{"id":10581,"date":"2022-04-26T10:29:09","date_gmt":"2022-04-26T10:29:09","guid":{"rendered":"https:\/\/cyber-fortified.com\/m\/?page_id=10581"},"modified":"2022-04-26T10:33:56","modified_gmt":"2022-04-26T10:33:56","slug":"fortified-ms-real-time-network-protection","status":"publish","type":"page","link":"https:\/\/cyber-fortified.com\/m\/fortified-ms-real-time-network-protection\/","title":{"rendered":"Fortified MS\u2122"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10581\" class=\"elementor elementor-10581\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40b6362 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"40b6362\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d73dbce jltma-glass-effect-no\" data-id=\"d73dbce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ff300b jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"0ff300b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1005\" height=\"457\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/concept-of-computer-network-security-with-triple-PAGT64L-cover.jpg\" class=\"attachment-full size-full wp-image-10583\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/concept-of-computer-network-security-with-triple-PAGT64L-cover.jpg 1005w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/concept-of-computer-network-security-with-triple-PAGT64L-cover-300x136.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/concept-of-computer-network-security-with-triple-PAGT64L-cover-768x349.jpg 768w\" sizes=\"(max-width: 1005px) 100vw, 1005px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d4dd111 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"d4dd111\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2ed78ed jltma-glass-effect-no\" data-id=\"2ed78ed\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d456145 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"d456145\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Fortified MS\u2122<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4d418f6 jltma-glass-effect-no\" data-id=\"4d418f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cb5192a elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"cb5192a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2641bd4 jltma-glass-effect-no\" data-id=\"2641bd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-668cd11 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"668cd11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">How are you protecting your business?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d4ba18 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"2d4ba18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-98dfa19 jltma-glass-effect-no\" data-id=\"98dfa19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a4059a jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"7a4059a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What is Fortified MS\u2122?<\/strong><\/p><p>Fortified MS\u2122 is a cyber security managed service that provides Real-Time Protection for the digital devices within your business\u2019 network.<\/p><p>With a dedicated Cyber Security Team, our managed service provides 360\u00b0 security, protecting your business from a variety of cyber attacks, including Ransomware.<\/p><div id=\"pgc-202-1-0\" class=\"panel-grid-cell\"><div id=\"panel-202-1-0-1\" class=\"so-panel widget widget_sow-image panel-last-child\" data-index=\"2\"><div class=\"so-widget-sow-image so-widget-sow-image-default-d6014b76747a-202\"><div class=\"sow-image-container\"><img decoding=\"async\" class=\"so-widget-image\" title=\"48% of businesses have reported at least one attack or breach, per month.\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-scaled.png\" sizes=\"(max-width: 2560px) 100vw, 2560px\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-scaled.png 2560w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-300x130.png 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-1024x442.png 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-768x332.png 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-1536x664.png 1536w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/48-percent-of-businesses-2048x885.png 2048w\" alt=\"\" width=\"2560\" height=\"1106\" \/><\/div><\/div><\/div><\/div><div id=\"pgc-202-1-1\" class=\"panel-grid-cell\"><div id=\"panel-202-1-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"3\">\u00a0<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-051da1d jltma-glass-effect-no\" data-id=\"051da1d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-98f965c jltma-glass-effect-no\" data-id=\"98f965c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4eb9bc jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"a4eb9bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"widget-title\"><strong>Why Fortified MS\u2122?<\/strong><\/p><div class=\"textwidget\"><p>Providing the level of peace of mind that small businesses have been calling for, Fortified MS\u2122 has been created with the sector in mind.<\/p><p>Fortified MS\u2122 utilises a seven-layered approach, which protects against all stages of an attack. This robust approach provides protection against all types of threats , from the traditional viruses to tomorrow\u2019s advanced threats.<\/p><p>Fortified MS\u2122 can yield a significant improvement in your business\u2019 readiness, should the worst happen.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aca8cc9 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"aca8cc9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-94e7828 jltma-glass-effect-no\" data-id=\"94e7828\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0fde151 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"0fde151\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-330569a jltma-glass-effect-no\" data-id=\"330569a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45fa80f jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"45fa80f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What are the benefits?<\/strong><\/p><p>Whilst traditional Anti-Virus software still has a part to play, in security, it can no longer be relied upon to solely protect your devices and networks.<\/p><p>At a starting price point lower than your daily coffee, small businesses can now benefit from the same level of enterprise protection the large corporations enjoy.<\/p><p>Powered by next-generation technology and managed by our in-house security team, Fortified MS\u2122 offers small businesses a multi-layered approach to data protection and cyber security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f9229c2 jltma-glass-effect-no\" data-id=\"f9229c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b4e356 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"1b4e356\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/elementor\/thumbs\/av-versus-fms-scaled-oguykq2n6hx5vyfr8847hd4ds609kka3wi20wk5n9q.png\" title=\"\" alt=\"Traditional Anti Virus Remediation vs Fortified MS\u2122 Remediation\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-670a6a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"670a6a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b4a4fe jltma-glass-effect-no\" data-id=\"9b4a4fe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e08245a jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"e08245a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"text-decoration: underline;\">Benefits include:<\/span><strong><br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-869a93c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"869a93c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4d3efea jltma-glass-effect-no\" data-id=\"4d3efea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f02e601 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"f02e601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><img decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/protection-150x150.png\" alt=\"Protection against all stages of an attack\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5060\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/protection-150x150.png 150w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/protection.png 267w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/td><td class=\"column-2\">Protection against all stages of an attack<\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/gain-150x150.png\" alt=\"Gain greater insight into your organisation&#039;s threats\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5061\" \/><\/td><td class=\"column-2\">Gain greater insight into your organisation&#8217;s threats<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/threats-150x150.png\" alt=\"Threats are rapidly detected and isolated\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5062\" \/><\/td><td class=\"column-2\">Threats are rapidly detected and isolated<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/virtual-150x150.png\" alt=\"Your own virtual cyber security team\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5063\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/virtual-150x150.png 150w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/virtual-296x300.png 296w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/virtual.png 598w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/td><td class=\"column-2\">Your own virtual cyber security team<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/centrally-150x150.png\" alt=\"Centrally managed\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5064\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/centrally-150x150.png 150w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/centrally-300x300.png 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/centrally.png 534w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/td><td class=\"column-2\">Centrally managed<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/rollback.png\" alt=\"Limit the damage caused by a Ransomware attack, with Rollback Technology\" width=\"50\" height=\"55\" class=\"alignnone size-full wp-image-5065\" \/><\/td><td class=\"column-2\">Rollback Technology limits damage caused by Ransomware<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/protect-150x150.png\" alt=\"Protect and secure your business\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5066\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/protect-150x150.png 150w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/protect.png 267w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/td><td class=\"column-2\">Protect and secure your business<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/simple-300x202.png\" alt=\"Simple and easy setup\" width=\"50\" height=\"50\" class=\"alignnone size-medium wp-image-5074\" \/><\/td><td class=\"column-2\">Simple and easy setup<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-150x150.png\" alt=\"Peace of Mind\" width=\"50\" height=\"50\" class=\"alignnone size-thumbnail wp-image-5068\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-150x150.png 150w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-294x300.png 294w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-1004x1024.png 1004w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-768x783.png 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-1506x1536.png 1506w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2019\/11\/peace-2008x2048.png 2008w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/td><td class=\"column-2\">Peace of Mind<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2b49394 jltma-glass-effect-no\" data-id=\"2b49394\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-940a2bb jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"940a2bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/elementor\/thumbs\/rollback-process-ogzt8fslhg3okzzzgyo8bnjrxgfax5b3o3uand91bc.png\" title=\"\" alt=\"Fortified MS\u2122 includes Rollback Technology, helping you recover quickly from the impact of ransomware attacks.\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f8f1a6d elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"f8f1a6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28ad262 jltma-glass-effect-no\" data-id=\"28ad262\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30f18b3 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"30f18b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Next Steps<\/strong><\/p><p>We always recommend a scoping call to discuss the company, your current security posture and the options to choose from.<\/p><p><span style=\"text-decoration: underline;\">Please use the booking calendar, below, to schedule your scoping call:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ecf49be elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"ecf49be\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4495eb7 jltma-glass-effect-no\" data-id=\"4495eb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-096c432 jltma-glass-effect-no elementor-widget elementor-widget-html\" data-id=\"096c432\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/cyberfortified\/scoping-call-cyber-security-solutions?hide_gdpr_banner=1\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fortified MS\u2122 How are you protecting your business? What is Fortified MS\u2122? Fortified MS\u2122 is a cyber security managed service that provides Real-Time Protection for the digital devices within your business\u2019 network. With a dedicated Cyber Security Team, our managed service provides 360\u00b0 security, protecting your business from a variety of cyber attacks, including Ransomware. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10581","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/comments?post=10581"}],"version-history":[{"count":13,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10581\/revisions"}],"predecessor-version":[{"id":10595,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10581\/revisions\/10595"}],"wp:attachment":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/media?parent=10581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}