{"id":1186,"date":"2025-11-28T09:46:01","date_gmt":"2025-11-28T09:46:01","guid":{"rendered":"https:\/\/startersites.io\/elementor\/codespot\/?page_id=1186"},"modified":"2026-03-10T21:41:10","modified_gmt":"2026-03-11T02:41:10","slug":"services","status":"publish","type":"page","link":"https:\/\/onyxecure.com\/es\/services\/","title":{"rendered":"Servicios"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1186\" class=\"elementor elementor-1186\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d0399a e-flex e-con-boxed e-con e-parent\" data-id=\"4d0399a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a09b255 e-con-full e-flex e-con e-child\" data-id=\"a09b255\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ba30dd elementor-widget elementor-widget-heading\" data-id=\"3ba30dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IT &amp; Cybersecurity Services for Secure Business Growth<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7255df5 elementor-widget elementor-widget-text-editor\" data-id=\"7255df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>From security assessments to infrastructure optimization, we deliver reliable technology and cybersecurity solutions that protect your systems, strengthen operations, and support long-term business success.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad2e4f1 e-con-full e-flex e-con e-child\" data-id=\"ad2e4f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c5a4c32 e-con-full e-flex e-con e-child\" data-id=\"c5a4c32\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54f159b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"54f159b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/www.youtube.com\/watch?v=rLvZxInyS-8\" target=\"_blank\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 55 55\"><path fill=\"#fff\" d=\"M27.5 0C12.312 0 0 12.312 0 27.5S12.312 55 27.5 55 55 42.688 55 27.5 42.688 0 27.5 0Zm10.349 29.61L23.865 38.6C22.195 39.673 20 38.474 20 36.49V18.51c0-1.984 2.195-3.183 3.865-2.11l13.984 8.99c1.536.988 1.536 3.233 0 4.22Z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de137a6 e-con-full e-flex e-con e-child\" data-id=\"de137a6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e40c94a elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e40c94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/www.youtube.com\/watch?v=rLvZxInyS-8\" target=\"_blank\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 55 55\"><path fill=\"#fff\" d=\"M27.5 0C12.312 0 0 12.312 0 27.5S12.312 55 27.5 55 55 42.688 55 27.5 42.688 0 27.5 0Zm10.349 29.61L23.865 38.6C22.195 39.673 20 38.474 20 36.49V18.51c0-1.984 2.195-3.183 3.865-2.11l13.984 8.99c1.536.988 1.536 3.233 0 4.22Z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a4c7fe e-con-full ct-backdrop-s ct-border-animation ct-boxshadow e-flex e-con e-child\" data-id=\"2a4c7fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d4318b elementor-widget elementor-widget-heading\" data-id=\"1d4318b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Built for Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9d868f elementor-widget elementor-widget-text-editor\" data-id=\"d9d868f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Strengthening your organization with reliable cybersecurity strategies designed to protect systems, data, and digital operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ec0ae2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8ec0ae2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-936b108 elementor-widget elementor-widget-heading\" data-id=\"936b108\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Reliable by Design<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-890cff4 elementor-widget elementor-widget-text-editor\" data-id=\"890cff4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IT infrastructures built for resilience, stability, and secure performance across modern business environments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2286e1b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2286e1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46e2643 elementor-widget elementor-widget-heading\" data-id=\"46e2643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Future-Ready Technology<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55947e5 elementor-widget elementor-widget-text-editor\" data-id=\"55947e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Solutions designed to evolve with emerging technologies, helping your organization stay secure, efficient, and prepared for future challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9cf1a elementor-tablet-align-center elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"ce9cf1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get started now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc55b5c e-flex e-con-boxed e-con e-parent\" data-id=\"fc55b5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e6f6ff0 e-con-full e-flex e-con e-child\" data-id=\"e6f6ff0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f1102cd e-con-full e-flex e-con e-child\" data-id=\"f1102cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e7747a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1e7747a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protecting and Strengthening Modern Digital Environments<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c05f96a elementor-widget elementor-widget-text-editor\" data-id=\"c05f96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Protect your systems and optimize your technology environment with scalable cybersecurity and IT solutions designed for performance, resilience, and long-term operational success.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-479156f e-grid e-con-full e-con e-child\" data-id=\"479156f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9df842d e-con-full e-flex e-con e-child\" data-id=\"9df842d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db3d00b elementor-widget elementor-widget-heading\" data-id=\"db3d00b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Solutions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a932575 elementor-widget elementor-widget-text-editor\" data-id=\"a932575\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Protect your organization with tailored cybersecurity strategies designed to identify vulnerabilities, reduce risk, and strengthen your digital defenses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c85f56 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"2c85f56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More Information<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-345a55a e-con-full e-flex e-con e-child\" data-id=\"345a55a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df7d772 elementor-widget elementor-widget-heading\" data-id=\"df7d772\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Secure IT Infrastructure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91d49c1 elementor-widget elementor-widget-text-editor\" data-id=\"91d49c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Build stable, resilient, and secure technology environments that support reliable operations and protect critical business systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f814a40 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"f814a40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More Information<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7717406 e-con-full e-flex e-con e-child\" data-id=\"7717406\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2c381ba e-con-full e-flex e-con e-child\" data-id=\"2c381ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e8ad673 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"e8ad673\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1e93a3 elementor-widget elementor-widget-heading\" data-id=\"b1e93a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Core Security &amp; Technology Capabilities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b3d000 elementor-widget elementor-widget-text-editor\" data-id=\"5b3d000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ol><li>Cybersecurity Risk &amp; Vulnerability Assessments<\/li><li>Threat Detection &amp; Security Monitoring<\/li><li>Cloud &amp; Infrastructure Security<\/li><li>Identity &amp; Access Management<\/li><li>AI-Assisted Security Analysis<\/li><li>Security Audits &amp; Compliance Support<\/li><\/ol><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ab8b04 e-con-full ct-backdrop-s ct-boxshadow ct-border-animation elementor-hidden-mobile e-flex e-con e-child\" data-id=\"2ab8b04\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c6ff03 e-con-full ct-backdrop-s ct-border-animation ct-boxshadow e-flex e-con e-child\" data-id=\"8c6ff03\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c52629f e-flex e-con-boxed e-con e-parent\" data-id=\"c52629f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2c858de e-grid e-con-full e-con e-child\" data-id=\"2c858de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ef8119 elementor-widget elementor-widget-heading\" data-id=\"6ef8119\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity &amp; IT Services Designed to Protect and Support Your Business<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e38552 elementor-widget elementor-widget-text-editor\" data-id=\"2e38552\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We provide cybersecurity and IT consulting services that help small and medium-sized businesses protect their systems, reduce operational risks, and maintain reliable technology environments. Our services combine practical experience with internationally recognized standards to deliver solutions that support secure and resilient business operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c2cd28 e-grid e-con-full e-con e-child\" data-id=\"6c2cd28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-107b4a1 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"107b4a1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6236c5a elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"6236c5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M7.69 11.965V4.31A4.315 4.315 0 0 1 12 0a4.315 4.315 0 0 1 4.31 4.31V5.41a1.014 1.014 0 1 1-2.028 0V4.31A2.285 2.285 0 0 0 12 2.028 2.284 2.284 0 0 0 9.72 4.31v7.655a1.014 1.014 0 0 1-2.029 0m7.606-.977c-.56 0-1.014.454-1.014 1.014v7.688A2.285 2.285 0 0 1 12 21.972 2.285 2.285 0 0 1 9.72 19.69v-1.115a1.014 1.014 0 1 0-2.029 0v1.115A4.315 4.315 0 0 0 12 24a4.314 4.314 0 0 0 4.31-4.31v-7.688c0-.56-.453-1.014-1.014-1.014m-2.282 4.308c0-.56-.454-1.014-1.014-1.014H4.301c-1.253 0-2.273-1.024-2.273-2.282s1.02-2.282 2.273-2.282h1.101a1.014 1.014 0 0 0 0-2.028h-1.1a4.31 4.31 0 0 0 0 8.62H12c.56 0 1.014-.453 1.014-1.014m6.67-7.606H12a1.014 1.014 0 0 0 0 2.028h7.684c1.262 0 2.288 1.024 2.288 2.282s-1.026 2.282-2.288 2.282h-1.056a1.013 1.013 0 1 0 0 2.028h1.056C22.064 16.31 24 14.376 24 12s-1.936-4.31-4.316-4.31\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49c363b elementor-widget elementor-widget-heading\" data-id=\"49c363b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Governance, Risk, Compliance (GRC) &amp; Audit Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffb2591 elementor-widget elementor-widget-text-editor\" data-id=\"ffb2591\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Risk Management<\/p><p>Security Policies<\/p><p>ISO\/IEC 27001 Consulting &amp; Internal Audits<\/p><p>ISO\/IEC 42001 (AI Management System) Consulting<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d56e333 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"d56e333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64c5c34 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"64c5c34\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07ef1e6 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"07ef1e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M18 10.714V6c0-3.533-2.468-6-6-6S6 2.467 6 6v4.714A7.97 7.97 0 0 0 4 16c0 4.411 3.589 8 8 8s8-3.589 8-8a7.97 7.97 0 0 0-2-5.286M8 6c0-2.43 1.57-4 4-4s4 1.57 4 4v3.074C14.822 8.39 13.456 8 12 8s-2.823.39-4 1.074zm4 16c-3.309 0-6-2.691-6-6s2.691-6 6-6 6 2.692 6 6-2.691 6-6 6m2-7c0 .74-.402 1.386-1 1.732V19h-2v-2.268A2 2 0 1 1 14 15\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd5af66 elementor-widget elementor-widget-heading\" data-id=\"fd5af66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security Operations &amp; SOC Advisory Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5b8157 elementor-widget elementor-widget-text-editor\" data-id=\"c5b8157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>SOC Tier 1\u20132 Advisory &amp; Setup<\/p><p>SIEM Implementation &amp; Optimization<\/p><p>EDR\/XDR Operations Support<\/p><p>Incident Response Playbook Development<\/p><p>Threat Detection &amp; Log Correlation Design<\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fee6683 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"fee6683\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80a59ff e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"80a59ff\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6895da4 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"6895da4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"m12.593 12.82 4.518-4.518V12a1 1 0 1 0 2 0V5.888q-.001-.205-.076-.384a1 1 0 0 0-.208-.314v-.001l-.004-.003-.002-.002q0 0-.003-.003l-.002-.002c-.005-.005-.003-.002-.003-.002l-.001-.003h-.002a1 1 0 0 0-.699-.286H12a1 1 0 0 0 0 2h3.697l-4.518 4.518-.06-.03C10.384 11 9.569 11 8.09 11H4.91c-1.479 0-2.294 0-3.03.375A3.42 3.42 0 0 0 .376 12.88C0 13.617 0 14.433 0 15.911v3.178c0 1.479 0 2.293.376 3.03a3.42 3.42 0 0 0 1.504 1.505C2.617 24 3.432 24 4.911 24H8.09c1.479 0 2.294 0 3.03-.376a3.42 3.42 0 0 0 1.506-1.505c.375-.737.375-1.551.375-3.03v-3.178c0-1.478 0-2.294-.375-3.03zM11 19.09c0 1.13 0 1.812-.158 2.121-.14.275-.357.492-.63.632C9.901 22 9.22 22 8.088 22H4.91c-1.13 0-1.813 0-2.122-.157a1.44 1.44 0 0 1-.631-.632C2 20.901 2 20.22 2 19.09v-3.178c0-1.13 0-1.813.158-2.123a1.43 1.43 0 0 1 .63-.63c.31-.159.992-.159 2.123-.159H8.09c1.13 0 1.813 0 2.123.158.273.14.491.358.63.631.158.31.158.993.158 2.123zM24 6.865v10.267c0 2.211 0 3.32-.509 4.318a4.64 4.64 0 0 1-2.039 2.04c-.998.51-2.107.51-4.318.51h-.245a1 1 0 1 1 0-2h.245c1.83 0 2.84 0 3.409-.292.507-.258.91-.66 1.166-1.166.291-.57.291-1.579.291-3.41V6.866c0-1.831 0-2.84-.29-3.41a2.66 2.66 0 0 0-1.166-1.166c-.57-.29-1.58-.29-3.41-.29H6.867c-1.832 0-2.84 0-3.411.29-.505.258-.908.66-1.165 1.166C2 4.026 2 5.035 2 6.866v.245a1 1 0 0 1-2 0v-.245c0-2.21 0-3.32.508-4.318a4.64 4.64 0 0 1 2.04-2.04C3.546 0 4.656 0 6.867 0h10.267c2.21 0 3.32 0 4.318.508a4.64 4.64 0 0 1 2.04 2.04C24 3.546 24 4.656 24 6.866\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbb2637 elementor-widget elementor-widget-heading\" data-id=\"dbb2637\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cloud &amp; Endpoint Security Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10ba4a1 elementor-widget elementor-widget-text-editor\" data-id=\"10ba4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 &amp; Azure Security Hardening<\/p><p>Endpoint Security Management<\/p><p>Zero Trust Readiness Assessments<\/p><p>Mobile Device Management (MDM) Security<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1aeb5a elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"f1aeb5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac2df46 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"ac2df46\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dffda5 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"5dffda5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M22.98 10.333 13.683 1.02A3.44 3.44 0 0 0 10.78.034l-8.32 1.207a1.45 1.45 0 0 0-1.218 1.218L.035 10.778c-.155 1.047.214 2.133.986 2.907l9.31 9.294a3.44 3.44 0 0 0 2.442 1.02c.862 0 1.663-.327 2.264-.928l8.035-8.035a3.17 3.17 0 0 0 .927-2.363 3.44 3.44 0 0 0-1.019-2.34m-1.322 3.29-8.035 8.034c-.23.23-.536.331-.892.342a1.45 1.45 0 0 1-.985-.435L2.435 12.27a1.43 1.43 0 0 1-.421-1.203L3.16 3.16l7.907-1.146h.002c.427-.06.874.094 1.2.42l9.296 9.313c.27.269.424.619.435.984.01.344-.112.66-.342.891M8.945 4.888a4.03 4.03 0 0 0-2.871 1.185 4.063 4.063 0 0 0 0 5.74c.791.792 1.83 1.187 2.87 1.187s2.08-.395 2.87-1.186a4.064 4.064 0 0 0 0-5.74 4.03 4.03 0 0 0-2.87-1.186M10.4 10.4a2.06 2.06 0 0 1-2.913 0 2.06 2.06 0 0 1 0-2.913c.773-.773 2.14-.774 2.913 0 .802.803.802 2.11 0 2.913\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7599dd6 elementor-widget elementor-widget-heading\" data-id=\"7599dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vulnerability Management &amp; Technical Security Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c39e28f elementor-widget elementor-widget-text-editor\" data-id=\"c39e28f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Vulnerability Scanning &amp; Reporting<\/p><p>Risk-Based Remediation Guidance<\/p><p>Firewall, WAF, IDS\/IPS Review<\/p><p>Network Security Architecture Review<\/p><p>Secure Configuration Reviews (Windows\/Linux\/macOS)<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-202e94d elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"202e94d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df92630 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"df92630\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14d3b60 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"14d3b60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M18.14 11.066a1.6 1.6 0 0 0 1.473-.189c.432-.3.69-.794.69-1.32v-4.86a1 1 0 0 0-1-1h-4.395q.095-.389.083-.797A3 3 0 0 0 12.115.002a2.98 2.98 0 0 0-2.19.834 2.97 2.97 0 0 0-.917 2.156q0 .36.084.705H4.697a1 1 0 0 0-1 1v4.86a1.61 1.61 0 0 0 2.165 1.508.996.996 0 0 1 1.331.854.99.99 0 0 1-.262.752 1 1 0 0 1-1.07.256 1.61 1.61 0 0 0-2.163 1.51v4.866a1 1 0 0 0 1 1h4.305a3 3 0 0 0-.065.634c0 .82.32 1.59.9 2.17A3.05 3.05 0 0 0 12 24h.01a3.053 3.053 0 0 0 3.049-2.937q.015-.39-.063-.76h4.306a1 1 0 0 0 1-1v-4.866a1.61 1.61 0 0 0-2.164-1.51 1.1 1.1 0 0 1-.446.056.996.996 0 0 1-.886-.908.99.99 0 0 1 .262-.753 1.01 1.01 0 0 1 1.07-.256m-.643 3.908q.407.04.806-.028v3.357h-3.836a1.607 1.607 0 0 0-1.485 2.226q.088.214.08.451v.002A1.07 1.07 0 0 1 12.005 22c-.276-.03-.553-.11-.755-.31a1.05 1.05 0 0 1-.233-1.156 1.62 1.62 0 0 0-.151-1.521 1.6 1.6 0 0 0-1.333-.71H5.697v-3.358a3.04 3.04 0 0 0 2.7-.913 3 3 0 0 0 .79-2.261A2.98 2.98 0 0 0 6.501 9.02a3 3 0 0 0-.804.027v-3.35h3.945c.553 0 1.06-.279 1.358-.745a1.6 1.6 0 0 0 .101-1.54 1 1 0 0 1-.093-.42.994.994 0 0 1 1.031-.99c.51.018.938.449.953.958a1 1 0 0 1-.092.451 1.59 1.59 0 0 0 .099 1.536c.298.47.808.75 1.363.75h3.94v3.35a3.03 3.03 0 0 0-2.698.913 3 3 0 0 0-.792 2.263 2.98 2.98 0 0 0 2.685 2.75\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b513020 elementor-widget elementor-widget-heading\" data-id=\"b513020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security Awareness &amp; Training Programs<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a1fcaa elementor-widget elementor-widget-text-editor\" data-id=\"9a1fcaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security Awareness Training<\/p><p>Phishing Program Management<\/p><p>Executive &amp; Board-Level Security Briefings<\/p><p>IT &amp; SOC Staff Upskilling Workshops<\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7ece53 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"e7ece53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5f9840 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"a5f9840\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f1e782 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"5f1e782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M12 0C5.383 0 0 5.383 0 12s5.383 12 12 12 12-5.383 12-12S18.617 0 12 0m0 22C6.486 22 2 17.514 2 12S6.486 2 12 2s10 4.486 10 10-4.486 10-10 10m8.458-10a1 1 0 1 1-2 0c0-3.56-2.897-6.458-6.458-6.458S5.542 8.44 5.542 12a1 1 0 1 1-2 0c0-4.664 3.794-8.458 8.458-8.458S20.458 7.336 20.458 12m-5.594 7.458a1 1 0 0 1-1 1h-3.728a1 1 0 1 1 0-2h3.728a1 1 0 0 1 1 1m1.798-8.391a1 1 0 0 1 0 1.414l-3.955 3.955a.997.997 0 0 1-1.414 0 1 1 0 0 1 0-1.415l3.955-3.954a1 1 0 0 1 1.414 0\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bce764c elementor-widget elementor-widget-heading\" data-id=\"bce764c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">AI &amp; Cybersecurity Advisory (Emerging, High-Value)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38ee2b0 elementor-widget elementor-widget-text-editor\" data-id=\"38ee2b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Secure AI Adoption Consulting<\/p><p>AI Risk &amp; Compliance Assessments<\/p><p>AI Policy &amp; Governance Design<\/p><p>AI Supply Chain Risk Reviews<\/p><p>AI Security Awareness Training<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a44c60a elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"a44c60a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f13e998 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"f13e998\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a47ad37 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"a47ad37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M22 12.746v-7.2c0-.99-.806-1.796-1.797-1.796h-5.942v4.907h3.926a1 1 0 1 1 0 2h-4.926a1 1 0 0 1-1-1V3.75H7.773v6.192a1 1 0 0 1-2 0V3.75H3.796C2.806 3.75 2 4.556 2 5.547v12.906c0 .991.806 1.797 1.796 1.797h4.922v-5.504H6.773a1 1 0 1 1 0-2h5.89a1 1 0 1 1 0 2h-1.945v5.504h9.485c.991 0 1.797-.806 1.797-1.797 0-.553.447-1.022 1-1.022s1 .424 1 .976c0 2.14-1.703 3.843-3.797 3.843H3.796A3.8 3.8 0 0 1 0 18.453V5.547A3.8 3.8 0 0 1 3.796 1.75h16.427c.007 0 .012.004.02.004A3.8 3.8 0 0 1 24 5.547v8.2a1 1 0 0 1-1 1h-4.36a1 1 0 1 1 0-2z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7515055 elementor-widget elementor-widget-heading\" data-id=\"7515055\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">IT Service Management &amp; Process Consulting<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a1758a elementor-widget elementor-widget-text-editor\" data-id=\"0a1758a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IT Audits<\/p><p>Endpoint Hardening<\/p><p>Backup &amp; Disaster Recovery<\/p><p>VPN &amp; Secure Remote Access<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d01b695 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"d01b695\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-154a246 e-con-full ct-backdrop-s ct-boxshadow e-flex e-con e-child\" data-id=\"154a246\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ef97ed elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"6ef97ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M23 2.623h-4.03l-4.697-1.55a2.4 2.4 0 0 0-.744-.12H8.087c-.633 0-1.228.246-1.675.693L.786 7.272C.28 7.779 0 8.452 0 9.169s.28 1.391.786 1.898 1.18.786 1.897.786 1.39-.28 1.89-.778L7.36 8.348a4.14 4.14 0 0 0 3.086 1.407l1.02.009.124.116a6.22 6.22 0 0 0 7.16.983c.251-.132.528-.202.802-.202H23a1 1 0 0 0 1-1V3.623a1 1 0 0 0-1-1m-1 6.038h-2.45c-.596 0-1.196.15-1.732.432a4.22 4.22 0 0 1-4.856-.667l-.41-.386a1 1 0 0 0-.678-.273l-1.416-.012a2.15 2.15 0 0 1-1.89-1.147h4.25a1 1 0 1 0 0-2H7.32a1 1 0 0 0-1 1q.001.446.092.868L3.167 9.653a.684.684 0 0 1-.967-.966L7.826 3.06a.37.37 0 0 1 .26-.108h5.443q.061 0 .116.018l4.85 1.602q.152.05.314.05H22zm-2.572 4.265-2.786 2.726a4.14 4.14 0 0 0-3.087-1.407l-1.02-.009-.125-.117a6.22 6.22 0 0 0-7.157-.982 1.75 1.75 0 0 1-.803.202H1a1 1 0 0 0-1 1v6.038a1 1 0 0 0 1 1h4.031l4.696 1.55q.361.12.744.12h5.442a2.35 2.35 0 0 0 1.675-.693l5.626-5.626c.507-.507.786-1.181.786-1.898s-.28-1.39-.786-1.896a2.68 2.68 0 0 0-3.786-.008m2.372 2.387-5.626 5.626a.37.37 0 0 1-.26.109H10.47a.4.4 0 0 1-.117-.019l-4.849-1.601a1 1 0 0 0-.313-.051H2v-4.038h2.45c.594 0 1.194-.149 1.733-.43a4.22 4.22 0 0 1 4.855.665l.41.387c.183.173.425.27.678.272l1.416.012c.818.004 1.53.469 1.89 1.148h-4.249a1 1 0 1 0 0 2h5.497a1 1 0 0 0 1-1q-.001-.448-.092-.868l3.246-3.177a.683.683 0 0 1 .966.966\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2777541 elementor-widget elementor-widget-heading\" data-id=\"2777541\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Productized Consulting Packages (Highly Recommended)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06d32d8 elementor-widget elementor-widget-text-editor\" data-id=\"06d32d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity Health Check<\/p><p>ISO 27001 Readiness Program<\/p><p>SOC-in-a-Box for SMBs<\/p><p>Microsoft 365 Security Baseline<\/p><p>AI Governance Starter Kit<\/p><p>Security Awareness Program (Annual)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39db63 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"e39db63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5efee4e e-flex e-con-boxed e-con e-parent\" data-id=\"5efee4e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd767d0 e-con-full ct-boxshadow e-flex e-con e-child\" data-id=\"dd767d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f920fb3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f920fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let\u2019s Secure and Strengthen Your Digital Environment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85bf3f6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"85bf3f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Partner with experienced IT and cybersecurity professionals dedicated to protecting your systems, optimizing your infrastructure, and helping your organization operate securely and efficiently.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eae4998 elementor-tablet-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"eae4998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M12 0C5.373 0 0 5.373 0 12s5.373 12 12 12 12-5.373 12-12S18.627 0 12 0Zm6.226 9.499-7.637 7.636a1.09 1.09 0 0 1-1.542 0l-3.273-3.273a1.09 1.09 0 0 1 1.543-1.542l2.501 2.501 6.865-6.865a1.09 1.09 0 0 1 1.543 1.543Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tailored cybersecurity and IT solutions for businesses of all sizes<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M12 0C5.373 0 0 5.373 0 12s5.373 12 12 12 12-5.373 12-12S18.627 0 12 0Zm6.226 9.499-7.637 7.636a1.09 1.09 0 0 1-1.542 0l-3.273-3.273a1.09 1.09 0 0 1 1.543-1.542l2.501 2.501 6.865-6.865a1.09 1.09 0 0 1 1.543 1.543Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Collaborative approach with clear communication and practical results<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\"><path d=\"M12 0C5.373 0 0 5.373 0 12s5.373 12 12 12 12-5.373 12-12S18.627 0 12 0Zm6.226 9.499-7.637 7.636a1.09 1.09 0 0 1-1.542 0l-3.273-3.273a1.09 1.09 0 0 1 1.543-1.542l2.501 2.501 6.865-6.865a1.09 1.09 0 0 1 1.543 1.543Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Secure, scalable, and reliable technology strategies built for long-term success<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11e78eb elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"11e78eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Your Project<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>IT &amp; Cybersecurity Services for Secure Business Growth From security assessments to infrastructure optimization, we deliver reliable technology and cybersecurity solutions that protect your systems, strengthen operations, and support long-term business success. Built for Security Strengthening your organization with reliable cybersecurity strategies designed to protect systems, data, and digital operations. Reliable by Design IT infrastructures [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1186","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","vertical_spacing_source":"custom","content_area_spacing":"none","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/pages\/1186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/comments?post=1186"}],"version-history":[{"count":30,"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/pages\/1186\/revisions"}],"predecessor-version":[{"id":1384,"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/pages\/1186\/revisions\/1384"}],"wp:attachment":[{"href":"https:\/\/onyxecure.com\/es\/wp-json\/wp\/v2\/media?parent=1186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}