{"id":4266,"date":"2023-06-01T20:34:06","date_gmt":"2023-06-01T20:34:06","guid":{"rendered":"https:\/\/spiffyitconsulting.com\/?page_id=4266"},"modified":"2023-06-01T23:15:59","modified_gmt":"2023-06-01T23:15:59","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/spiffyitconsulting.com\/?page_id=4266","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4266\" class=\"elementor elementor-4266\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b65fc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b65fc4\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a70bb14\" data-id=\"a70bb14\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb2b9e0 elementor-widget elementor-widget-int-breadcrumb\" data-id=\"fb2b9e0\" data-element_type=\"widget\" data-widget_type=\"int-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<div class=\"breadcrumb\">\r\n        <div class=\"breadcrumb__content text-center\">\r\n            <h2>Protecting Your Critical Systems<\/h2>\r\n            <ul class=\"bread-crumb clearfix ul_li_center\">\r\n                Spiffy IT Consulting<li class=\"breadcrumb-item\"><a href=\"https:\/\/spiffyitconsulting.com\/\">Home &nbsp;<\/a><\/li><li class=\"breadcrumb-item\"><a href=\"https:\/\/spiffyitconsulting.com\/?page_id=4266\"><\/a><\/li>            <\/ul>\r\n        <\/div>\r\n    <\/div>\r\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7060652 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7060652\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-caba9d8\" data-id=\"caba9d8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36e29e8 elementor-widget elementor-widget-image\" data-id=\"36e29e8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1250\" height=\"828\" src=\"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg\" class=\"attachment-full size-full wp-image-4269\" alt=\"\" srcset=\"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg 1250w, https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2-300x199.jpg 300w, https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2-1024x678.jpg 1024w, https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2-768x509.jpg 768w, https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2-600x397.jpg 600w\" sizes=\"(max-width: 1250px) 100vw, 1250px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48eb736 elementor-widget elementor-widget-heading\" data-id=\"48eb736\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af01f68 elementor-widget elementor-widget-heading\" data-id=\"af01f68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">With having worked with a number of different industries, that we have seen multiple types of cybersecurity popping up. A lot of them have similar requirements and understanding those requirements is half the battle. We have worked with NIST, HIPAA, ISO, PCI compliance and more. Everyone is just looking to protect their data and that's what we are here to do.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cf0e99 elementor-widget elementor-widget-heading\" data-id=\"4cf0e99\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Cybersecurity isn't always just about compliance. This can also includes services such as SIEM, Anti-Virus, Spam Filters, Cloud App Security, and more. Ask how we can protect each of these systems whether they are cloud services or systems you work on physically.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204b053 elementor-widget elementor-widget-int-fs-3\" data-id=\"204b053\" data-element_type=\"widget\" data-widget_type=\"int-fs-3.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\r\n   <div class=\"service-single__info-wrap\">\r\n        <div class=\"service-single__info\">\r\n            <div class=\"row\">\r\n                                <div class=\"col-lg-6 col-md-6\">\r\n                    <div class=\"service-single__info-item\">\r\n                        <div class=\"icon invite-text-gr-color\">\r\n                            <i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>                        <\/div>\r\n                        <div class=\"content\">\r\n                            <h4>Audit Software<\/h4>\r\n                            <p>With tools like Netwrix, a lot of compliance rules include auditing systems which you don't have time to do manually. We can automate them!<\/p>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                                <div class=\"col-lg-6 col-md-6\">\r\n                    <div class=\"service-single__info-item\">\r\n                        <div class=\"icon invite-text-gr-color\">\r\n                            <i aria-hidden=\"true\" class=\"far fa-file-code\"><\/i>                        <\/div>\r\n                        <div class=\"content\">\r\n                            <h4>SIEM Platform<\/h4>\r\n                            <p>Network Monitoring is the next advancement in cybersecurity. Learn how you can prevent and stop attacks happening on your network!<\/p>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                                <div class=\"col-lg-6 col-md-6\">\r\n                    <div class=\"service-single__info-item\">\r\n                        <div class=\"icon invite-text-gr-color\">\r\n                            <i aria-hidden=\"true\" class=\"fas fa-retweet\"><\/i>                        <\/div>\r\n                        <div class=\"content\">\r\n                            <h4>Multi-Factor Authentication<\/h4>\r\n                            <p>With the use of Duo, you can feel safe knowing that it takes multiple forms of authentication to access the systems. Wide application use as well.<\/p>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                                <div class=\"col-lg-6 col-md-6\">\r\n                    <div class=\"service-single__info-item\">\r\n                        <div class=\"icon invite-text-gr-color\">\r\n                            <i aria-hidden=\"true\" class=\"fas fa-shield-virus\"><\/i>                        <\/div>\r\n                        <div class=\"content\">\r\n                            <h4>Anti-Virus<\/h4>\r\n                            <p>Partnering with Trend Micro has allowed us to feel confident in securing systems and protecting them from attacks. Find out how Trend WFBS can help you!<\/p>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebc8c93 elementor-widget elementor-widget-heading\" data-id=\"ebc8c93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We Provide The Best Support<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f71497 elementor-widget elementor-widget-heading\" data-id=\"5f71497\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Our staff has decades of experience in each of their fields. From the technician and account managers, all the way up to the owner. We work together as a small cohesive unit to bring you solutions that are fast and effective. We will work effortlessly to make sure that your systems stay not only online and working, but at their best performance levels.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa55c28 elementor-widget elementor-widget-heading\" data-id=\"fa55c28\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Question<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3ccbb8 elementor-widget elementor-widget-int-accordion-item\" data-id=\"b3ccbb8\" data-element_type=\"widget\" data-widget_type=\"int-accordion-item.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<div class=\"accordion__wrap\">\r\n        <ul class=\"accordion_box clearfix\">\r\n                        <li class=\"accordion block \">\r\n                <div class=\"acc-btn\">\r\n                    Is cybersecurity expensive to have?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        Expensive is always dependent on the budget. We believe that our pricing per unit model is one of the most competitive in the industry and is a pricing model that as you continue to grow, will grow with you. This is like getting bulk pricing without having to buy in bulk!                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                       <li class=\"accordion block  active-block \">\r\n                <div class=\"acc-btn\">\r\n                    How flexible is cybersecurity?                <\/div>\r\n                <div class=\"acc_body  current \">\r\n                    <div class=\"content\">\r\n                        In Ohio, you must have best efforts and attempts in place in order to avoid being held liable for data leaks. You don't have to buy large amounts of equipment anymore or be a large corporation to implement. This can be done in phases to rollout rather than load up on upfront costs.                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                       <li class=\"accordion block \">\r\n                <div class=\"acc-btn\">\r\n                    Does this affect my ability for insurance?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        This is something you want to speak to your insurance agent about specifically. When it comes to cybersecurity insurance, there are requirements to be met in order to maintain coverage and that we can help you meet the requirements that your insurance agent has set forth.                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                   <\/ul>\r\n    <\/div>\r\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ad0c556\" data-id=\"ad0c556\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5500108 elementor-widget elementor-widget-heading\" data-id=\"5500108\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> Search<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0074c24 widget__inner elementor-widget elementor-widget-wp-widget-search\" data-id=\"0074c24\" data-element_type=\"widget\" data-widget_type=\"wp-widget-search.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"widget__inner\"><div class=\"form-group\"><form role=\"search\" method=\"get\" id=\"searchform\" class=\"widget__search\" action=\"https:\/\/spiffyitconsulting.com\/\" >\n    <input class=\"form_control\" placeholder=\"Search...\" type=\"text\"  value=\"\" name=\"s\" id=\"s\" \/>\n    <button type=\"submit\"><span class=\"icon fa fa-search\"><\/span><\/button>\n    <\/form><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79a4514 elementor-widget elementor-widget-heading\" data-id=\"79a4514\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e4981a widget_categories elementor-widget elementor-widget-int-link-item\" data-id=\"0e4981a\" data-element_type=\"widget\" data-widget_type=\"int-link-item.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<div class=\"widget__inner\">\r\n        <ul class=\"widget__category list-unstyled\">\r\n                            <li><a class=\"\" href=\"\/services\/network-services\/\">Network Services<i class=\"far fa-chevron-double-right\"><\/i><\/a><\/li>\r\n                            <li><a class=\"\" href=\"\/services\/managed-services\/\">IT Management<i class=\"far fa-chevron-double-right\"><\/i><\/a><\/li>\r\n                            <li><a class=\"\" href=\"\/services\/backup-and-recovery\/\">Backup and Recovery<i class=\"far fa-chevron-double-right\"><\/i><\/a><\/li>\r\n                            <li><a class=\"\" href=\"\/services\/project-management\/\">Project Management<i class=\"far fa-chevron-double-right\"><\/i><\/a><\/li>\r\n                            <li><a class=\"\" href=\"\/services\/custom-computers\/\">Custom Computers<i class=\"far fa-chevron-double-right\"><\/i><\/a><\/li>\r\n                            <li><a class=\"active\" href=\"\/services\/cybersecurity\/\">Cybersecurity<i class=\"far fa-chevron-double-right\"><\/i><\/a><\/li>\r\n                    <\/ul>\r\n    <\/div>\r\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eed4479 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eed4479\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3ec0724\" data-id=\"3ec0724\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-520bb29 elementor-widget elementor-widget-heading\" data-id=\"520bb29\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">+1.937.874.5144<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38a834e elementor-widget elementor-widget-heading\" data-id=\"38a834e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monday \u2013 Friday: 24 x 5 <br>24\/7 Emergency Service<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a3d4a2 elementor-widget elementor-widget-int-btn\" data-id=\"4a3d4a2\" data-element_type=\"widget\" data-widget_type=\"int-btn.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"text-center\">\r\n        <a href=\"\/contact\/\" target=\"_blank\" rel=\"nofollow\" class=\"thm-btn thm-btn__two\">\r\n            <span class=\"btn-anim-wrap\">\r\n                <span class=\"button-text\">Contact Us<\/span>\r\n                <span class=\"button-text\">Contact Us<\/span>\r\n            <\/span>\r\n            <i aria-hidden=\"true\" class=\"flaticon flaticon-top-right\"><\/i>        <\/a>\r\n    <\/div>\r\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Protecting Your Critical Systems Home &nbsp; Cybersecurity With having worked with a number of different industries, that we have seen multiple types of cybersecurity popping up. A lot of them have similar requirements and understanding those requirements is half the battle. We have worked with NIST, HIPAA, ISO, PCI compliance and more. Everyone is just [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"invite-template.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-4266","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - Spiffy IT Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/spiffyitconsulting.com\/?page_id=4266\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Spiffy IT Consulting\" \/>\n<meta property=\"og:description\" content=\"Protecting Your Critical Systems Home &nbsp; Cybersecurity With having worked with a number of different industries, that we have seen multiple types of cybersecurity popping up. A lot of them have similar requirements and understanding those requirements is half the battle. We have worked with NIST, HIPAA, ISO, PCI compliance and more. Everyone is just [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/spiffyitconsulting.com\/?page_id=4266\" \/>\n<meta property=\"og:site_name\" content=\"Spiffy IT Consulting\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-01T23:15:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266\",\"url\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266\",\"name\":\"Cybersecurity - Spiffy IT Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/spiffyitconsulting.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266#primaryimage\"},\"image\":{\"@id\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266#primaryimage\"},\"thumbnailUrl\":\"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg\",\"datePublished\":\"2023-06-01T20:34:06+00:00\",\"dateModified\":\"2023-06-01T23:15:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/spiffyitconsulting.com\/?page_id=4266\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266#primaryimage\",\"url\":\"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg\",\"contentUrl\":\"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg\",\"width\":1250,\"height\":828},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/spiffyitconsulting.com\/?page_id=4266#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/spiffyitconsulting.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/spiffyitconsulting.com\/?page_id=8\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/spiffyitconsulting.com\/#website\",\"url\":\"https:\/\/spiffyitconsulting.com\/\",\"name\":\"Spiffy IT Consulting\",\"description\":\"Advancing Your IT Forward\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/spiffyitconsulting.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Spiffy IT Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/spiffyitconsulting.com\/?page_id=4266","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Spiffy IT Consulting","og_description":"Protecting Your Critical Systems Home &nbsp; Cybersecurity With having worked with a number of different industries, that we have seen multiple types of cybersecurity popping up. A lot of them have similar requirements and understanding those requirements is half the battle. We have worked with NIST, HIPAA, ISO, PCI compliance and more. Everyone is just [&hellip;]","og_url":"https:\/\/spiffyitconsulting.com\/?page_id=4266","og_site_name":"Spiffy IT Consulting","article_modified_time":"2023-06-01T23:15:59+00:00","og_image":[{"url":"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/spiffyitconsulting.com\/?page_id=4266","url":"https:\/\/spiffyitconsulting.com\/?page_id=4266","name":"Cybersecurity - Spiffy IT Consulting","isPartOf":{"@id":"https:\/\/spiffyitconsulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/spiffyitconsulting.com\/?page_id=4266#primaryimage"},"image":{"@id":"https:\/\/spiffyitconsulting.com\/?page_id=4266#primaryimage"},"thumbnailUrl":"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg","datePublished":"2023-06-01T20:34:06+00:00","dateModified":"2023-06-01T23:15:59+00:00","breadcrumb":{"@id":"https:\/\/spiffyitconsulting.com\/?page_id=4266#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/spiffyitconsulting.com\/?page_id=4266"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/spiffyitconsulting.com\/?page_id=4266#primaryimage","url":"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg","contentUrl":"https:\/\/spiffyitconsulting.com\/wp-content\/uploads\/2023\/06\/AdobeStock_186885581-2.jpg","width":1250,"height":828},{"@type":"BreadcrumbList","@id":"https:\/\/spiffyitconsulting.com\/?page_id=4266#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/spiffyitconsulting.com\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/spiffyitconsulting.com\/?page_id=8"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/spiffyitconsulting.com\/#website","url":"https:\/\/spiffyitconsulting.com\/","name":"Spiffy IT Consulting","description":"Advancing Your IT Forward","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/spiffyitconsulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/pages\/4266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4266"}],"version-history":[{"count":10,"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/pages\/4266\/revisions"}],"predecessor-version":[{"id":4361,"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/pages\/4266\/revisions\/4361"}],"up":[{"embeddable":true,"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=\/wp\/v2\/pages\/8"}],"wp:attachment":[{"href":"https:\/\/spiffyitconsulting.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}