{"id":1737,"date":"2022-03-02T21:25:29","date_gmt":"2022-03-02T21:25:29","guid":{"rendered":"https:\/\/cisobyte.com\/?page_id=1737"},"modified":"2022-04-20T16:25:47","modified_gmt":"2022-04-20T16:25:47","slug":"email-security","status":"publish","type":"page","link":"https:\/\/cisobyte.com\/index.php\/email-security\/","title":{"rendered":"Email Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1737\" class=\"elementor elementor-1737\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a39f119 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a39f119\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-462174e5\" data-id=\"462174e5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bd063fa elementor-widget elementor-widget-heading\" data-id=\"4bd063fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Email Security<br>Managed Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0dc9a6 elementor-widget elementor-widget-icon-box\" data-id=\"6c0dc9a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t<span style=\"font-size: 30px;font-style: normal;font-weight: 400\">Why do I need this?<\/span>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae3c8c6 elementor-widget elementor-widget-icon-box\" data-id=\"ae3c8c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReduce Spam, Malware, Ransomware threats.\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3535f5ee elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3535f5ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><span style=\"font-size: 15px;font-style: normal;font-weight: 300\">While email remains the most common form of business communication, it\u2019s also a means by which hackers and other individuals with malicious intent  launch attacks and exploit vulnerabilities. (N-Able)<\/span><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">91% of cyberattacks start with an email. (Barracuda)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Email is the No. 1 threat vector. Social actions such as phishing and email scams arrive via email 96% of the time, and these security threats are always evolving. (Proofpoint)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Email is the #1 most used application by both organizations, as well as cybercriminals, enabling malware delivery, phishing, impersonation attacks, and the spread of cyber threats that are already internal to your organization. (Mimecast)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-581ee140 elementor-widget elementor-widget-icon-box\" data-id=\"581ee140\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t<span style=\"font-size: 30px;font-style: normal;font-weight: 400\">Reduce Business Email Compromise (BEC)<\/span>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c131274 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1c131274\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Business email compromise (BEC) is a scam that targets businesses via email fraud. Since mid-2016, it\u2019s reported that businesses have lost over $26 billion due to BEC scams. (N-Able)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">85% of organizations were hit by a phishing attack in 2020. Many email threats today use social engineering tactics to target users and bypass email security gateways. You need to stay ahead of cybercriminals to protect your business and data. (Barracuda)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">If you think of email security being single-layered and focused on anti-virus and anti-spam, your organization is vulnerable to targeted email-borne attacks. (Mimecast)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42921b0 elementor-widget elementor-widget-icon-box\" data-id=\"42921b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIncrease Security Awareness\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1d54e8 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b1d54e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Transform employees into a powerful line of defense against damaging phishing attacks with security awareness training. (Barracuda)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Attack methods are quickly evolving and growing more sophisticated, targeted and dangerous. Right now, the industry is faced with email-borne threats, such as phishing attacks delivering malicious attachments and URLs; impersonation attacks fueled by social engineering and aimed at tricking employees; and ransomware attacks that can encrypt your data and take entire systems offline. (Mimecast)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">One of the most successful ways of maintaining optimal email security is to regularly update your employees\u2019 cyber-awareness training. Users can easily avoid many email-related cyberattacks if they\u2019re able to identify warning signs. (N-Able)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3c554b7d\" data-id=\"3c554b7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a32f3d9 elementor-widget elementor-widget-image\" data-id=\"3a32f3d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-scaled.jpeg\" class=\"attachment-full size-full wp-image-1756\" alt=\"Email Security\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-scaled.jpeg 2560w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-300x200.jpeg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-1024x683.jpeg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-768x512.jpeg 768w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-1536x1024.jpeg 1536w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/Gj2ZWLeg-2048x1365.jpeg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Train users to recognize email threats.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29e6f7a5 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-content-middle elementor-section-height-default\" data-id=\"29e6f7a5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65f6e5f9\" data-id=\"65f6e5f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c1ee3e9 elementor-widget__width-auto elementor-widget-tablet__width-initial elementor-absolute elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2c1ee3e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInDown&quot;,&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-1024x1024.jpg\" class=\"attachment-large size-large wp-image-1180\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-1024x1024.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-300x300.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-150x150.jpg 150w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-768x768.jpg 768w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-1536x1536.jpg 1536w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img-2048x2048.jpg 2048w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj5-free-img.jpg 500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17a66651 elementor-widget__width-auto elementor-absolute elementor-invisible elementor-widget elementor-widget-image\" data-id=\"17a66651\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"992\" height=\"558\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness11.jpg\" class=\"attachment-large size-large wp-image-1199\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness11.jpg 992w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness11-300x169.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness11-768x432.jpg 768w\" sizes=\"(max-width: 992px) 100vw, 992px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-39c3eeb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39c3eeb1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-71e638cc\" data-id=\"71e638cc\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b994748 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b994748\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">cisobyte email  services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c30abb7 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7c30abb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Email was developed more than 50 years ago to deliver single lines of text from server to server. It was never intended to be a secure means of communication.\u00a0<\/p><p>Today, email remains your open front door to the internet. Your address is published in an online address book, available for anyone to view. To use email for corporate communications effectively\u00a0<span style=\"font-size: 16px; font-style: normal; font-weight: 300; letter-spacing: 0px; background-color: var( --e-global-color-60ff24b5 );\">requires <\/span><span style=\"font-size: 16px; letter-spacing: 0px; background-color: var( --e-global-color-60ff24b5 );\">permitting the whole world through that door, into your networks, your servers and your endpoints, including all the unwanted spam and malware, and all other malicious content.<\/span><\/p><p>CISObyte has 15 years of experience delivering and managing email security solutions, including proper DNS security protocol configuration and optimized configuration and administration of many leading on-premise and cloud-managed solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17629682 elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"17629682\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-sink\" href=\"https:\/\/cisobyte.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">We can help<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25a7b83c elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-image\" data-id=\"25a7b83c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-1024x1024.jpg\" class=\"attachment-large size-large wp-image-1178\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-1024x1024.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-300x300.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-150x150.jpg 150w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-768x768.jpg 768w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-1536x1536.jpg 1536w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7-2048x2048.jpg 2048w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/proj7.jpg 500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e04458 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e04458\" data-element_type=\"section\" data-e-type=\"section\" id=\"services\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5030623d\" data-id=\"5030623d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-303530da elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"303530da\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDNS <br>Configuration\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCombat spoofing. Use MX, A, PTR, SPF, DKIM, DMARC, ARC, and DNSSEC to ensure that only authorized senders transmit email.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dd7e66 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"9dd7e66\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t<span style=\"font-size: 45px;font-style: normal;font-weight: 400;letter-spacing: -1.66px\">EMAIL SECURITY CONFIGURATION<\/span>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe'll Install\/deploy, manage, and tune your selected email security systems, tailored to your organization's specific needs. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d49a8d elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"8d49a8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDNS <br>Configuration\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIt's here twice because it really is the simplest way to start to combat spoofing threats. Use MX, A, PTR, SPF, DKIM, DMARC, ARC, and DNSSEC to ensure that only authorized senders transmit email.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-19425ef3\" data-id=\"19425ef3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23b3b2ba elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"23b3b2ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t<span style=\"font-size: 45px;font-style: normal;font-weight: 400;letter-spacing: -1.66px\">PROVIDER-AGNOSTIC<\/span>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<span style=\"font-size: 16px;font-style: normal;font-weight: 400\">Pick your preferred security vendor, or let us help you decide which is right for you. I can migrate your current solution or manage your existing as you need. H<\/span><span style=\"font-size: 16px;font-style: normal;font-weight: 400\">ands-on experience deploying, configuring, maintaining and troubleshooting leading vendors, including Proofpoint, Mimecast, Barracuda, Cisco, and Forcepoint.<\/span>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41c9b832 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"41c9b832\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTroubleshooting\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith 15 years of experience, if you've got an ongoing or new issue with mail delivery, we'll find the issue fast and get your mail flowing again.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f04ed3f elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"5f04ed3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/cisobyte.com\/index.php\/contact\/\" >\n\t\t\t\t\t\t\tClick here<br>to talk now\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tClick the button above right now.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-294d877e elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-height-default\" data-id=\"294d877e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1a4e0eab\" data-id=\"1a4e0eab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-208c2e4d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"208c2e4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1974\" height=\"1838\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/20180822_092752-2.jpg\" class=\"attachment-full size-full wp-image-1255\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/20180822_092752-2.jpg 1974w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/20180822_092752-2-300x279.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/20180822_092752-2-1024x953.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/20180822_092752-2-768x715.jpg 768w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/20180822_092752-2-1536x1430.jpg 1536w\" sizes=\"(max-width: 1974px) 100vw, 1974px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\">Your email guru:<\/p><p class=\"elementor-image-box-description\">Bruce Levenberg<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfa9b10 elementor-widget elementor-widget-text-editor\" data-id=\"3bfa9b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fifteen years of experience running email servers, cloud email systems, on-premise and cloud-based email security systems. Formerly served as the Principal Technical Support Engineer for Email Security for Forcepoint.<\/p><p>Other Relevant Security Certifications:\u00a0<\/p><p>HarvardX Cybersecurity: Managing Risk in the Information Age<\/p><p>Cisco Certified Security Professional (CCNP Security)\u00a0<\/p><p>Microsoft Certified System Engineer (MCSE) Security<\/p><p>Microsoft Certified Technology Specialist (MCTS) Exchange 2007<\/p><p>Security+<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-50569adb elementor-invisible\" data-id=\"50569adb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInRight&quot;,&quot;animation_tablet&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43bf6022 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"43bf6022\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Notable Past Clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-651b3695 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"651b3695\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4807d0bf\" data-id=\"4807d0bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41fb8c09 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"41fb8c09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"630\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/walmart_logo.jpg\" class=\"attachment-full size-full wp-image-1773\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/walmart_logo.jpg 1200w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/walmart_logo-300x158.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/walmart_logo-1024x538.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/walmart_logo-768x403.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Walmart<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b8c4263 elementor-widget elementor-widget-text-editor\" data-id=\"7b8c4263\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Fortune global #1 company, so no implementation is too large.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5aca3080\" data-id=\"5aca3080\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-115d598d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"115d598d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/home-depot-storefront_1200xx3370-1896-0-176.jpg\" class=\"attachment-full size-full wp-image-1774\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/home-depot-storefront_1200xx3370-1896-0-176.jpg 1200w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/home-depot-storefront_1200xx3370-1896-0-176-300x169.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/home-depot-storefront_1200xx3370-1896-0-176-1024x576.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/home-depot-storefront_1200xx3370-1896-0-176-768x432.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Home Depot<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d4782b5 elementor-widget elementor-widget-text-editor\" data-id=\"7d4782b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Retail and logistics? Home depot is now a technology and security powerhouse.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bedf568 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bedf568\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-582344b\" data-id=\"582344b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe26ac3 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"fe26ac3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/rackspace.jpg\" class=\"attachment-full size-full wp-image-1785\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/rackspace.jpg 1200w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/rackspace-300x169.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/rackspace-1024x576.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/rackspace-768x432.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Rackspace<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83c3564 elementor-widget elementor-widget-text-editor\" data-id=\"83c3564\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A former employer and a former client. With globally dispersed private and cloud networks and client-connected networks and systems, no deployment can be too complex.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-02ab64f\" data-id=\"02ab64f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2aae535 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2aae535\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/bayer-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-image-1786\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Bayer\/<br>Monsanto<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68dcc08 elementor-widget elementor-widget-text-editor\" data-id=\"68dcc08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aspirin provides the daily relief needed by IT security professionals around the globe. We protect your email, providing stress relief.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-30c7b4a7 elementor-section-height-min-height elementor-section-items-stretch elementor-reverse-mobile elementor-section-boxed elementor-section-height-default\" data-id=\"30c7b4a7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-5ccbe4fd\" data-id=\"5ccbe4fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-402fbee elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"402fbee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/texasHHSC.jpeg\" class=\"attachment-full size-full wp-image-1781\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/texasHHSC.jpeg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/texasHHSC-150x150.jpeg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Managed and Administered Cisco enterprise-class Email Security deployment, protecting 50 thousand users in two thousand sites across Texas.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dc07431 elementor-widget elementor-widget-heading\" data-id=\"1dc07431\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Texas HHSC<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-bfac1d3\" data-id=\"bfac1d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4addf9 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a4addf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1066\" height=\"630\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/raytheon_logo.jpg\" class=\"attachment-full size-full wp-image-1784\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/raytheon_logo.jpg 1066w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/raytheon_logo-300x177.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/raytheon_logo-1024x605.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/raytheon_logo-768x454.jpg 768w\" sizes=\"(max-width: 1066px) 100vw, 1066px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\"><span style=\"font-size: 16px;font-style: normal;font-weight: 300;white-space: normal\">Do you have high-security needs due to Classified, Controlled Unclassified or other sensitive, regulated or private information? I have the experience to assist.<\/span><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd50be elementor-widget elementor-widget-heading\" data-id=\"efd50be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span style=\", sans-serif;font-size: 30px;font-style: normal;font-weight: normal;letter-spacing: normal;text-transform: uppercase;white-space: pre-wrap;background-color: var( --e-global-color-astglobalcolor5 );float: none\">RAYTHEON<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-97d7826\" data-id=\"97d7826\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6a9c71 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a6a9c71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1152\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/3m-2.jpg\" class=\"attachment-full size-full wp-image-1782\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/3m-2.jpg 1280w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/3m-2-300x270.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/3m-2-1024x922.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/3m-2-768x691.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">They manufacture the masks we breathed in. Send an email in thanks.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd47191 elementor-widget elementor-widget-heading\" data-id=\"bd47191\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">3M<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-7a3ea28\" data-id=\"7a3ea28\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a9cba8b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a9cba8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"956\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/scotiabank.jpg\" class=\"attachment-full size-full wp-image-1783\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/scotiabank.jpg 1300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/scotiabank-300x221.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/scotiabank-1024x753.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/scotiabank-768x565.jpg 768w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Mass mailings - from newsletters to transaction reports to monthly statements - we've got the experience to troubleshoot your issues and resolve them permanently.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7593af4 elementor-widget elementor-widget-heading\" data-id=\"7593af4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Scotiabank<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-309a4f83\" data-id=\"309a4f83\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42765f6b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"42765f6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/forcepoint.jpg\" class=\"attachment-full size-full wp-image-1790\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/forcepoint.jpg 800w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/forcepoint-300x300.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/forcepoint-150x150.jpg 150w, https:\/\/cisobyte.com\/wp-content\/uploads\/2022\/03\/forcepoint-768x768.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Your authoritative source for securing any multi-national, amalgamated organization. Successfully deploying your own security software is just as complex as you think it would be.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cc00168 elementor-widget elementor-widget-heading\" data-id=\"5cc00168\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">forcepoint<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64e831ef elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-content-middle elementor-section-height-default\" data-id=\"64e831ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-58510a7d\" data-id=\"58510a7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-121bef6 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"121bef6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Advice, for free<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bbe0d41 elementor-widget elementor-widget-text-editor\" data-id=\"4bbe0d41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you send mass emails, or are a governmental organization, you may be subject to various regulations, and you should ensure that your inbound and outbound email is protected accordingly and compliant. If you collect and maintain controlled data of any kind, including personal information, as simple as names, you are subject to those regulations. You must protect that data with due care. Give me a call to discuss your needs and how I can help protect you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61db775f elementor-align-left elementor-mobile-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"61db775f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-sink\" href=\"https:\/\/cisobyte.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3315dbc6\" data-id=\"3315dbc6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-108cfd9c elementor-widget__width-auto elementor-widget elementor-widget-image\" data-id=\"108cfd9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness03-1024x683.jpg\" class=\"attachment-large size-large wp-image-1209\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness03-1024x683.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness03-300x200.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness03-768x512.jpg 768w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness03-1536x1024.jpg 1536w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/UnfinsihedBusiness03.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Email SecurityManaged Services Why do I need this? Reduce Spam, Malware, Ransomware threats. While email remains the most common form of business communication, it\u2019s also a means by which hackers and other individuals with malicious intent launch attacks and exploit vulnerabilities. (N-Able) 91% of cyberattacks start with an email. (Barracuda) Email is the No. 1 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1737","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages\/1737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1737"}],"version-history":[{"count":76,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages\/1737\/revisions"}],"predecessor-version":[{"id":1860,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages\/1737\/revisions\/1860"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}