{"id":564,"date":"2023-06-12T02:28:57","date_gmt":"2023-06-12T01:28:57","guid":{"rendered":"https:\/\/vikishas.com\/?page_id=564"},"modified":"2023-06-23T16:47:33","modified_gmt":"2023-06-23T15:47:33","slug":"cyber-security-2","status":"publish","type":"page","link":"https:\/\/vikishas.com\/index.php\/cyber-security-2\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<nav style=\"background-color: #c7942c;\" class=\"has-text-color has-white-color has-background is-responsive items-justified-left no-wrap wp-block-navigation is-content-justification-left is-nowrap is-layout-flex wp-container-core-navigation-is-layout-f56a869c wp-block-navigation-is-layout-flex\" aria-label=\"Company\" \n\t\t data-wp-interactive=\"core\/navigation\" data-wp-context='{\"overlayOpenedBy\":{\"click\":false,\"hover\":false,\"focus\":false},\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}'><button aria-haspopup=\"dialog\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open\" \n\t\t\t\tdata-wp-on-async--click=\"actions.openMenuOnClick\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-container\"  id=\"modal-1\" \n\t\t\t\tdata-wp-class--has-modal-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-class--is-menu-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-watch=\"callbacks.initMenu\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t\tdata-wp-on-async--focusout=\"actions.handleMenuFocusout\"\n\t\t\t\ttabindex=\"-1\"\n\t\t\t>\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\t\tdata-wp-bind--aria-modal=\"state.ariaModal\"\n\t\t\t\tdata-wp-bind--aria-label=\"state.ariaLabel\"\n\t\t\t\tdata-wp-bind--role=\"state.roleAttribute\"\n\t\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\t\tdata-wp-on-async--click=\"actions.closeMenuOnClick\"\n\t\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"m13.06 12 6.47-6.47-1.06-1.06L12 10.94 5.53 4.47 4.47 5.53 10.94 12l-6.47 6.47 1.06 1.06L12 13.06l6.47 6.47 1.06-1.06L13.06 12Z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" \n\t\t\t\tdata-wp-watch=\"callbacks.focusFirstElement\"\n\t\t\t id=\"modal-1-content\">\n\t\t\t\t\t\t\t\t<ul style=\"background-color: #c7942c;\" class=\"wp-block-navigation__container has-text-color has-white-color has-background is-responsive items-justified-left no-wrap wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/application-development\/\"><span class=\"wp-block-navigation-item__label\">Application Development<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/agile-development-3\/\"><span class=\"wp-block-navigation-item__label\">Agile Development<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/big-data-data-analysis\/\"><span class=\"wp-block-navigation-item__label\">Big Data &#038; Data Analysis<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/cloud-computing-3\/\"><span class=\"wp-block-navigation-item__label\">Cloud Computing<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/cyber-security-2\/\"><span class=\"wp-block-navigation-item__label\">Cyber Security<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/machine-learning\/\"><span class=\"wp-block-navigation-item__label\">Machine Learning<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/mission-support\/\"><span class=\"wp-block-navigation-item__label\">Mission Support<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/vikishas.com\/index.php\/talent-acquisition\/\"><span class=\"wp-block-navigation-item__label\">Talent Acquisition<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/nav>\n\n\n<div class=\"responsive\" style=\"float: left; padding-right: 20px;\">\n<div><br><span style=\"color: #c7942c; font-size: x-large;\"><b>Cyber Security<\/b><\/span><br><\/div>\n<\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"704\" height=\"575\" src=\"https:\/\/vikishas.com\/wp-content\/uploads\/2023\/06\/cyber-2120014_1280.png\" alt=\"\" class=\"wp-image-1073\" srcset=\"https:\/\/vikishas.com\/wp-content\/uploads\/2023\/06\/cyber-2120014_1280.png 704w, https:\/\/vikishas.com\/wp-content\/uploads\/2023\/06\/cyber-2120014_1280-300x245.png 300w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/figure><\/div>\n\n\n<br><div class=\"abtCompanyText\">\nCybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.\n\nImplementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. <br><br>\n<div><span style=\"color: #c7942c; font-size: medium; font-weight: bold;\"><u>Cyber Security with Vikishas<\/u><br><\/div>\nCybersecurity is one of the core service lines within Vikishas, and our company\u2019s security service portfolio covers the full landscape of information security needs of our clients.<br><br>\t \n\n <ul><li><span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Threat Landscape:<\/span>Vikishas stays up to date with the latest threats and helps clients proactively mitigate risks. <\/li>\t \n<li><span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Cyber Security Services: <\/span> Vikishas offered services such as vulnerability assessments, penetration testing, incident response, security audits, and security awareness training.\t \n<li> <span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Risk Management:<\/span> Vikishas  helps clients identify vulnerabilities, assess risks, and develop risk mitigation strategies tailored to their specific needs.<\/li>\t \n<li><span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Network Security:<\/span> Vikishas&#8217; ability to design and implement secure network architectures, deploy firewalls and intrusion detection systems, and monitor network traffic for potential threats.\t \n<li><span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Data Protection: <\/span> Vikishas expertise in encryption, data loss prevention (DLP), access control, and secure data storage to ensure the confidentiality and integrity of sensitive information.\n<li><span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Compliance and Regulations: <\/span> Vikishas&#8217; understanding of industry compliance standards and regulations related to cyber security, such as GDPR, HIPAA, or PCI DSS.\n<li><span style=\"color: #122e5d; font-size: medium; font-weight: bold;\">Employee Awareness and Training:<\/span> Vikishas&#8217;  focus on employee awareness and training in cyber security.We offes customized training programs to educate employees about best practices, phishing prevention, and safe online behaviors.\n<br><br>\t \nOur stakeholders benefit from this holistic approach, will help potential clients understand the value Vikishas can bring to their cyber security needs and how the company can help them mitigate risks and protect their digital assets. \n<\/ul>\t \n<\/div>\t \n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers&hellip;<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/vikishas.com\/index.php\/cyber-security-2\/\" class=\"themebutton2\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-564","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/pages\/564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/comments?post=564"}],"version-history":[{"count":11,"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/pages\/564\/revisions"}],"predecessor-version":[{"id":1140,"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/pages\/564\/revisions\/1140"}],"wp:attachment":[{"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/media?parent=564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/categories?post=564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vikishas.com\/index.php\/wp-json\/wp\/v2\/tags?post=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}