{"id":2921,"date":"2020-01-02T12:17:38","date_gmt":"2020-01-02T12:17:38","guid":{"rendered":"https:\/\/ecs-et.com\/?page_id=2921"},"modified":"2020-01-02T12:40:36","modified_gmt":"2020-01-02T12:40:36","slug":"other-services","status":"publish","type":"page","link":"https:\/\/ecs-et.com\/am\/other-services\/","title":{"rendered":"Other Services"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577968299293\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"dl-cta text-dark border-display\"><div class=\"container\"><div class=\"cta-wrapper btn-fix fix-top\"><div class=\"cta-content\"> <h2 style=''>Security Risk Assessment and Management<\/h2> <p>The Assessment Includes identifying the security risks and recommending plans to address them to the level that matches the risk tolerance of the organization. The Security Risk Management is the ongoing process of identifying and implementing risk mitigation plans.<\/p> <\/div> <div class=\"dl-button\"><span title=\"\" > <\/span><\/div><\/div><\/div><\/div><div class=\"dl-cta text-dark border-display\"><div class=\"container\"><div class=\"cta-wrapper btn-fix fix-top\"><div class=\"cta-content\"> <h2 style=''>Compliance and Governance<\/h2> <p>Ensuring that organizational activities are operated in a way that complies with the regulations, and making sure that organizational activities are aligned with the security objectives. In addition to PCI DSS, standards such as GDPR, HIPAA, ISO27001, and Critical Infrastructure Protection Regulations<\/p> <\/div> <div class=\"dl-button\"><span title=\"\" > <\/span><\/div><\/div><\/div><\/div><div class=\"dl-cta text-dark border-display\"><div class=\"container\"><div class=\"cta-wrapper btn-fix fix-top\"><div class=\"cta-content\"> <h2 style=''>Threat Modeling<\/h2> <p>A structured approach to identify, quantify, and address threats according to priorities.<\/p> <\/div> <div class=\"dl-button\"><span title=\"\" > <\/span><\/div><\/div><\/div><\/div><div class=\"dl-cta text-dark border-display\"><div class=\"container\"><div class=\"cta-wrapper btn-fix fix-top\"><div class=\"cta-content\"> <h2 style=''>Vulnerability Management<\/h2> <p>This methodology gives us a complete picture of all the organization\u2019s cyber related vulnerabilities and a plan for their remediation and mitigation<\/p> <\/div> <div class=\"dl-button\"><span title=\"\" > <\/span><\/div><\/div><\/div><\/div><div class=\"dl-cta text-dark border-display\"><div class=\"container\"><div class=\"cta-wrapper btn-fix fix-top\"><div class=\"cta-content\"> <h2 style=''>Information Security Audit<\/h2> <p>Periodical internal and external security audits enable monitoring and measuring the effectiveness of the security controls.<\/p> <\/div> <div class=\"dl-button\"><span title=\"\" > <\/span><\/div><\/div><\/div><\/div><div class=\"dl-cta text-dark border-display\"><div class=\"container\"><div class=\"cta-wrapper btn-fix fix-top\"><div class=\"cta-content\"> <h2 style=''>Social Engineering<\/h2> <p>Social engineering, such as phishing, depends on human nature and is becoming the greatest threat and voluntarily of the organization. We map the risks and devise a strategy to guide and train the employees at different levels.<\/p> <\/div> <div class=\"dl-button\"><span title=\"\" > <\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class='delaware-section-title  delaware_title-type-2 row' >\r\n\t\t\t\t<h2 class='col-xs-12 col-sm-12 text-center title no-underline' style='font-size:36px;'>CONNECT WITH US<\/h2>\r\n\t\t\t\t<div class=\"col-xs-12 col-sm-12 text-center desc\"><div style=\"color: #222; font-size: 18px;\">Please fill out the form and send us a message. We will get back to you within 1-3 business days.<\/div>\n<\/div> \r\n\t\t\t<\/div><div class=\"dl-contact-form-7 form-light\" style=\"\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1168-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1168\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/am\/wp-json\/wp\/v2\/pages\/2921#wpcf7-f1168-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\" data-trp-original-action=\"\/am\/wp-json\/wp\/v2\/pages\/2921#wpcf7-f1168-o1\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1168\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1168-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"dl-form dl-form-2\">\n\t<div class=\"row\">\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number*\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-445\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-445\"><\/textarea><\/span><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send Now\" \/>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<input type=\"hidden\" name=\"trp-form-language\" value=\"am\"\/><\/form>\n<\/div>\n<\/div><div class=\"ba-empty-space\" style=\"\"><div class=\"ba_empty_space_lg\"  style=\"height: 30px\"><\/div><div class=\"ba_empty_space_md\"  style=\"height: 30px\"><\/div><div class=\"ba_empty_space_xs\"  style=\"height: 30px\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Security Risk Assessment and Management The Assessment Includes identifying the security risks and recommending plans to address them to the level that matches the risk tolerance of the organization. The [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-2921","page","type-page","status-publish","hentry","no-thumb"],"_links":{"self":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/comments?post=2921"}],"version-history":[{"count":9,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2921\/revisions"}],"predecessor-version":[{"id":2934,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2921\/revisions\/2934"}],"wp:attachment":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media?parent=2921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}