{"id":23,"date":"2024-05-08T09:13:39","date_gmt":"2024-05-08T09:13:39","guid":{"rendered":"http:\/\/ostech-demo.local\/?page_id=23"},"modified":"2024-11-29T09:47:36","modified_gmt":"2024-11-29T09:47:36","slug":"ongoing-management","status":"publish","type":"page","link":"https:\/\/infosecurity360.cloud\/index.php\/ongoing-management\/","title":{"rendered":"Ongoing Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"23\" class=\"elementor elementor-23\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a80c289 e-flex e-con-boxed e-con e-parent\" data-id=\"3a80c289\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-772dc179 e-con-full e-flex e-con e-child\" data-id=\"772dc179\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f4551ed elementor-widget elementor-widget-sidebar-nav\" data-id=\"2f4551ed\" data-element_type=\"widget\" data-widget_type=\"sidebar-nav.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t    <div class=\"service-sidebar__single\">\r\n        <h3 class=\"service-sidebar__title background-base\">All Service<\/h3>                    <ul id=\"menu-services-list\" class=\"list-unstyled service-sidebar__nav ml-0\"><li id=\"menu-item-53\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-53\"><a href=\"https:\/\/infosecurity360.cloud\/index.php\/risk-assessments\/\">Risk Assessments<\/a><\/li>\n<li id=\"menu-item-54\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-54\"><a href=\"https:\/\/infosecurity360.cloud\/index.php\/ongoing-management\/\">Ongoing Management<\/a><\/li>\n<li id=\"menu-item-55\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55\"><a href=\"https:\/\/infosecurity360.cloud\/index.php\/cyber-posture-reporting\/\">Cyber Posture Reporting<\/a><\/li>\n<li id=\"menu-item-57\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-57\"><a href=\"https:\/\/infosecurity360.cloud\/index.php\/cyber-security\/\">Cyber Security<\/a><\/li>\n<\/ul>            <\/div><!-- \/.service-sidebar__single -->\r\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dbf787d elementor-widget elementor-widget-ostech-sidebar-call-to-action\" data-id=\"2dbf787d\" data-element_type=\"widget\" data-widget_type=\"ostech-sidebar-call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t    <div class=\"service-sidebar__single  wow fadeInUp\" data-wow-delay='500ms'>\r\n        <div class=\"service-sidebar__contact\">\r\n            <h3 class=\"service-sidebar__contact-title\">Get a Free Quick Solution of IT Problem<\/h3>                            <div class=\"service-sidebar__contact-btn\" data-wow-delay=\"500ms\">\r\n                    <a href=\"https:\/\/infosecurity360.cloud\/index.php\/contact\/\"  class=\"ostech-btn ostech-btn--submite\">Contact<\/a>\r\n                <\/div>\r\n                        <div class=\"service-sidebar__contact-image\">\r\n                <img decoding=\"async\" src=\"https:\/\/infosecurity360.cloud\/wp-content\/uploads\/2024\/11\/service-men-1-1.png\" alt=\"service-men-1-1\" title=\"service-men-1-1\" >\r\n            <\/div>\r\n            <div class=\"service-sidebar__contact-angle\">\r\n                <img decoding=\"async\" src=\"https:\/\/infosecurity360.cloud\/wp-content\/uploads\/2024\/11\/service-shape.png\" alt=\"service-shape\" title=\"service-shape\" >            <\/div>\r\n        <\/div><!-- \/.service-sidebar__contact -->\r\n    <\/div>\r\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fdc9c1 e-con-full e-flex e-con e-child\" data-id=\"fdc9c1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e1ad251 elementor-widget elementor-widget-ostech-service-details\" data-id=\"3e1ad251\" data-element_type=\"widget\" data-widget_type=\"ostech-service-details.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t<div class=\"service-details__single\">\r\n\t\t<div class=\"service-details__thumbnail wow fadeInUp\" data-wow-delay='300ms'>\r\n\t\t\t\t\t<\/div>\r\n\t\t<h4 class=\"service-details__title wow fadeInUp\">Ongoing Management <\/h4>\t\t<p class=\"service-details__text wow fadeInUp\" data-wow-delay='350ms'>We manage the ongoing execution and\noptimization of the cybersecurity plan \u2013\nmonitoring, scanning, making changes or\ntweaks where necessary. This leaves you to\nfocus on your core business, knowing that\nyour digital security is in good hands.<\/p>\r\n\r\n\t\t<h3 class=\"service-details__sub-title wow fadeInUp\" data-wow-delay='300ms'><\/h3><!-- \/.service-details__title -->\r\n\t\t<!-- \/.service-details__text -->\r\n\t\t<p class=\"service-details__text wow fadeInUp\" data-wow-delay='350ms'><\/p><!-- \/.service-details__text -->\r\n\t<\/div><!-- \/.service-details__single-->\r\n\r\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d7d61d elementor-widget elementor-widget-ostech-features\" data-id=\"9d7d61d\" data-element_type=\"widget\" data-widget_type=\"ostech-features.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t<div class=\"service-details__single\">\r\n\t\t<div class=\"service-details__single-inner\">\r\n\t\t\t<h3 class=\"service-details__title\">\r\n\t\t\t\tWhy Choose Our Services?\t\t\t<\/h3>\r\n\t\t\t<div class=\"row gutter-y-30\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\">\r\n\t\t\t\t\t\t<div class=\"service-details__inner-item wow fadeInUp \" data-wow-delay=\"300ms\">\r\n\t\t\t\t\t\t\t<div class=\"item-icon\">\r\n\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-pound-sign\"><\/i>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"item-content\">\r\n\t\t\t\t\t\t\t\t<h3 class=\"item__title\">\r\n\t\t\t\t\t\t\t\t\tCost-Effective Expertise\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t<p class=\"item__dec\">Affordable, high-level cybersecurity management without the need for a full-time hire, allowing businesses to focus on their core activities.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\">\r\n\t\t\t\t\t\t<div class=\"service-details__inner-item wow fadeInUp \" data-wow-delay=\"300ms\">\r\n\t\t\t\t\t\t\t<div class=\"item-icon\">\r\n\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\" icon-it-service-1\"><\/i>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"item-content\">\r\n\t\t\t\t\t\t\t\t<h3 class=\"item__title\">\r\n\t\t\t\t\t\t\t\t\tProactive Protection\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t<p class=\"item__dec\">Continuous monitoring and tailored security strategies ensure protection from evolving threats while maintaining regulatory compliance.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d7e9660 elementor-widget elementor-widget-ostech-features\" data-id=\"7d7e9660\" data-element_type=\"widget\" data-widget_type=\"ostech-features.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t<div class=\"service-details__single wow fadeInUp\" data-wow-delay='300ms'>\r\n\t\t<div class=\"row align-items-center\">\r\n\t\t\t<div class=\"col-md-5\">\r\n\t\t\t\t<div class=\"service-details__image__item\">\r\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/infosecurity360.cloud\/wp-content\/uploads\/2024\/11\/service-s-1-1.png\" alt=\"service-s-1-1\" title=\"service-s-1-1\" >\t\t\t\t<\/div><!-- \/.service-details__image__circle -->\r\n\t\t\t<\/div><!-- \/.col-md-6 -->\r\n\t\t\t<div class=\"col-md-7\">\r\n\t\t\t\t<div class=\"service-details__benefit\">\r\n\t\t\t\t\t<h3 class=\"service-details__benefit__title\">\r\n\t\t\t\t\t\tOur Few Benefits\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t<p class=\"service-details__benefit__text\"><\/p>\r\n\t\t\t\t\t<h4 class=\"service-details__benefit__sub_title\"><\/h4>\r\n\t\t\t\t\t<ul class=\"list-unstyled service-details__list ml-0\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"service-details__list__item\">\r\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t\t\tExpert Cybersecurity Leadership\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"service-details__list__item\">\r\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t\t\tContinuous Monitoring and Optimization\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"service-details__list__item\">\r\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t\t\tFocus on Core Business\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"service-details__list__item\">\r\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t\t\tCost-Effective Solution\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"service-details__list__item\">\r\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t\t\tProactive Risk Management\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/ul><!-- \/.list-unstyled team-details__list -->\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div><!-- \/.col-md-6 -->\r\n\t\t<\/div><!-- \/.row -->\r\n\t<\/div><!-- \/.service-details__single-->\r\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62ef8e01 elementor-widget elementor-widget-ostech-faq\" data-id=\"62ef8e01\" data-element_type=\"widget\" data-widget_type=\"ostech-faq.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t    <div class=\"service-details__single\">\r\n        <div class=\"faq-page__accordion ostech-accrodion\" data-grp-name=\"ostech-accrodion\">\r\n                            <div class=\"accrodion active\">\r\n                    <div class=\"accrodion-title\">\r\n                        <h4 class=\"accrodion-title__text\">Expert Cybersecurity Oversight                            <span class=\"accrodion-title__icon\"><\/span>\r\n                        <\/h4>\r\n                    <\/div><!-- \/.accordian-title -->\r\n                    <div class=\"accrodion-content\">\r\n                        <div class=\"inner\">\r\n                            <p class=\"inner__text\"> A vCISO provides experienced leadership to manage and optimize your cybersecurity strategy, ensuring it stays up-to-date with evolving threats.<\/p>\r\n                        <\/div><!-- \/.accordian-content -->\r\n                    <\/div>\r\n                <\/div><!-- \/.accordian-item -->\r\n                            <div class=\"accrodion \">\r\n                    <div class=\"accrodion-title\">\r\n                        <h4 class=\"accrodion-title__text\">Continuous Monitoring                            <span class=\"accrodion-title__icon\"><\/span>\r\n                        <\/h4>\r\n                    <\/div><!-- \/.accordian-title -->\r\n                    <div class=\"accrodion-content\">\r\n                        <div class=\"inner\">\r\n                            <p class=\"inner__text\">Regular monitoring and scanning of systems help identify vulnerabilities, allowing for proactive changes or improvements to enhance security.<\/p>\r\n                        <\/div><!-- \/.accordian-content -->\r\n                    <\/div>\r\n                <\/div><!-- \/.accordian-item -->\r\n                            <div class=\"accrodion \">\r\n                    <div class=\"accrodion-title\">\r\n                        <h4 class=\"accrodion-title__text\">Focus on Core Business                            <span class=\"accrodion-title__icon\"><\/span>\r\n                        <\/h4>\r\n                    <\/div><!-- \/.accordian-title -->\r\n                    <div class=\"accrodion-content\">\r\n                        <div class=\"inner\">\r\n                            <p class=\"inner__text\">With the cybersecurity plan being managed by professionals, you can focus on growing your business without worrying about security threats.<\/p>\r\n                        <\/div><!-- \/.accordian-content -->\r\n                    <\/div>\r\n                <\/div><!-- \/.accordian-item -->\r\n                            <div class=\"accrodion \">\r\n                    <div class=\"accrodion-title\">\r\n                        <h4 class=\"accrodion-title__text\">Cost-Effective Security                            <span class=\"accrodion-title__icon\"><\/span>\r\n                        <\/h4>\r\n                    <\/div><!-- \/.accordian-title -->\r\n                    <div class=\"accrodion-content\">\r\n                        <div class=\"inner\">\r\n                            <p class=\"inner__text\">Access to high-level cybersecurity expertise without the cost of a full-time CISO, making it a cost-effective solution for businesses of all sizes.<\/p>\r\n                        <\/div><!-- \/.accordian-content -->\r\n                    <\/div>\r\n                <\/div><!-- \/.accordian-item -->\r\n                            <div class=\"accrodion \">\r\n                    <div class=\"accrodion-title\">\r\n                        <h4 class=\"accrodion-title__text\">Reduced Risk                            <span class=\"accrodion-title__icon\"><\/span>\r\n                        <\/h4>\r\n                    <\/div><!-- \/.accordian-title -->\r\n                    <div class=\"accrodion-content\">\r\n                        <div class=\"inner\">\r\n                            <p class=\"inner__text\">Ongoing adjustments to your security measures reduce the likelihood of breaches, ensuring a safer digital environment for your business operations.<\/p>\r\n                        <\/div><!-- \/.accordian-content -->\r\n                    <\/div>\r\n                <\/div><!-- \/.accordian-item -->\r\n                    <\/div>\r\n    <\/div><!-- \/ -->\r\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>All Service Risk Assessments Ongoing Management Cyber Posture Reporting Data Analysis Cyber Security Digital Experience Get a Free Quick Solution of IT Problem Contact Ongoing Management We manage the ongoing execution and optimization of the cybersecurity plan \u2013 monitoring, scanning, making changes or tweaks where necessary. This leaves you to focus on your core business, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-23","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/pages\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":7,"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/pages\/23\/revisions"}],"predecessor-version":[{"id":2941,"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/pages\/23\/revisions\/2941"}],"wp:attachment":[{"href":"https:\/\/infosecurity360.cloud\/index.php\/wp-json\/wp\/v2\/media?parent=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}