{"id":30,"date":"2026-03-09T07:14:40","date_gmt":"2026-03-09T07:14:40","guid":{"rendered":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/?page_id=30"},"modified":"2026-04-21T06:09:10","modified_gmt":"2026-04-21T06:09:10","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30\" class=\"elementor elementor-30\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-df7bf40 e-con-full e-flex e-con e-parent\" data-id=\"df7bf40\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-a5c4374 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a5c4374\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-863a30f elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"863a30f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08d229d elementor-widget elementor-widget-heading\" data-id=\"08d229d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity That Protects Your Business, Reputation, and Operations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94324b3 elementor-widget elementor-widget-button\" data-id=\"94324b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a Cybersecurity Assessment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"true\" class=\"eael-section-particles-9793f00 elementor-element elementor-element-9793f00 e-con-full e-flex e-con e-parent\" data-eael_ptheme_source=\"custom\" data-preset_theme=\"default\" data-custom_style=\"{\n  &quot;particles&quot;: {\n    &quot;number&quot;: {\n      &quot;value&quot;: 80,\n      &quot;density&quot;: {\n        &quot;enable&quot;: true,\n        &quot;value_area&quot;: 800\n      }\n    },\n    &quot;color&quot;: {\n      &quot;value&quot;: &quot;#07004B&quot;\n    },\n    &quot;shape&quot;: {\n      &quot;type&quot;: &quot;circle&quot;,\n      &quot;stroke&quot;: {\n        &quot;width&quot;: 0,\n        &quot;color&quot;: &quot;#000000&quot;\n      },\n      &quot;polygon&quot;: {\n        &quot;nb_sides&quot;: 5\n      },\n      &quot;image&quot;: {\n        &quot;src&quot;: &quot;img\/github.svg&quot;,\n        &quot;width&quot;: 100,\n        &quot;height&quot;: 100\n      }\n    },\n    &quot;opacity&quot;: {\n      &quot;value&quot;: 0.5,\n      &quot;random&quot;: false,\n      &quot;anim&quot;: {\n        &quot;enable&quot;: false,\n        &quot;speed&quot;: 1,\n        &quot;opacity_min&quot;: 0.1,\n        &quot;sync&quot;: false\n      }\n    },\n    &quot;size&quot;: {\n      &quot;value&quot;: 5,\n      &quot;random&quot;: true,\n      &quot;anim&quot;: {\n        &quot;enable&quot;: false,\n        &quot;speed&quot;: 40,\n        &quot;size_min&quot;: 0.1,\n        &quot;sync&quot;: false\n      }\n    },\n    &quot;line_linked&quot;: {\n      &quot;enable&quot;: true,\n      &quot;distance&quot;: 150,\n      &quot;color&quot;: &quot;#07004B&quot;,\n      &quot;opacity&quot;: 0.4,\n      &quot;width&quot;: 1\n    },\n    &quot;move&quot;: {\n      &quot;enable&quot;: true,\n      &quot;speed&quot;: 6,\n      &quot;direction&quot;: &quot;none&quot;,\n      &quot;random&quot;: false,\n      &quot;straight&quot;: false,\n      &quot;out_mode&quot;: &quot;out&quot;,\n      &quot;attract&quot;: {\n        &quot;enable&quot;: false,\n        &quot;rotateX&quot;: 600,\n        &quot;rotateY&quot;: 1200\n      }\n    }\n  },\n  &quot;interactivity&quot;: {\n    &quot;detect_on&quot;: &quot;canvas&quot;,\n    &quot;events&quot;: {\n      &quot;onhover&quot;: {\n        &quot;enable&quot;: true,\n        &quot;mode&quot;: &quot;repulse&quot;\n      },\n      &quot;onclick&quot;: {\n        &quot;enable&quot;: true,\n        &quot;mode&quot;: &quot;push&quot;\n      },\n      &quot;resize&quot;: true\n    },\n    &quot;modes&quot;: {\n      &quot;grab&quot;: {\n        &quot;distance&quot;: 400,\n        &quot;line_linked&quot;: {\n          &quot;opacity&quot;: 1\n        }\n      },\n      &quot;bubble&quot;: {\n        &quot;distance&quot;: 400,\n        &quot;size&quot;: 40,\n        &quot;duration&quot;: 2,\n        &quot;opacity&quot;: 8,\n        &quot;speed&quot;: 3\n      },\n      &quot;repulse&quot;: {\n        &quot;distance&quot;: 200\n      },\n      &quot;push&quot;: {\n        &quot;particles_nb&quot;: 4\n      },\n      &quot;remove&quot;: {\n        &quot;particles_nb&quot;: 2\n      }\n    }\n  },\n  &quot;retina_detect&quot;: true,\n  &quot;config_demo&quot;: {\n    &quot;hide_card&quot;: false,\n    &quot;background_color&quot;: &quot;#b61924&quot;,\n    &quot;background_image&quot;: &quot;&quot;,\n    &quot;background_position&quot;: &quot;50% 50%&quot;,\n    &quot;background_repeat&quot;: &quot;no-repeat&quot;,\n    &quot;background_size&quot;: &quot;cover&quot;\n  }\n}\" data-particle_opacity=\"0.5\" data-particle_speed=\"6\" data-particle-mobile-disabled=\"false\" data-id=\"9793f00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-9dee462 e-con-full e-flex e-con e-child\" data-id=\"9dee462\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fdf7308 elementor-widget elementor-widget-heading\" data-id=\"fdf7308\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Growing Threat to Modern Businesses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c7ff0c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0c7ff0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybercrime is one of the fastest growing risks facing organisations worldwide. Increasingly, attackers target <strong>small and medium sized businesses<\/strong>, knowing they often lack strong security controls.<\/p><p>Common threats include:<\/p><ul><li>Ransomware attacks encrypting company data<\/li><li>Phishing emails stealing employee credentials<\/li><li>Malware infecting business devices<\/li><li>Hackers exploiting application or website vulnerabilities<\/li><li>Data breaches exposing sensitive client information<\/li><li>Operational downtime caused by compromised systems<br \/><br \/><\/li><\/ul><p>Without a structured cybersecurity strategy, businesses remain vulnerable to attacks that can severely disrupt operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <style>\n                .elementor-element-9793f00.eael-particles-section > canvas {\n                    z-index: -1;\n                    position: absolute;\n                    top:0;\n                }\n            <\/style>\n        <div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-4992e36 e-con-full e-flex e-con e-parent\" data-id=\"4992e36\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f79402c e-con-full e-flex e-con e-child\" data-id=\"f79402c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf0659d elementor-widget elementor-widget-heading\" data-id=\"cf0659d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Cybersecurity Approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-781d3be elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"781d3be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We implement a <strong>layered security strategy<\/strong> designed to protect every part of your digital environment.<\/p><p>This includes securing:<\/p><ul><li>Users<\/li><li>Devices<\/li><li>Networks<\/li><li>Applications<\/li><li>Cloud infrastructure<\/li><li>Data<\/li><\/ul><p><br \/>By protecting every layer of your technology environment, we significantly <strong>reduce risk and strengthen your organisation\u2019s overall security posture<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-e7ed107 e-con-full e-flex e-con e-child\" data-id=\"e7ed107\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-236c37c elementor-widget elementor-widget-heading\" data-id=\"236c37c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Core Cybersecurity Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-584a62c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"584a62c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Endpoint Protection<\/li><li>Firewall &amp; Network Security<\/li><li>Email Security &amp; Phishing Protection<\/li><li>Backup &amp; Ransomware Protection<\/li><li>Ethical Hacking &amp; Security Testing<\/li><li>Vulnerability Assessments<\/li><li>Phishing Attack Simulations<\/li><li>Ransomware Response &amp; Mitigation<\/li><li>Ransomware Incident Support<\/li><li>Security Policy Development &amp; Compliance<\/li><li>Security Policy Audits<\/li><li>Cybersecurity Training for Employees<\/li><li>Data Centre Security for Applications &amp; Hosting<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-8fcc578 e-con-full e-flex e-con e-parent\" data-id=\"8fcc578\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-a028011 e-con-full e-flex e-con e-child\" data-id=\"a028011\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3bb3e2 elementor-widget elementor-widget-heading\" data-id=\"b3bb3e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Businesses Choose Us for Connectivity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f5f4d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a2f5f4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Layered protection across your entire IT environment.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ethical hacking and penetration testing expertise.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ransomware prevention and recovery strategies.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security policy development and compliance support.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity awareness training for employees.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">One trusted ICT partner managing your security ecosystem.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-1d855eb e-con-full e-flex e-con e-parent\" data-id=\"1d855eb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-51df8f9 e-con-full e-flex e-con e-child\" data-id=\"51df8f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d541a elementor-widget elementor-widget-heading\" data-id=\"40d541a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Solutions for Every Business Size<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-aabf132 e-grid e-con-full e-con e-child\" data-id=\"aabf132\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-3c6f5a8 e-con-full e-flex e-con e-child\" data-id=\"3c6f5a8\" data-element_type=\"container\" data-e-type=\"container\" id=\"grow\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-e7fb998 e-con-full e-flex e-con e-child\" data-id=\"e7fb998\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76ef505 elementor-widget elementor-widget-heading\" data-id=\"76ef505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Startups &amp; Small Businesses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-bcc37fe e-con-full e-flex e-con e-child\" data-id=\"bcc37fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d94fa3 elementor-widget elementor-widget-text-editor\" data-id=\"8d94fa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Endpoint protection<\/li><li>Email security<\/li><li>Secure cloud backups<\/li><li>Basic firewall protection<\/li><\/ul><p><br \/>Providing <strong>essential security without unnecessary complexity<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c1962b6 e-con-full e-flex e-con e-child\" data-id=\"c1962b6\" data-element_type=\"container\" data-e-type=\"container\" id=\"grow\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-1ec82fe e-con-full e-flex e-con e-child\" data-id=\"1ec82fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2429ec6 elementor-widget elementor-widget-heading\" data-id=\"2429ec6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Medium Businesses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-fbec9e8 e-con-full e-flex e-con e-child\" data-id=\"fbec9e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b5f57f elementor-widget elementor-widget-text-editor\" data-id=\"9b5f57f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Advanced endpoint protection<\/li><li>Managed firewalls<\/li><li>Secure remote access<\/li><li>Vulnerability scanning<\/li><li>Phishing simulations<\/li><\/ul><p><br \/>Providing <strong>scalable protection for growing organisations<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5e89106 e-con-full e-flex e-con e-child\" data-id=\"5e89106\" data-element_type=\"container\" data-e-type=\"container\" id=\"grow\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c8c9539 e-con-full e-flex e-con e-child\" data-id=\"c8c9539\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b811f70 elementor-widget elementor-widget-heading\" data-id=\"b811f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enterprises<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c356eac e-con-full e-flex e-con e-child\" data-id=\"c356eac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80d36b7 elementor-widget elementor-widget-text-editor\" data-id=\"80d36b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Penetration testing and ethical hacking<\/li><li>Advanced threat detection<\/li><li>Security policy development<\/li><li>Security monitoring and incident response<\/li><\/ul><p><br \/>Delivering <strong>enterprise grade protection for complex Enterprises<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-1ea0f90 e-con-full e-flex e-con e-parent\" data-id=\"1ea0f90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-e396092 e-con-full e-flex e-con e-child\" data-id=\"e396092\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d628891 elementor-widget elementor-widget-heading\" data-id=\"d628891\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently asked questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76b828c elementor-widget elementor-widget-text-editor\" data-id=\"76b828c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Got questions? We\u2019re here to make technology easy to understand and easy to use no confusion, just straight answers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-d0377d9 e-con-full e-flex e-con e-child\" data-id=\"d0377d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6e2954 elementor-widget elementor-widget-n-accordion\" data-id=\"b6e2954\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1910\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1910\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Are small businesses really targeted by hackers? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1910\" class=\"elementor-element elementor-element-99d7757 e-con-full e-flex e-con e-child\" data-id=\"99d7757\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1910\" class=\"elementor-element elementor-element-fe6161d e-con-full e-flex e-con e-child\" data-id=\"fe6161d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef6f26e elementor-widget elementor-widget-text-editor\" data-id=\"ef6f26e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Yes. Many cybercriminals target small businesses because they often have weaker security controls.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1911\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1911\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Do we still need cybersecurity if we use Microsoft 365? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1911\" class=\"elementor-element elementor-element-8b61894 e-con-full e-flex e-con e-child\" data-id=\"8b61894\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1911\" class=\"elementor-element elementor-element-efc995a e-con-full e-flex e-con e-child\" data-id=\"efc995a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-466dfef elementor-widget elementor-widget-text-editor\" data-id=\"466dfef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Yes. Cloud platforms still require endpoint protection, monitoring, and security policies to protect against phishing and compromised accounts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1912\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1912\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What happens if we experience a ransomware attack? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1912\" class=\"elementor-element elementor-element-392de85 e-con-full e-flex e-con e-child\" data-id=\"392de85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1912\" class=\"elementor-element elementor-element-b1a5fd7 e-con-full e-flex e-con e-child\" data-id=\"b1a5fd7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ef505a elementor-widget elementor-widget-text-editor\" data-id=\"8ef505a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our incident response approach focuses on isolating affected systems, restoring operations quickly, and recovering data through secure backups.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1913\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1913\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How often should penetration testing be performed? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1913\" class=\"elementor-element elementor-element-48b01ce e-con-full e-flex e-con e-child\" data-id=\"48b01ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1913\" class=\"elementor-element elementor-element-67c28f6 e-con-full e-flex e-con e-child\" data-id=\"67c28f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef9bbb elementor-widget elementor-widget-text-editor\" data-id=\"3ef9bbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Most organisations conduct penetration testing <strong>annually or after major infrastructure or application changes<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-99f37f7 e-con-full e-flex e-con e-parent\" data-id=\"99f37f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-875431f e-con-full e-flex e-con e-child\" data-id=\"875431f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b28aef elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6b28aef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Your Business Before an Attack Happens<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-374be1a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"374be1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is no longer optional it is a critical part of running a modern business.<\/p><p>Book a cybersecurity consultation and let our experts assess how secure your organisation really is.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c15ef1 elementor-widget elementor-widget-button\" data-id=\"3c15ef1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a Cybersecurity Assessment <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-91343f0 e-con-full e-flex e-con e-parent\" data-id=\"91343f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-81a7f83 e-con-full e-flex e-con e-child\" data-id=\"81a7f83\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-700a43d elementor-widget elementor-widget-eael-logo-carousel\" data-id=\"700a43d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;items&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:5,&quot;sizes&quot;:[]},&quot;items_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;items_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"eael-logo-carousel.default\">\n\t\t\t\t\t        <div class=\"swiper-container-wrap eael-logo-carousel-wrap\">\n            <div class=\"swiper swiper-8 eael-logo-carousel swiper-container-700a43d eael-marquee-carousel\" data-pagination=\".swiper-pagination-700a43d\" data-arrow-next=\".swiper-button-next-700a43d\" data-arrow-prev=\".swiper-button-prev-700a43d\" data-items-mobile=\"1\" data-items-tablet=\"2\" data-items=\"5\" data-margin=\"20\" data-effect=\"slide\" data-speed=\"4000\" data-autoplay=\"0\" data-loop=\"1\">\n                <div class=\"swiper-wrapper\">\n\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-5bd6695\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Untitled-design-1-2-e1774865263733.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-c585dd3\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Untitled-design-2-1-1-e1774865238565.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-3ebe038\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Untitled-design-1-1-1-e1774865186459.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-5d34006\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Untitled-design-3-1-e1774865135740.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-d85715b\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Untitled-design-2-e1774865328140.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-566e696\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Veeam_logo_topaz_2019.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                            <div class=\"swiper-slide\">\n                                <div class=\"eael-lc-logo-wrap\">\n\t\t\t\t\t\t\t\t\t                                    <div id=\"eael-lc-logo-bb94b39\" class=\"eael-lc-logo\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"eael-lc-img-src\" src=\"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-content\/uploads\/2026\/03\/Mask-Group-8.png\" alt=\"\">                                    <\/div>\n\t\t\t\t\t\t\t\t\t                                <\/div>\n                            <\/div>\n\t\t\t\t\t\t                <\/div>\n            <\/div>\n\t\t\t        <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Solutions Cybersecurity That Protects Your Business, Reputation, and Operations Book a Cybersecurity Assessment The Growing Threat to Modern Businesses Cybercrime is one of the fastest growing risks facing organisations worldwide. Increasingly, attackers target small and medium sized businesses, knowing they often lack strong security controls. Common threats include: Ransomware attacks encrypting company data Phishing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-30","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/pages\/30","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/comments?post=30"}],"version-history":[{"count":94,"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/pages\/30\/revisions"}],"predecessor-version":[{"id":2889,"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/pages\/30\/revisions\/2889"}],"wp:attachment":[{"href":"https:\/\/jonathan.rcm-test-web.co.za\/siyaxhuma\/wp-json\/wp\/v2\/media?parent=30"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}