{"id":2566,"date":"2018-01-18T15:44:53","date_gmt":"2018-01-18T20:44:53","guid":{"rendered":"\/?page_id=2566"},"modified":"2018-02-01T00:40:51","modified_gmt":"2018-02-01T05:40:51","slug":"cybersecurity-audit","status":"publish","type":"page","link":"https:\/\/www.connectalk.com\/en\/solutions\/professional-services\/cybersecurity-audit\/","title":{"rendered":"Cybersecurity Audit"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243; specialty=&#8221;on&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_column type=&#8221;3_4&#8243; specialty_columns=&#8221;3&#8243;][et_pb_row_inner admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_column_inner type=&#8221;4_4&#8243; saved_specialty_column_type=&#8221;3_4&#8243;][et_pb_slider show_arrows=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;3.0.97&#8243; db_height=&#8221;371px&#8221;][et_pb_slide heading=&#8221;Cybersecurity Audit&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; admin_title=&#8221;Audit&#8221; _builder_version=&#8221;3.0.97&#8243; header_font=&#8221;|700|||||||&#8221; background_image=&#8221;\/wp-content\/uploads\/digital-shield-banner-background.jpg&#8221; background_position=&#8221;center_left&#8221; text_orientation=&#8221;left&#8221; custom_padding=&#8221;|5%||40%&#8221; custom_padding_tablet=&#8221;|||30%&#8221; custom_padding_phone=&#8221;|||30%&#8221; custom_button=&#8221;off&#8221; button_on_hover=&#8221;on&#8221; text_shadow_style=&#8221;preset2&#8243;]<\/p>\n<ul style=\"list-style-type: disc;\">\n<li style=\"text-align: left;\">Assess IT policies and procedures<\/li>\n<li style=\"text-align: left;\">Diagnose the state of your firewall<\/li>\n<li style=\"text-align: left;\">Review the configuration of critical assets<\/li>\n<\/ul>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=&#8221;Row&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;3.0.97&#8243; background_image=&#8221;\/wp-content\/uploads\/woman-white-board-face.jpg&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_left&#8221;][et_pb_column_inner type=&#8221;1_2&#8243; saved_specialty_column_type=&#8221;3_4&#8243;][et_pb_image src=&#8221;\/wp-content\/uploads\/white-board-scribbles-firewall.png&#8221; align=&#8221;center&#8221; disabled_on=&#8221;on||&#8221; _builder_version=&#8221;3.0.97&#8243; max_width=&#8221;65%&#8221; \/][\/et_pb_column_inner][et_pb_column_inner type=&#8221;1_2&#8243; saved_specialty_column_type=&#8221;3_4&#8243;][et_pb_text _builder_version=&#8221;3.0.98&#8243; text_font_size=&#8221;18px&#8221; background_layout=&#8221;light&#8221;]<\/p>\n<p>With more than <strong>25 years<\/strong> experience in information technology, <strong>ConnecTalk Consulting Services<\/strong> includes :<\/p>\n<ul>\n<li>CISA and CRISC certified auditors<\/li>\n<li>specialists in IT security<\/li>\n<li>a range of appropriate tools<\/li>\n<\/ul>\n<p>Our multi-disciplinary team will evaluate your systems!<\/p>\n<p><i class=\"fa fa-shield\"><\/i> Vulnerability and weakness assessment<\/p>\n<p><i class=\"fa fa-search\"><\/i> Results analysis<\/p>\n<p><i class=\"fa fa-file-text-o\"><\/i> Detailed report with recommandations<\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243;][et_pb_sidebar area=&#8221;sidebar-1&#8243; _builder_version=&#8221;3.0.99&#8243; orientation=&#8221;right&#8221; show_border=&#8221;on&#8221; background_layout=&#8221;light&#8221; \/][\/et_pb_column][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assess IT policies and proceduresDiagnose the state of your firewallReview the configuration of critical assets With more than 25 years experience in information technology, ConnecTalk Consulting Services includes : CISA and CRISC certified auditors specialists in IT security a range of appropriate tools Our multi-disciplinary team will evaluate your systems! Vulnerability and weakness assessment Results [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":67,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-2566","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/pages\/2566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/comments?post=2566"}],"version-history":[{"count":6,"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/pages\/2566\/revisions"}],"predecessor-version":[{"id":2585,"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/pages\/2566\/revisions\/2585"}],"up":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/pages\/67"}],"wp:attachment":[{"href":"https:\/\/www.connectalk.com\/en\/wp-json\/wp\/v2\/media?parent=2566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}