":\"https:\/\/grosynk.com\/\",\"name\":\"GroSynk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/grosynk.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/grosynk.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/grosynk.com\/#organization\",\"name\":\"GroSynk\",\"url\":\"https:\/\/grosynk.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/grosynk.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/grosynk.com\/wp-content\/uploads\/2024\/05\/Grosynk-Logo_Figma.png\",\"contentUrl\":\"https:\/\/grosynk.com\/wp-content\/uploads\/2024\/05\/Grosynk-Logo_Figma.png\",\"width\":368,\"height\":100,\"caption\":\"GroSynk\"},\"image\":{\"@id\":\"https:\/\/grosynk.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - GroSynk","description":"Network Security Solutions, Data Protection, Cyber Threat Detection, IT Security Consulting, Managed Security Services, Cyber Risk Management, Penetration Testing, Incident Response, Cybersecurity Compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - GroSynk","og_description":"Network Security Solutions, Data Protection, Cyber Threat Detection, IT Security Consulting, Managed Security Services, Cyber Risk Management, Penetration Testing, Incident Response, Cybersecurity Compliance","og_url":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/","og_site_name":"GroSynk","article_modified_time":"2024-06-03T08:08:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/","url":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/","name":"Cyber Security - GroSynk","isPartOf":{"@id":"https:\/\/grosynk.com\/#website"},"datePublished":"2024-04-27T17:27:01+00:00","dateModified":"2024-06-03T08:08:18+00:00","description":"Network Security Solutions, Data Protection, Cyber Threat Detection, IT Security Consulting, Managed Security Services, Cyber Risk Management, Penetration Testing, Incident Response, Cybersecurity Compliance","breadcrumb":{"@id":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/grosynk.com\/index.php\/cyber-security-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/grosynk.com\/index.php\/cyber-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/grosynk.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/grosynk.com\/#website","url":"https:\/\/grosynk.com\/","name":"GroSynk","description":"","publisher":{"@id":"https:\/\/grosynk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/grosynk.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/grosynk.com\/#organization","name":"GroSynk","url":"https:\/\/grosynk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/grosynk.com\/#\/schema\/logo\/image\/","url":"https:\/\/grosynk.com\/wp-content\/uploads\/2024\/05\/Grosynk-Logo_Figma.png","contentUrl":"https:\/\/grosynk.com\/wp-content\/uploads\/2024\/05\/Grosynk-Logo_Figma.png","width":368,"height":100,"caption":"GroSynk"},"image":{"@id":"https:\/\/grosynk.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/pages\/1286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/comments?post=1286"}],"version-history":[{"count":1,"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/pages\/1286\/revisions"}],"predecessor-version":[{"id":1423,"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/pages\/1286\/revisions\/1423"}],"wp:attachment":[{"href":"https:\/\/grosynk.com\/index.php\/wp-json\/wp\/v2\/media?parent=1286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}