{"id":44,"date":"2023-05-16T20:35:17","date_gmt":"2023-05-16T20:35:17","guid":{"rendered":"https:\/\/pensec.tech\/?page_id=44"},"modified":"2023-05-16T20:35:18","modified_gmt":"2023-05-16T20:35:18","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/pensec.tech\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n

We specialize in providing end-to-end cyber security solutions that are designed to protect businesses against data breaches and other threats. We can assess your organization\u2019s security posture and provide customized solutions that ensure compliance with industry regulations. Our team of experts use the latest technologies to detect and mitigate cyber threats. We also offer managed services, such as a security operations center, to help businesses monitor their networks\u00a0and\u00a0systems.<\/p>\n","protected":false},"excerpt":{"rendered":"

We specialize in providing end-to-end cyber security solutions that are designed to protect businesses against data breaches and other threats. We can assess your organization\u2019s security posture and provide customized solutions that ensure compliance with industry regulations. Our team of experts use the latest technologies to detect and mitigate cyber threats. We also offer managed […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"\nCyber Security - PST<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pensec.tech\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - PST\" \/>\n<meta property=\"og:description\" content=\"We specialize in providing end-to-end cyber security solutions that are designed to protect businesses against data breaches and other threats. We can assess your organization\u2019s security posture and provide customized solutions that ensure compliance with industry regulations. Our team of experts use the latest technologies to detect and mitigate cyber threats. We also offer managed […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pensec.tech\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PST\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T20:35:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/PSTLogoNew1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pensec.tech\/cyber-security\/\",\"url\":\"https:\/\/pensec.tech\/cyber-security\/\",\"name\":\"Cyber Security - PST\",\"isPartOf\":{\"@id\":\"https:\/\/pensec.tech\/#website\"},\"datePublished\":\"2023-05-16T20:35:17+00:00\",\"dateModified\":\"2023-05-16T20:35:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pensec.tech\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pensec.tech\/cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pensec.tech\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pensec.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pensec.tech\/#website\",\"url\":\"https:\/\/pensec.tech\/\",\"name\":\"PST\",\"description\":\"PenSecTech\",\"publisher\":{\"@id\":\"https:\/\/pensec.tech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pensec.tech\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pensec.tech\/#organization\",\"name\":\"PST\",\"url\":\"https:\/\/pensec.tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pensec.tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png\",\"contentUrl\":\"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png\",\"width\":512,\"height\":512,\"caption\":\"PST\"},\"image\":{\"@id\":\"https:\/\/pensec.tech\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - PST","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pensec.tech\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - PST","og_description":"We specialize in providing end-to-end cyber security solutions that are designed to protect businesses against data breaches and other threats. We can assess your organization\u2019s security posture and provide customized solutions that ensure compliance with industry regulations. Our team of experts use the latest technologies to detect and mitigate cyber threats. We also offer managed […]","og_url":"https:\/\/pensec.tech\/cyber-security\/","og_site_name":"PST","article_modified_time":"2023-05-16T20:35:18+00:00","og_image":[{"width":650,"height":428,"url":"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/PSTLogoNew1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pensec.tech\/cyber-security\/","url":"https:\/\/pensec.tech\/cyber-security\/","name":"Cyber Security - PST","isPartOf":{"@id":"https:\/\/pensec.tech\/#website"},"datePublished":"2023-05-16T20:35:17+00:00","dateModified":"2023-05-16T20:35:18+00:00","breadcrumb":{"@id":"https:\/\/pensec.tech\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pensec.tech\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pensec.tech\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pensec.tech\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/pensec.tech\/#website","url":"https:\/\/pensec.tech\/","name":"PST","description":"PenSecTech","publisher":{"@id":"https:\/\/pensec.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pensec.tech\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pensec.tech\/#organization","name":"PST","url":"https:\/\/pensec.tech\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pensec.tech\/#\/schema\/logo\/image\/","url":"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png","contentUrl":"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png","width":512,"height":512,"caption":"PST"},"image":{"@id":"https:\/\/pensec.tech\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages\/44"}],"collection":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":2,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":53,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages\/44\/revisions\/53"}],"wp:attachment":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}