{"id":2099,"date":"2021-11-23T03:40:51","date_gmt":"2021-11-23T08:40:51","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/co-managed-it-services-copy\/"},"modified":"2023-11-11T14:48:46","modified_gmt":"2023-11-11T19:48:46","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2099\" class=\"elementor elementor-2099\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7d53e7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"d7d53e7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f12cc3f\" data-id=\"f12cc3f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d62fc1e elementor-widget elementor-widget-heading\" data-id=\"d62fc1e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f76786 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f76786\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7eb4715\" data-id=\"7eb4715\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b996ab9 custom-unorderlists elementor-widget elementor-widget-text-editor\" data-id=\"b996ab9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>SMBs are the \u201clow-hanging fruit\u201d that cybercriminals prefer to target; low security spending, complacent employees, and a lack of expertise make it easy. To combat this, TechSolutions offers PointProtect\u2122, a managed cybersecurity solution that gives SMB leaders a way to achieve enterprise-grade security at a feasible price. This practical, top-down approach to cybersecurity integrates good business practices, innovative technology, and employee training to protect clients from all the new and existing cyberattacks threatening businesses today.<\/p><p>In addition to baseline cybersecurity solutions, our PointProtect\u2122 managed cybersecurity services include:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d95cb37 custom-unorderlists elementor-widget elementor-widget-text-editor\" data-id=\"d95cb37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Breach detection software to search for malware already inside your current network. It looks for known or suspicious applications and analyzes data by looking for programs that are operating without your authorization.<\/li><li style=\"font-size: 18px;\" aria-level=\"1\">Web filter\/DNS protection, which functions like guards patrolling outside the firewall. It protects against attacks from cybercriminals by blocking access\u00a0 and communications from unauthorized and suspicious sources.<\/li><li style=\"font-size: 18px;\" aria-level=\"1\">Policy management tools to make sure every computer follows recommended security protocols, and enable office managers to selectively tighten security for new staff, interns, visitors, problem staff, or any other desired user groups.<\/li><li style=\"font-size: 18px;\" aria-level=\"1\">Dark Web monitoring, which will routinely scan online black markets for your organization\u2019s data, such as usernames, passwords, personal data, or financial info. If we find your data for sale, alerts, quarantines, and appropriate action will soon follow.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-631f5ee elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"631f5ee\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9aa9df0\" data-id=\"9aa9df0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dc94dd elementor-widget elementor-widget-image\" data-id=\"7dc94dd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"533\" height=\"370\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg\" class=\"attachment-full size-full wp-image-2463\" alt=\"cybersecurity for managed networks computer security company\" srcset=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg 533w, https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity-300x208.jpg 300w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5a02f53\" data-id=\"5a02f53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1b8068 elementor-widget elementor-widget-heading\" data-id=\"c1b8068\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Once integrated into your existing systems, PointProtect\u2122 will:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf48ca4 elementor-widget__width-initial custom-unorderlists elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"cf48ca4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li aria-level=\"1\">Protect your intellectual property, finances, and reputation<\/li><li aria-level=\"1\">Introduce cybersecurity as an important piece of your company culture<\/li><li aria-level=\"1\">Minimize the number of cyberthreats that slow down your productivity<\/li><li aria-level=\"1\">Increase staff awareness of cybersecurity threats and company procedures\u00a0<\/li><li aria-level=\"1\">Introduce management practices to support a new culture of vigilance<\/li><li aria-level=\"1\">Deploy innovative security technology to monitor your systems for network intrusions and prevent them before they cause damage<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7955fc5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7955fc5\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea5f18d\" data-id=\"ea5f18d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e9134b elementor-widget elementor-widget-heading\" data-id=\"5e9134b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Step-by-Step Cyberdefense Strategy<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7f627d elementor-widget elementor-widget-text-editor\" data-id=\"a7f627d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tTechSolutions will work with your team to create a tailored cybersecurity plan that addresses your business\u2019s unique security needs\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34e5135 custom-accordion elementor-widget elementor-widget-accordion\" data-id=\"34e5135\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5541\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-5541\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"far fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"far fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Management Briefing \u2013 Intelligence Briefing for Senior Management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5541\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-5541\"><p>The PointProtect\u2122 Management Briefing will thoroughly inform business leaders about cybersecurity threats and the potential impact of an attack on your business. Your team will get a balanced perspective on cybersecurity trends, regulatory compliance issues, financial risks, and defense strategies.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5542\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-5542\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"far fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"far fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">HR Policy Development \u2013 The New Rules of Engagement for Your Staff and Their Endpoints<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5542\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-5542\"><p>The PointProtect\u2122\u00a0 HR Policy Development Program helps senior management to develop a company-wide policy governing the use of company computers. It also develops an incident response process for all staff and creates a plan to educate everyone in the organization. We will help you craft a formal HR policy along with best practices for data management and standards of conduct that appropriately reflect the values of the organization. We will also create an effective strategy for communicating the policy to the organization that is consistent with best practices in \u201cchange management.\u201d The program will be led by our partner, SymbianceHR, a leader in HR Services with considerable experience in cybersecurity.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5543\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-5543\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"far fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"far fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Cybersecurity Awareness Training \u2013 Bootcamp for Staff and Employees<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5543\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-5543\"><p>TechSolutions has created a unique approach to cybersecurity awareness training by providing employees with the tools, insights, and resources they need to be an active participant in the cybersecurity defense of the company. The program delivers a stimulating, engaging, and practical learning experience over several months. The goal is to educate employees by demonstrating effective data protection techniques and appropriate responses to potential threats, thereby preventing employee errors and reducing the number of successful attacks that enter the company\u2019s network.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5544\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-5544\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"far fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"far fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Cyberinsurance Review \u2013 A Review of Your Policy & Needs<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5544\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-5544\">When your business insurance broker sends you a questionnaire to complete for the insurance company to provide you with pricing, many Office Managers and CEOs may have trouble answering the questions regarding their IT network and cybersecurity environment. We help you accurately complete the necessary applications so your business is compliant with and properly covered by your cyber liability insurance.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5545\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-5545\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"far fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"far fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Managed IT Security Services \u2013 Advanced Technology to Address New Threats <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5545\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-5545\"><p>For many businesses, the services we have provided are sufficient. However, for companies that provide reputation-based professional services or are responsible for medical records, eCommerce data, or intellectual property, this may no longer be enough. That\u2019s why TechSolutions offers advanced, customizable cybersecurity solutions that meet the unique challenges of these companies. We have experience in all sectors and industries, and our clients benefit from our extensive knowledge base.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b23cb6 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"3b23cb6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b549600\" data-id=\"b549600\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d04464a elementor-widget elementor-widget-template\" data-id=\"d04464a\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"2368\" class=\"elementor elementor-2368\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1805b2ed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1805b2ed\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-486b51de\" data-id=\"486b51de\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fb6fb77 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1fb6fb77\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a name=\"services\"><\/a> Our services and solutions ensure your IT benefits your business without the hassles<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-105fdab7 services-box elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"105fdab7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"make-column-clickable-elementor elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-1e3b8f7c service-box\" style=\"cursor: pointer;\" data-column-clickable=\"\/services-and-solutions\/managed-it-services\/\" data-column-clickable-blank=\"_self\" data-id=\"1e3b8f7c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9a61fb elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"d9a61fb\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"\/services-and-solutions\/managed-it-services\/\" class=\"elementor-icon elementor-animation-\" tabindex=\"-1\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"70\" height=\"70\" viewBox=\"0 0 70 70\"><g id=\"ico-managed-IT-services\" transform=\"translate(-134.139 -415.66)\"><g id=\"ico-managed-IT-services-inner\" transform=\"translate(136 421.855)\"><g id=\"Group_4963\" data-name=\"Group 4963\"><g id=\"Group_4958\" data-name=\"Group 4958\" transform=\"translate(0 9.333)\"><path id=\"Path_6201\" data-name=\"Path 6201\" d=\"M266.248,73.967h-35.61V38.626H283.7V56.178h-1.712V40.338h-49.64V72.256h33.9Z\" transform=\"translate(-230.638 -38.626)\" fill=\"#2f80fd\"><\/path><\/g><g id=\"Group_4959\" data-name=\"Group 4959\" transform=\"translate(0.001)\"><path id=\"Path_6202\" data-name=\"Path 6202\" d=\"M283.7,44.22H230.638V33.174H283.7ZM232.35,42.508h49.64V34.886H232.35Z\" transform=\"translate(-230.638 -33.174)\" fill=\"#2f80fd\"><\/path><\/g><g id=\"Group_4960\" data-name=\"Group 4960\" transform=\"translate(4.559 4.667)\"><rect id=\"Rectangle_1471\" data-name=\"Rectangle 1471\" width=\"2.822\" height=\"1.712\" fill=\"#2f80fd\"><\/rect><\/g><g id=\"Group_4961\" data-name=\"Group 4961\" transform=\"translate(8.522 4.667)\"><rect id=\"Rectangle_1472\" data-name=\"Rectangle 1472\" width=\"2.822\" height=\"1.712\" fill=\"#2f80fd\"><\/rect><\/g><g id=\"Group_4962\" data-name=\"Group 4962\" transform=\"translate(12.485 4.667)\"><rect id=\"Rectangle_1473\" data-name=\"Rectangle 1473\" width=\"2.82\" height=\"1.712\" fill=\"#2f80fd\"><\/rect><\/g><\/g><g id=\"Group_4964\" data-name=\"Group 4964\" transform=\"translate(5.137 14.469)\"><path id=\"Path_6203\" data-name=\"Path 6203\" d=\"M258.976,52.772H233.639V41.627h25.337ZM235.351,51.06h21.914V43.339H235.351Z\" transform=\"translate(-233.639 -41.627)\" fill=\"#2f80fd\"><\/path><\/g><g id=\"Group_4965\" data-name=\"Group 4965\" transform=\"translate(33.899 14.469)\"><path id=\"Path_6204\" data-name=\"Path 6204\" d=\"M255.358,62.3h-4.916V41.627h14.03V57.052h-1.712V43.339H252.153V60.591h3.2Z\" transform=\"translate(-250.441 -41.627)\" fill=\"#2f80fd\"><\/path><\/g><g id=\"Group_4966\" data-name=\"Group 4966\" transform=\"translate(5.113 29.038)\"><rect id=\"Rectangle_1474\" data-name=\"Rectangle 1474\" width=\"25.362\" height=\"1.712\" fill=\"#2f80fd\"><\/rect><\/g><g id=\"Group_4967\" data-name=\"Group 4967\" transform=\"translate(5.113 33.433)\"><rect id=\"Rectangle_1475\" data-name=\"Rectangle 1475\" width=\"25.362\" height=\"1.712\" fill=\"#2f80fd\"><\/rect><\/g><g id=\"Group_4968\" data-name=\"Group 4968\" transform=\"translate(5.113 37.827)\"><rect id=\"Rectangle_1476\" data-name=\"Rectangle 1476\" width=\"13.548\" height=\"1.712\" fill=\"#2f80fd\"><\/rect><\/g><g id=\"Group_4974\" data-name=\"Group 4974\" transform=\"translate(38.138 30.027)\"><g id=\"Group_4973\" data-name=\"Group 4973\"><g id=\"Group_4970\" data-name=\"Group 4970\" transform=\"translate(7.787 7.508)\"><g id=\"Group_4969\" data-name=\"Group 4969\"><path id=\"Path_6205\" data-name=\"Path 6205\" d=\"M263.751,67.669a6.284,6.284,0,1,1,6.284-6.284A6.29,6.29,0,0,1,263.751,67.669Zm0-10.856a4.572,4.572,0,1,0,4.572,4.572A4.577,4.577,0,0,0,263.751,56.814Z\" transform=\"translate(-257.467 -55.102)\" fill=\"#2f80fd\"><\/path><\/g><\/g><g id=\"Group_4972\" data-name=\"Group 4972\"><g id=\"Group_4971\" data-name=\"Group 4971\"><path id=\"Path_6206\" data-name=\"Path 6206\" d=\"M268.371,78.3h-2.759a1.271,1.271,0,0,1-1.258-1.068l-.392-2.395a10.505,10.505,0,0,1-2.609-1.087l-1.981,1.424a1.26,1.26,0,0,1-1.635-.132l-1.564-1.565a1.259,1.259,0,0,1-.132-1.633l1.426-1.98a10.572,10.572,0,0,1-1.087-2.609l-2.4-.392a1.263,1.263,0,0,1-1.063-1.251V63.4a1.262,1.262,0,0,1,1.061-1.25l2.4-.392a10.572,10.572,0,0,1,1.087-2.609l-1.421-1.974a1.269,1.269,0,0,1,.133-1.647l1.553-1.551a1.272,1.272,0,0,1,1.645-.137l1.975,1.422a10.5,10.5,0,0,1,2.609-1.085l.392-2.4a1.265,1.265,0,0,1,1.25-1.063h2.761a1.273,1.273,0,0,1,1.26,1.07l.389,2.395a10.541,10.541,0,0,1,2.61,1.085l1.98-1.424a1.256,1.256,0,0,1,1.633.132l1.565,1.565a1.26,1.26,0,0,1,.133,1.633l-1.426,1.98a10.636,10.636,0,0,1,1.085,2.609l2.4.392a1.262,1.262,0,0,1,1.065,1.25v2.21A1.263,1.263,0,0,1,280,66.863l-2.4.392a10.609,10.609,0,0,1-1.085,2.609l1.419,1.972a1.27,1.27,0,0,1-.132,1.648l-1.552,1.553a1.272,1.272,0,0,1-1.647.133l-1.972-1.421a10.514,10.514,0,0,1-2.612,1.085l-.39,2.4A1.26,1.26,0,0,1,268.371,78.3Zm-.438-1.339,0,0Zm-.127-.373h.188l.515-3.174.579-.118A8.883,8.883,0,0,0,272.19,72l.491-.324,2.614,1.883,1.029-1.029-1.885-2.614.325-.493a8.848,8.848,0,0,0,1.291-3.1l.12-.575,3.172-.517V63.782l-3.172-.519-.12-.575a8.874,8.874,0,0,0-1.291-3.1l-.325-.493,1.885-2.614-1.031-1.027-2.612,1.881-.491-.324a8.848,8.848,0,0,0-3.1-1.289l-.579-.12-.515-3.174h-2.013l-.517,3.174-.579.12a8.841,8.841,0,0,0-3.1,1.289l-.493.324-2.612-1.881-1.027,1.027,1.88,2.614-.322.493a8.849,8.849,0,0,0-1.291,3.1l-.12.577-3.172.519v1.453l3.172.517.12.577a8.849,8.849,0,0,0,1.291,3.1l.323.493-1.881,2.614,1.027,1.029,2.612-1.883.493.324a8.876,8.876,0,0,0,3.1,1.291l.577.118.52,3.174Zm-10.424-4.322,0,0Z\" transform=\"translate(-252.918 -50.716)\" fill=\"#2f80fd\"><\/path><\/g><\/g><\/g><\/g><\/g><rect id=\"ico-managed-IT-services-area\" width=\"70\" height=\"70\" transform=\"translate(134.139 415.66)\" fill=\"none\"><\/rect><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"\/services-and-solutions\/managed-it-services\/\" >\n\t\t\t\t\t\t\tManaged IT<br> Services\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"make-column-clickable-elementor elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-4cf5a7a0 service-box\" style=\"cursor: pointer;\" data-column-clickable=\"\/services-and-solutions\/backup-and-disaster-recovery\/\" data-column-clickable-blank=\"_self\" data-id=\"4cf5a7a0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b4bc09a elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"1b4bc09a\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"\/services-and-solutions\/backup-and-disaster-recovery\/\" class=\"elementor-icon elementor-animation-\" tabindex=\"-1\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"70\" height=\"70\" viewBox=\"0 0 70 70\"><g id=\"ico-backup-and-disaster-recovery\" transform=\"translate(-539 -415.355)\"><g id=\"ico-backup-and-disaster-recovery-inner\" transform=\"translate(547.664 421.027)\"><path id=\"Rectangle_1459\" data-name=\"Rectangle 1459\" d=\"M0-.9H46a.9.9,0,0,1,.9.9V12a.9.9,0,0,1-.9.9H0A.9.9,0,0,1-.9,12V0A.9.9,0,0,1,0-.9ZM45.1.9H.9V11.1H45.1Z\" transform=\"translate(3.336 -0.171)\" fill=\"#2f80fd\"><\/path><path id=\"Line_18\" data-name=\"Line 18\" d=\"M.9,6H-.9V0H.9Z\" transform=\"translate(43.336 2.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_19\" data-name=\"Line 19\" d=\"M.9,6H-.9V0H.9Z\" transform=\"translate(39.336 2.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_20\" data-name=\"Line 20\" d=\"M.9,6H-.9V0H.9Z\" transform=\"translate(34.336 2.829)\" fill=\"#2f80fd\"><\/path><path id=\"Rectangle_1460\" data-name=\"Rectangle 1460\" d=\"M0-.9H46a.9.9,0,0,1,.9.9V14a.9.9,0,0,1-.9.9H0A.9.9,0,0,1-.9,14V0A.9.9,0,0,1,0-.9ZM45.1.9H.9V13.1H45.1Z\" transform=\"translate(3.336 16.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_21\" data-name=\"Line 21\" d=\"M.9,6H-.9V0H.9Z\" transform=\"translate(43.336 20.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_22\" data-name=\"Line 22\" d=\"M.9,6H-.9V0H.9Z\" transform=\"translate(39.336 20.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_23\" data-name=\"Line 23\" d=\"M.9,6H-.9V0H.9Z\" transform=\"translate(34.336 20.829)\" fill=\"#2f80fd\"><\/path><path id=\"Rectangle_1461\" data-name=\"Rectangle 1461\" d=\"M0-.9H46a.9.9,0,0,1,.9.9V13a.9.9,0,0,1-.9.9H0A.9.9,0,0,1-.9,13V0A.9.9,0,0,1,0-.9ZM45.1.9H.9V12.1H45.1Z\" transform=\"translate(3.336 34.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_24\" data-name=\"Line 24\" d=\"M.9,7H-.9V0H.9Z\" transform=\"translate(43.336 36.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_25\" data-name=\"Line 25\" d=\"M.9,7H-.9V0H.9Z\" transform=\"translate(39.336 36.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_26\" data-name=\"Line 26\" d=\"M.9,7H-.9V0H.9Z\" transform=\"translate(34.336 36.829)\" fill=\"#2f80fd\"><\/path><path id=\"Rectangle_1462\" data-name=\"Rectangle 1462\" d=\"M0-.9H11a.9.9,0,0,1,.9.9V4a.9.9,0,0,1-.9.9H0A.9.9,0,0,1-.9,4V0A.9.9,0,0,1,0-.9ZM10.1.9H.9V3.1h9.2Z\" transform=\"translate(21.336 54.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_27\" data-name=\"Line 27\" d=\"M20,.9H0V-.9H20Z\" transform=\"translate(32.336 57.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_28\" data-name=\"Line 28\" d=\"M21,.9H0V-.9H21Z\" transform=\"translate(0.336 57.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_29\" data-name=\"Line 29\" d=\"M.9,5H-.9V0H.9Z\" transform=\"translate(26.336 11.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_30\" data-name=\"Line 30\" d=\"M.9,4H-.9V0H.9Z\" transform=\"translate(26.336 30.829)\" fill=\"#2f80fd\"><\/path><path id=\"Line_31\" data-name=\"Line 31\" d=\"M.9,7H-.9V0H.9Z\" transform=\"translate(26.336 47.829)\" fill=\"#2f80fd\"><\/path><\/g><rect id=\"ico-backup-and-disaster-recovery-area\" width=\"70\" height=\"70\" transform=\"translate(539 415.355)\" fill=\"none\"><\/rect><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"\/services-and-solutions\/backup-and-disaster-recovery\/\" >\n\t\t\t\t\t\t\tBackup and Disaster Recovery\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"make-column-clickable-elementor elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-bd9763d service-box\" style=\"cursor: pointer;\" data-column-clickable=\"\/services-and-solutions\/co-managed-it-services\/\" data-column-clickable-blank=\"_self\" data-id=\"bd9763d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25f62366 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"25f62366\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"\/services-and-solutions\/co-managed-it-services\/\" class=\"elementor-icon elementor-animation-\" tabindex=\"-1\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"70\" height=\"70\" viewBox=\"0 0 70 70\"><g id=\"ico-co-managed-it-services\" transform=\"translate(-910.974 -415.83)\"><g id=\"ico-co-managed-it-services-inner\" transform=\"translate(774.775 264.267)\"><path id=\"Path_6224\" data-name=\"Path 6224\" d=\"M159.491,203.005a1.052,1.052,0,0,1-.48-1.988l2.669-1.369a24.965,24.965,0,0,1-10.6-6.316c-.017-.017-.089-.1-.106-.115s-.108-.1-.129-.12a24.98,24.98,0,0,1-7.081-21.473,1.052,1.052,0,1,1,2.082.3,22.9,22.9,0,0,0,6.494,19.686l.115.1c.019.021.094.1.111.122a22.851,22.851,0,0,0,12.324,6.4,1.053,1.053,0,0,1,.3,1.974l-5.222,2.678A1.052,1.052,0,0,1,159.491,203.005Z\" transform=\"translate(2.411 11.164)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6225\" data-name=\"Path 6225\" d=\"M158.954,186.482l-6.563,0a1.052,1.052,0,0,1-1.053-1.053v-3.081c-.205-.077-.4-.158-.6-.247l-2.177,2.177a1.081,1.081,0,0,1-1.489,0l-4.641-4.64a1.055,1.055,0,0,1,0-1.489l2.177-2.177c-.087-.2-.169-.4-.247-.6h-3.081a1.052,1.052,0,0,1-1.053-1.053v-6.565a1.052,1.052,0,0,1,1.053-1.051h3.083c.076-.205.158-.4.245-.6l-2.177-2.177a1.055,1.055,0,0,1,0-1.489l4.641-4.641a1.085,1.085,0,0,1,1.489,0l2.177,2.177c.2-.085.4-.169.6-.245v-3.083a1.052,1.052,0,0,1,1.053-1.053h6.563a1.053,1.053,0,0,1,1.053,1.053v3.083c.2.076.4.16.6.245l2.176-2.177a1.085,1.085,0,0,1,1.489,0l4.641,4.641a1.051,1.051,0,0,1,0,1.489l-2.177,2.177c.087.2.169.4.247.6h3.081a1.052,1.052,0,0,1,1.053,1.051v6.565a1.052,1.052,0,0,1-1.053,1.053h-3.081c-.078.205-.16.4-.247.6l2.177,2.177a1.052,1.052,0,0,1,0,1.489l-4.641,4.64a1.051,1.051,0,0,1-1.489,0l-2.176-2.177c-.2.089-.4.17-.6.247v3.083a1.056,1.056,0,0,1-1.053,1.053Zm-5.512-2.106H157.9V181.6a1.052,1.052,0,0,1,.742-1.006,9.834,9.834,0,0,0,1.689-.693,1.057,1.057,0,0,1,1.235.186l1.962,1.962,3.152-3.152-1.96-1.96a1.052,1.052,0,0,1-.188-1.236,9.873,9.873,0,0,0,.693-1.691,1.053,1.053,0,0,1,1.006-.742h2.78V168.8h-2.78a1.052,1.052,0,0,1-1.006-.74,9.949,9.949,0,0,0-.693-1.693,1.05,1.05,0,0,1,.188-1.234l1.96-1.96-3.152-3.154-1.962,1.962a1.055,1.055,0,0,1-1.235.188,9.881,9.881,0,0,0-1.689-.7,1.051,1.051,0,0,1-.742-1v-2.78h-4.459v2.78a1.05,1.05,0,0,1-.74,1,9.9,9.9,0,0,0-1.691.7,1.054,1.054,0,0,1-1.236-.188l-1.96-1.962-3.154,3.154,1.962,1.96a1.055,1.055,0,0,1,.188,1.234,10.092,10.092,0,0,0-.7,1.693,1.051,1.051,0,0,1-1,.74h-2.78v4.459h2.78a1.051,1.051,0,0,1,1,.742,10.154,10.154,0,0,0,.693,1.691,1.052,1.052,0,0,1-.186,1.236l-1.962,1.96,3.154,3.152,1.96-1.962a1.051,1.051,0,0,1,1.236-.186,9.947,9.947,0,0,0,1.689.693,1.052,1.052,0,0,1,.742,1.006Z\" transform=\"translate(0 0)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6226\" data-name=\"Path 6226\" d=\"M152.752,176.679a8.564,8.564,0,1,1,6.058-2.506A8.54,8.54,0,0,1,152.752,176.679Zm0-15.026a6.461,6.461,0,1,0,4.57,1.892A6.42,6.42,0,0,0,152.752,161.653Z\" transform=\"translate(2.92 2.921)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6227\" data-name=\"Path 6227\" d=\"M176.826,204.354h-6.563a1.052,1.052,0,0,1-1.053-1.053v-3.083c-.205-.076-.4-.16-.6-.247l-2.177,2.177a1.052,1.052,0,0,1-1.489,0l-4.641-4.64a1.055,1.055,0,0,1,0-1.489l2.177-2.177c-.087-.2-.169-.4-.247-.6H159.15a1.052,1.052,0,0,1-1.053-1.053v-6.563a1.052,1.052,0,0,1,1.053-1.053h3.081c.078-.205.16-.4.247-.6l-2.177-2.177a1.052,1.052,0,0,1,0-1.489l4.641-4.641a1.085,1.085,0,0,1,1.489,0l2.177,2.177c.2-.085.4-.169.6-.245v-3.083a1.052,1.052,0,0,1,1.053-1.053h6.563a1.052,1.052,0,0,1,1.051,1.053V177.6c.205.076.407.16.6.245l2.177-2.177a1.083,1.083,0,0,1,1.487,0l4.641,4.641a1.052,1.052,0,0,1,0,1.489l-2.177,2.177c.087.2.169.4.247.6h3.083a1.052,1.052,0,0,1,1.051,1.053v6.563a1.052,1.052,0,0,1-1.051,1.053h-3.083c-.078.2-.16.4-.247.6l2.177,2.177a1.051,1.051,0,0,1,0,1.489l-4.641,4.64a1.05,1.05,0,0,1-1.487,0l-2.177-2.177c-.2.087-.4.17-.6.247V203.3A1.052,1.052,0,0,1,176.826,204.354Zm-5.51-2.106h4.457v-2.78a1.052,1.052,0,0,1,.74-1,9.93,9.93,0,0,0,1.691-.7,1.055,1.055,0,0,1,1.236.186l1.962,1.962,3.152-3.152-1.962-1.962a1.054,1.054,0,0,1-.186-1.236,9.794,9.794,0,0,0,.693-1.689,1.053,1.053,0,0,1,1.006-.742h2.78v-4.457H184.1a1.053,1.053,0,0,1-1.006-.742,9.739,9.739,0,0,0-.693-1.689,1.057,1.057,0,0,1,.186-1.237l1.962-1.96L181.4,177.9l-1.962,1.962a1.06,1.06,0,0,1-1.236.188,9.837,9.837,0,0,0-1.691-.7,1.052,1.052,0,0,1-.74-1v-2.78h-4.457v2.78a1.053,1.053,0,0,1-.742,1,9.9,9.9,0,0,0-1.691.7,1.058,1.058,0,0,1-1.235-.188l-1.962-1.962-3.152,3.154,1.962,1.96a1.058,1.058,0,0,1,.188,1.237,9.744,9.744,0,0,0-.7,1.689,1.052,1.052,0,0,1-1.006.742H160.2v4.457h2.779a1.052,1.052,0,0,1,1.006.742,9.8,9.8,0,0,0,.7,1.689,1.055,1.055,0,0,1-.188,1.236l-1.962,1.962,3.152,3.152,1.962-1.962a1.051,1.051,0,0,1,1.235-.186,9.932,9.932,0,0,0,1.691.7,1.053,1.053,0,0,1,.742,1Z\" transform=\"translate(13.184 13.184)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6228\" data-name=\"Path 6228\" d=\"M170.621,194.548a8.562,8.562,0,1,1,6.059-2.5A8.54,8.54,0,0,1,170.621,194.548Zm-4.57-13.132a6.46,6.46,0,1,0,4.57-1.894,6.472,6.472,0,0,0-4.57,1.894Z\" transform=\"translate(16.106 16.106)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6229\" data-name=\"Path 6229\" d=\"M180.747,189.809a.941.941,0,0,1-.155-.012,1.051,1.051,0,0,1-.888-1.194,22.9,22.9,0,0,0-6.492-19.684c-.042-.033-.082-.071-.122-.109-.019-.019-.09-.1-.106-.116a22.858,22.858,0,0,0-12.322-6.4,1.052,1.052,0,0,1-.3-1.974l5.222-2.676a1.053,1.053,0,1,1,.961,1.873l-2.671,1.369a24.934,24.934,0,0,1,10.6,6.315c.019.019.092.1.108.118s.1.087.113.1a24.989,24.989,0,0,1,7.095,21.488A1.052,1.052,0,0,1,180.747,189.809Z\" transform=\"translate(14.432 1.43)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6230\" data-name=\"Path 6230\" d=\"M164.6,166.116a1.054,1.054,0,0,1-.839-.417L160,160.757a1.053,1.053,0,0,1,1.677-1.274l3.753,4.944a1.049,1.049,0,0,1-.2,1.474A1.037,1.037,0,0,1,164.6,166.116Z\" transform=\"translate(14.433 2.566)\" fill=\"#2f80fd\"><\/path><path id=\"Path_6231\" data-name=\"Path 6231\" d=\"M157.747,190.753a1.046,1.046,0,0,1-.839-.417l-3.755-4.942a1.053,1.053,0,1,1,1.677-1.274l3.755,4.944a1.053,1.053,0,0,1-.838,1.689Z\" transform=\"translate(9.379 20.74)\" fill=\"#2f80fd\"><\/path><\/g><rect id=\"ico-co-managed-it-services-area\" width=\"70\" height=\"70\" transform=\"translate(910.974 415.83)\" fill=\"none\"><\/rect><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"\/services-and-solutions\/co-managed-it-services\/\" >\n\t\t\t\t\t\t\tCo-Managed IT Services\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"make-column-clickable-elementor elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-4edfbbfb service-box\" style=\"cursor: pointer;\" data-column-clickable=\"\/services-and-solutions\/cybersecurity\/\" data-column-clickable-blank=\"_self\" data-id=\"4edfbbfb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5dd013c6 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5dd013c6\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"\/services-and-solutions\/cybersecurity\/\" class=\"elementor-icon elementor-animation-\" tabindex=\"-1\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"70\" height=\"70\" viewBox=\"0 0 70 70\"><g id=\"ico-cybersecurity\" transform=\"translate(-425.098 -603.953)\"><g id=\"ico-cybersecurity-inner\" transform=\"translate(388 482.855)\"><path id=\"Path_1588\" data-name=\"Path 1588\" d=\"M95.9,144.307a27.785,27.785,0,1,0-51.7,20.31c.01.025.022.047.034.072a27.822,27.822,0,0,0,25.548,16.876c.6,0,1.2-.025,1.792-.064a1.158,1.158,0,1,0-.147-2.311c-.544.035-1.092.059-1.645.059-4.394,0-8.308-5.722-10.261-13.892H66.31a1.157,1.157,0,1,0,0-2.314H59.034a52.229,52.229,0,0,1,0-18.523H93.494c.075.194.164.381.235.576a1.158,1.158,0,1,0,2.176-.789ZM63.243,129.171c-2.715,2.836-4.871,7.412-6.13,13.036h-10A25.57,25.57,0,0,1,63.243,129.171Zm0,49.224A25.568,25.568,0,0,1,47.11,165.357h10C58.372,170.983,60.529,175.558,63.243,178.394Zm-6.587-15.351H46.065a25.378,25.378,0,0,1,0-18.523H56.656a56.431,56.431,0,0,0,0,18.523Zm13.126-34.728c4.237,0,8.276,5.528,10.269,13.891H59.521C61.474,134.037,65.388,128.315,69.782,128.315Zm12.641,13.891c-1.288-5.712-3.47-10.23-6.151-13.028a25.575,25.575,0,0,1,16.179,13.028Z\" transform=\"translate(0 0)\" fill=\"#2f80fd\"><\/path><path id=\"Path_1589\" data-name=\"Path 1589\" d=\"M78.787,166.576a1.154,1.154,0,0,1-.818-.339l-4.629-4.63a1.157,1.157,0,1,1,1.637-1.637l3.811,3.812,8.444-8.442a1.157,1.157,0,0,1,1.637,1.637l-9.262,9.262A1.158,1.158,0,0,1,78.787,166.576Z\" transform=\"translate(4.886 4.57)\" fill=\"#2f80fd\"><\/path><path id=\"Path_1590\" data-name=\"Path 1590\" d=\"M82.206,183.358a1.141,1.141,0,0,1-.436-.086,31.578,31.578,0,0,1-7.843-4.958C68.741,173.856,66,168.368,66,162.444V150.1a1.158,1.158,0,0,1,.473-.934A29.308,29.308,0,0,1,82.206,144a29.308,29.308,0,0,1,15.733,5.163,1.157,1.157,0,0,1,.473.934v12.347c0,5.923-2.741,11.412-7.927,15.871a31.578,31.578,0,0,1-7.843,4.958A1.141,1.141,0,0,1,82.206,183.358Zm-13.891-32.65v11.736c0,11.439,11.485,17.373,13.89,18.49,2.4-1.119,13.892-7.076,13.892-18.49V150.711c-1.633-1.063-7.286-4.4-13.891-4.4C75.579,146.315,69.944,149.647,68.315,150.708Z\" transform=\"translate(3.782 2.837)\" fill=\"#2f80fd\"><\/path><\/g><rect id=\"ico-cybersecurity-area\" width=\"70\" height=\"70\" transform=\"translate(425.098 603.953)\" fill=\"none\"><\/rect><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"\/services-and-solutions\/cybersecurity\/\" >\n\t\t\t\t\t\t\tCybersecurity\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"make-column-clickable-elementor elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-47bffdf8 service-box\" style=\"cursor: pointer;\" data-column-clickable=\"\/services-and-solutions\/it-consulting\/\" data-column-clickable-blank=\"_self\" data-id=\"47bffdf8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ab633be elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5ab633be\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"\/services-and-solutions\/it-consulting\/\" class=\"elementor-icon elementor-animation-\" tabindex=\"-1\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"70\" height=\"70\" viewBox=\"0 0 70 70\"><g id=\"ico-IT-consulting\" transform=\"translate(-717 -604.459)\"><g id=\"ico-IT-consulting-inner\" transform=\"translate(397.85 503.265)\"><path id=\"Path_6207\" data-name=\"Path 6207\" d=\"M337.238,143.918a1.022,1.022,0,0,1-1.023-1.023V136.69a1.023,1.023,0,0,1,2.046,0V142.9A1.022,1.022,0,0,1,337.238,143.918Z\" transform=\"translate(8.99 15.879)\" fill=\"#0368d9\"><\/path><path id=\"Path_6208\" data-name=\"Path 6208\" d=\"M346.223,143.918A1.022,1.022,0,0,1,345.2,142.9V136.69a1.023,1.023,0,0,1,2.046,0V142.9A1.022,1.022,0,0,1,346.223,143.918Z\" transform=\"translate(15.172 15.879)\" fill=\"#0368d9\"><\/path><path id=\"Path_6209\" data-name=\"Path 6209\" d=\"M344.223,136.977c-2.2,0-4.116-1.381-5.5-4a12.787,12.787,0,0,1-1.408-5.964v-1.936a1.028,1.028,0,0,1,.147-.53,9.324,9.324,0,0,1,6.918-3.1c3.6,0,7.124,2.174,7.124,3.8v1.766a12.792,12.792,0,0,1-1.41,5.964c-1.42,2.682-3.374,4.056-5.714,4C344.326,136.976,344.274,136.977,344.223,136.977Zm-4.867-11.535v1.568a10.738,10.738,0,0,0,1.172,5.009c1.045,1.973,2.3,2.946,3.849,2.91,1.534.042,2.86-.937,3.906-2.912a10.736,10.736,0,0,0,1.172-5.007v-1.6a7.514,7.514,0,0,0-5.078-1.924A7.936,7.936,0,0,0,339.356,125.443Z\" transform=\"translate(9.745 6.094)\" fill=\"#0368d9\"><\/path><path id=\"Path_6210\" data-name=\"Path 6210\" d=\"M342.875,136.091c-1.872,0-3.339-1.1-3.339-2.5v-3.5a1.022,1.022,0,0,1,1.553-.874,3.093,3.093,0,0,0,1.757.469,3.193,3.193,0,0,0,1.815-.469,1.022,1.022,0,0,1,1.553.874v3.5C346.214,134.99,344.747,136.091,342.875,136.091ZM341.58,131.6v1.985a1.593,1.593,0,0,0,1.295.457,1.546,1.546,0,0,0,1.3-.471l0-1.972a6.513,6.513,0,0,1-2.59,0Z\" transform=\"translate(11.275 11.338)\" fill=\"#0368d9\"><\/path><path id=\"Path_6211\" data-name=\"Path 6211\" d=\"M360.169,147.547h-26.2a1.022,1.022,0,0,1-1.023-1.023v-8.008a8.133,8.133,0,0,1,8.125-8.123h4.021a1.022,1.022,0,0,1,1.021,1.023v1.259a1.593,1.593,0,0,0,1.295.457,1.546,1.546,0,0,0,1.3-.471l0-1.246a1.022,1.022,0,0,1,1.023-1.023h3.341a8.133,8.133,0,0,1,8.125,8.123v8.008A1.022,1.022,0,0,1,360.169,147.547ZM334.993,145.5h24.153v-6.985a6.084,6.084,0,0,0-6.079-6.077h-2.319v.236c0,1.4-1.467,2.5-3.339,2.5s-3.339-1.1-3.339-2.5v-.236h-3a6.084,6.084,0,0,0-6.079,6.077Z\" transform=\"translate(6.741 12.25)\" fill=\"#0368d9\"><\/path><path id=\"Path_6212\" data-name=\"Path 6212\" d=\"M357.11,143.384a1.022,1.022,0,0,1-1.023-1.023v-4.9a1.023,1.023,0,0,1,2.046,0v4.9A1.022,1.022,0,0,1,357.11,143.384Z\" transform=\"translate(22.664 16.41)\" fill=\"#0368d9\"><\/path><path id=\"Path_6213\" data-name=\"Path 6213\" d=\"M355.775,137.9c-.044,0-.086,0-.128,0-1.271.046-3.182-.5-4.651-3.271a10.324,10.324,0,0,1-1.136-4.809v-1.529a1.02,1.02,0,0,1,.149-.532,7.617,7.617,0,0,1,5.645-2.547c2.728,0,5.837,1.712,5.837,3.214v1.394a10.3,10.3,0,0,1-1.138,4.809C358.935,137.316,357.105,137.9,355.775,137.9Zm-.128-2.046c1.165.039,2.117-.7,2.9-2.183a8.285,8.285,0,0,0,.9-3.854v-1.18a5.778,5.778,0,0,0-3.793-1.383,6.111,6.111,0,0,0-3.749,1.418v1.145a8.274,8.274,0,0,0,.9,3.852C353.587,135.153,354.555,135.9,355.647,135.857Z\" transform=\"translate(18.379 8.685)\" fill=\"#0368d9\"><\/path><path id=\"Path_6214\" data-name=\"Path 6214\" d=\"M354.467,137.2c-1.6,0-2.851-.962-2.851-2.191v-2.76a1.021,1.021,0,0,1,1.551-.874,2.24,2.24,0,0,0,1.271.339,2.344,2.344,0,0,0,1.327-.339,1.023,1.023,0,0,1,1.553.874v2.76C357.318,136.241,356.066,137.2,354.467,137.2Zm-.807-2.272a1.552,1.552,0,0,0,1.614,0v-1.224a5.873,5.873,0,0,1-1.614,0Z\" transform=\"translate(19.587 12.825)\" fill=\"#0368d9\"><\/path><path id=\"Path_6215\" data-name=\"Path 6215\" d=\"M365.834,146.249h-13.5a1.023,1.023,0,0,1,0-2.046h12.478v-5.3a4.59,4.59,0,0,0-4.583-4.583h-1.617c-.019,1.215-1.264,2.162-2.851,2.162s-2.833-.947-2.851-2.162h-2.152a1.023,1.023,0,1,1,0-2.046h3.174a1.022,1.022,0,0,1,1.023,1.023v.913a1.552,1.552,0,0,0,1.614,0V133.3a1.022,1.022,0,0,1,1.021-1.023h2.64a6.636,6.636,0,0,1,6.627,6.629v6.322A1.022,1.022,0,0,1,365.834,146.249Z\" transform=\"translate(18.293 13.545)\" fill=\"#0368d9\"><\/path><path id=\"Path_6216\" data-name=\"Path 6216\" d=\"M326.752,143.384a1.022,1.022,0,0,1-1.023-1.023v-4.9a1.023,1.023,0,0,1,2.046,0v4.9A1.022,1.022,0,0,1,326.752,143.384Z\" transform=\"translate(1.775 16.41)\" fill=\"#0368d9\"><\/path><path id=\"Path_6217\" data-name=\"Path 6217\" d=\"M331.941,137.9c-1.276,0-3.1-.587-4.526-3.273a10.3,10.3,0,0,1-1.138-4.809v-1.394c0-1.5,3.109-3.214,5.839-3.214a7.6,7.6,0,0,1,5.643,2.549,1.02,1.02,0,0,1,.15.53v1.529a10.324,10.324,0,0,1-1.138,4.809c-1.467,2.772-3.376,3.307-4.708,3.271C332.024,137.9,331.984,137.9,331.941,137.9Zm.123-2.046c1.165.039,2.117-.7,2.9-2.184a8.274,8.274,0,0,0,.9-3.852v-1.151a6.133,6.133,0,0,0-3.748-1.411,5.774,5.774,0,0,0-3.793,1.383v1.18a8.253,8.253,0,0,0,.9,3.852C330.005,135.153,330.983,135.9,332.065,135.857Z\" transform=\"translate(2.152 8.685)\" fill=\"#0368d9\"><\/path><path id=\"Path_6218\" data-name=\"Path 6218\" d=\"M330.885,137.2c-1.6,0-2.851-.962-2.851-2.191v-2.76a1.022,1.022,0,0,1,1.553-.874,2.265,2.265,0,0,0,1.269.339,2.3,2.3,0,0,0,1.329-.339,1.023,1.023,0,0,1,1.553.874v2.76C333.738,136.241,332.484,137.2,330.885,137.2Zm-.805-2.272a1.549,1.549,0,0,0,1.612,0v-1.224a4.573,4.573,0,0,1-.807.056,4.5,4.5,0,0,1-.805-.056Z\" transform=\"translate(3.361 12.825)\" fill=\"#0368d9\"><\/path><path id=\"Path_6219\" data-name=\"Path 6219\" d=\"M337.673,146.249h-13.5a1.022,1.022,0,0,1-1.023-1.023V138.9a6.637,6.637,0,0,1,6.629-6.629h2.639a1.022,1.022,0,0,1,1.023,1.023v.913a1.549,1.549,0,0,0,1.612,0V133.3a1.022,1.022,0,0,1,1.023-1.023h3.174a1.023,1.023,0,0,1,0,2.046H337.1c-.02,1.215-1.266,2.162-2.853,2.162s-2.833-.947-2.851-2.162h-1.615A4.589,4.589,0,0,0,325.2,138.9v5.3h12.477a1.023,1.023,0,1,1,0,2.046Z\" transform=\"translate(0 13.545)\" fill=\"#0368d9\"><\/path><path id=\"Path_6220\" data-name=\"Path 6220\" d=\"M341.931,123.18a1.022,1.022,0,0,1-1.023-1.023V118.33a1.023,1.023,0,1,1,2.046,0v3.827A1.022,1.022,0,0,1,341.931,123.18Z\" transform=\"translate(12.219 3.246)\" fill=\"#0368d9\"><\/path><path id=\"Path_6221\" data-name=\"Path 6221\" d=\"M356.905,129.69a1.023,1.023,0,0,1-1.006-.846c-1.069-6.064-8.2-9.526-8.267-9.561a1.022,1.022,0,0,1,.878-1.847c.331.157,8.148,3.94,9.4,11.054a1.022,1.022,0,0,1-.829,1.185A1.068,1.068,0,0,1,356.905,129.69Z\" transform=\"translate(16.445 3.266)\" fill=\"#0368d9\"><\/path><path id=\"Path_6222\" data-name=\"Path 6222\" d=\"M330.557,129.69a1.083,1.083,0,0,1-.179-.015,1.024,1.024,0,0,1-.829-1.185c1.254-7.114,9.072-10.9,9.4-11.054a1.022,1.022,0,1,1,.878,1.847c-.071.035-7.2,3.5-8.267,9.561A1.023,1.023,0,0,1,330.557,129.69Z\" transform=\"translate(4.393 3.266)\" fill=\"#0368d9\"><\/path><path id=\"Path_6223\" data-name=\"Path 6223\" d=\"M342.956,119.663a3.537,3.537,0,1,1,3.537-3.537A3.541,3.541,0,0,1,342.956,119.663Zm0-5.027a1.491,1.491,0,1,0,1.491,1.491A1.492,1.492,0,0,0,342.956,114.636Z\" transform=\"translate(11.195 0)\" fill=\"#0368d9\"><\/path><\/g><rect id=\"ico-IT-consulting-area\" width=\"70\" height=\"70\" transform=\"translate(717 604.459)\" fill=\"none\"><\/rect><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"\/services-and-solutions\/it-consulting\/\" >\n\t\t\t\t\t\t\tIT Consulting\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity SMBs are the \u201clow-hanging fruit\u201d that cybercriminals prefer to target; low security spending, complacent employees, and a lack of expertise make it easy. To combat this, TechSolutions offers PointProtect\u2122, a managed cybersecurity solution that gives SMB leaders a way to achieve enterprise-grade security at a feasible price. This practical, top-down approach to cybersecurity integrates [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"parent":351,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2099","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity for Managed Networks | Wilmington, Delaware<\/title>\n<meta name=\"description\" content=\"TechSolutions will create a tailored cybersecurity plan utilizing cutting-edge tools and addresses your business\u2019s unique security needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for Managed Networks | Wilmington, Delaware\" \/>\n<meta property=\"og:description\" content=\"TechSolutions will create a tailored cybersecurity plan utilizing cutting-edge tools and addresses your business\u2019s unique security needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-11T19:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/\",\"name\":\"Cybersecurity for Managed Networks | Wilmington, Delaware\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg\",\"datePublished\":\"2021-11-23T08:40:51+00:00\",\"dateModified\":\"2023-11-11T19:48:46+00:00\",\"description\":\"TechSolutions will create a tailored cybersecurity plan utilizing cutting-edge tools and addresses your business\u2019s unique security needs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg\",\"width\":533,\"height\":370,\"caption\":\"cybersecurity for managed networks computer security company\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services and Solutions\",\"item\":\"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for Managed Networks | Wilmington, Delaware","description":"TechSolutions will create a tailored cybersecurity plan utilizing cutting-edge tools and addresses your business\u2019s unique security needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for Managed Networks | Wilmington, Delaware","og_description":"TechSolutions will create a tailored cybersecurity plan utilizing cutting-edge tools and addresses your business\u2019s unique security needs.","og_url":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_modified_time":"2023-11-11T19:48:46+00:00","og_image":[{"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@TechSolutionsDE","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/","url":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/","name":"Cybersecurity for Managed Networks | Wilmington, Delaware","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg","datePublished":"2021-11-23T08:40:51+00:00","dateModified":"2023-11-11T19:48:46+00:00","description":"TechSolutions will create a tailored cybersecurity plan utilizing cutting-edge tools and addresses your business\u2019s unique security needs.","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/sideimg-cybersecurity.jpg","width":533,"height":370,"caption":"cybersecurity for managed networks computer security company"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Services and Solutions","item":"https:\/\/www.techsolutionsinc.com\/services-and-solutions\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/pages\/2099"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=2099"}],"version-history":[{"count":48,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/pages\/2099\/revisions"}],"predecessor-version":[{"id":5158,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/pages\/2099\/revisions\/5158"}],"up":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/pages\/351"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=2099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}