{"id":2089,"date":"2023-03-14T18:10:11","date_gmt":"2023-03-14T18:10:11","guid":{"rendered":"https:\/\/www.new.try2ascend.com\/wp\/?page_id=2089"},"modified":"2023-03-14T18:19:01","modified_gmt":"2023-03-14T18:19:01","slug":"online-cyber-assessment","status":"publish","type":"page","link":"https:\/\/try2ascend.com\/cyberware\/online-cyber-assessment\/","title":{"rendered":"Online Cyber Assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2089\" class=\"elementor elementor-2089\">\n\t\t\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-02c9407 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"02c9407\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b98be6f\" data-id=\"b98be6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-591ce9c elementor-widget elementor-widget-security-area\" data-id=\"591ce9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"security-area.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"cybersecurity-area pt-100 pb-100\">\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                                                    <div class=\"col-lg-6\">\r\n                                <div class=\"cybersecurity-content text-left\">\r\n                                    <h2>CYBERSERCURITY QUICK PREPAREDNESS ASSESSMENT<\/h2>\r\n\r\n                                    <h3>PROTECT YOUR DATA AND REPUTATION<\/h3><p>Any company that relies on technology to manage client information is vulnerable to liability or loss if a data breach occurs. This quick assessment tool is a starting point to evaluate how prepared you are to secure your data against cyber criminals.\u00a0Situations that could compromise the security of your data are inevitable, and unauthorized access can lead to devastating financial, legal, and reputational consequences. Taking preventative steps to identify your areas of vulnerability and improvement is critical to protecting your organization.\u00a0Based on your responses to this assessment, you can rank your organization\u2019s cyber resiliency. Regardless of your score, every organization can benefit from assessing its existing strategy to pinpoint potential areas for improvement. Even the most proficient cyber team can face daily distractions of financial, employee, and technology issues that can diminish its ability to focus on cybersecurity. Understanding your current state is the first step in building a roadmap for continued cyber maturity.<\/p>\r\n                                    <div class=\"row\">\r\n                                                                                <div class=\"col-lg-6 col-sm-6\">\r\n                                            <ul class=\"cybersecurity-item\">\r\n                                                                                                        <li>\r\n                                                            <i class=\"fa fa-check\"><\/i>\r\n                                                                                                                    <\/li>\r\n                                                                                                    <\/ul>\r\n                                        <\/div>\r\n\r\n                                        <div class=\"col-lg-6 col-sm-6\">\r\n                                            <ul>\r\n                                                                                            <\/ul>\r\n                                        <\/div>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"col-lg-6 pr-0\">\r\n                                <div class=\"cybersecurity-img\" style=\"background-image: url(https:\/\/cyberware.ai\/wp-content\/uploads\/2023\/03\/standard-quality-control-collage-concept-scaled.jpg )\"><\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-faf4473 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"faf4473\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72da74c\" data-id=\"72da74c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBERSERCURITY QUICK PREPAREDNESS ASSESSMENT PROTECT YOUR DATA AND REPUTATION Any company that relies on technology to manage client information is vulnerable to liability or loss if a data breach occurs. This quick assessment tool is a starting point to evaluate how prepared you are to secure your data against cyber criminals.\u00a0Situations that could compromise the <\/p>\n","protected":false},"author":1,"featured_media":2097,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2089","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/2089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/comments?post=2089"}],"version-history":[{"count":0,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/2089\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media\/2097"}],"wp:attachment":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media?parent=2089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}