{"id":200,"date":"2021-10-15T11:27:29","date_gmt":"2021-10-15T10:27:29","guid":{"rendered":"http:\/\/j-adams.co.uk\/?page_id=200"},"modified":"2024-04-15T10:29:15","modified_gmt":"2024-04-15T09:29:15","slug":"system-security","status":"publish","type":"page","link":"https:\/\/regis-it.co.uk\/it-support\/system-security\/","title":{"rendered":"System Security"},"content":{"rendered":"

[et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Hero” _builder_version=”4.16″ background_image=”https:\/\/regis-it.co.uk\/wp-content\/uploads\/2022\/03\/Security-HDR.jpg” parallax=”on” custom_padding=”0px|0|0px|0px|false|false” global_colors_info=”{}”][et_pb_fullwidth_header title=”System Security” admin_label=”Fullwidth Header” _builder_version=”4.21.0″ _module_preset=”0f7272d4-80e5-4dae-8c01-6dfdb24ad189″ button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” global_colors_info=”{}”]<\/p>\n

If your systems are connected to the internet, how secure are they? Even if you don’t connect to the internet, do you have data that must be kept secure within your business? With a complimentary review to assess the security of your computer systems\u00a0 & processes, we’ll recommend services to provide the appropriate level of security your business needs.<\/span><\/p>\n

[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|off” _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”0px||0px||true|false” animation_style=”slide” animation_direction=”left” animation_duration=”600ms” animation_intensity_slide=”5%” global_module=”278283″ saved_tabs=”all” global_colors_info=”{}”][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Why choose us” _builder_version=”4.21.0″ custom_padding=”||20px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.21.0″ _module_preset=”8e08c77e-507b-4844-8894-20b6163aa0c4″ global_colors_info=”{}”]<\/p>\n

Protection<\/p>\n

Protect your assets \u2013 protect your reputation<\/strong><\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.24.2″ custom_margin=”||70px||false|false” global_colors_info=”{}”]<\/p>\n

Security of your systems & processes is of paramount importance these days. Threats come from both inside and outside your business. Modern day security is not just about running high-quality anti-malware services. Many businesses are well aware of the many thousands of potential threats that circulate the internet every day. From relatively harmless viruses that cause a nuisance <\/span>to sophisticated malware that can shut down your business, the list is endless. However these need not be a concern if appropriate security measures are in place.<\/span><\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.21.0″ _module_preset=”8e08c77e-507b-4844-8894-20b6163aa0c4″ custom_margin=”||30px||false|false” global_colors_info=”{}”]<\/p>\n

Trust<\/p>\n

Why choose us<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.24.3″ global_colors_info=”{}”]<\/p>\n

Security is not just about your systems; the security of your data is critical too. Laws require all companies to make public any security breaches and whether or not client data was compromised. It’s not just comprised client data that could affect your reputation. If your systems become the source of a virus that hits your clients through your email contact lists, your reputation could suffer.<\/p>\n

Our thorough security review will pinpoint areas where data or systems could be at risk. From this we can formulate an action plan to plug any holes in your security system, procedures and policies before that can be exploited.<\/p>\n

Consider this: if your systems are connected to the internet, then in the time it has taken you to read this page there will have been around 5 casual attempts to hack into your systems.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Why choose us” _builder_version=”4.21.0″ custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23.4″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.23.4″ text_font=”Share Tech||||||||” text_text_color=”rgba(0,0,0,0.07)” text_font_size=”100px” text_line_height=”0.2em” header_font=”||||||||” header_2_font=”Share Tech||||||||” header_2_font_size=”48px” header_2_line_height=”1.4em” custom_margin=”||30px||false” custom_margin_tablet=”||0px|” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” text_font_size_tablet=”80px” text_font_size_phone=”60px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”” header_2_font_size_phone=”36px” header_2_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

How<\/p>\n

Threat Protection<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Open Sans||||||||” text_line_height=”1.8em” max_width_last_edited=”off|desktop” custom_padding=”||4px|||” global_colors_info=”{}”]<\/p>\n

We work with various security providers to ensure you have protection that you can depend on. We thoroughly analyse and test every solution we recommend to clients. We use those system services to protect our own systems so you can be sure we’ve put them through the mill!<\/span><\/p>\n

The modern security landscape is ever-changing, so we keep abreast of what’s going on to ensure your stay ahead of the threat curve.<\/span><\/p>\n

<\/span><\/p>\n

[\/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM2In19@” button_text=”Talk With Us” _builder_version=”4.24.3″ _dynamic_attributes=”button_url” _module_preset=”af988a22-2bad-41f0-8ca0-d28ee65f0177″ button_border_radius_hover=”100px” button_letter_spacing_hover=”5px” button_bg_color_hover=”#3980f9″ locked=”off” global_colors_info=”{%22gcid-22e6e450-0425-415d-ae0b-e30107840857%22:%91%22button_bg_color%22%93}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”120px|||” custom_padding_tablet=”40px|||” custom_padding_phone=”” custom_padding_last_edited=”on|tablet” global_colors_info=”{}” padding_tablet=”40px|||” padding_last_edited=”on|tablet” custom_padding__hover=”|||” padding_phone=”40px|||”][et_pb_blurb title=”Managed Anti-virus” use_icon=”on” font_icon=”||divi||400″ icon_color=”gcid-22e6e450-0425-415d-ae0b-e30107840857″ _builder_version=”4.16.0″ _module_preset=”b9dac918-334c-4b21-b00d-74e803dad808″ icon_font_size=”28px” locked=”off” global_colors_info=”{%22gcid-22e6e450-0425-415d-ae0b-e30107840857%22:%91%22icon_color%22%93}”][\/et_pb_blurb][et_pb_blurb title=”Cloud Security” use_icon=”on” font_icon=”||divi||400″ icon_color=”gcid-22e6e450-0425-415d-ae0b-e30107840857″ _builder_version=”4.23.4″ _module_preset=”b9dac918-334c-4b21-b00d-74e803dad808″ icon_font_size=”28px” locked=”off” global_colors_info=”{%22gcid-22e6e450-0425-415d-ae0b-e30107840857%22:%91%22icon_color%22%93}”][\/et_pb_blurb][et_pb_blurb title=”Phishing Protection” use_icon=”on” font_icon=”||divi||400″ icon_color=”gcid-22e6e450-0425-415d-ae0b-e30107840857″ _builder_version=”4.23.4″ _module_preset=”b9dac918-334c-4b21-b00d-74e803dad808″ icon_font_size=”28px” locked=”off” global_colors_info=”{%22gcid-22e6e450-0425-415d-ae0b-e30107840857%22:%91%22icon_color%22%93}”][\/et_pb_blurb][et_pb_blurb title=”Remediation” use_icon=”on” font_icon=”||divi||400″ icon_color=”gcid-22e6e450-0425-415d-ae0b-e30107840857″ _builder_version=”4.23.4″ _module_preset=”b9dac918-334c-4b21-b00d-74e803dad808″ icon_font_size=”28px” locked=”off” global_colors_info=”{%22gcid-22e6e450-0425-415d-ae0b-e30107840857%22:%91%22icon_color%22%93}”][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

If your systems are connected to the internet, how secure are they? Even if you don’t connect to the internet, do you have data that must be kept secure within your business? With a complimentary review to assess the security of your computer systems\u00a0 & processes, we’ll recommend services to provide the appropriate level of […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":29,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-200","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"\nSystem Security - Regis IT Ltd<\/title>\n<meta name=\"description\" content=\"Information about security reviews\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/regis-it.co.uk\/it-support\/system-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"System Security - Regis IT Ltd\" \/>\n<meta property=\"og:description\" content=\"Information about security reviews\" \/>\n<meta property=\"og:url\" content=\"https:\/\/regis-it.co.uk\/it-support\/system-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Regis IT Ltd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/regisit\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-15T09:29:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/regis-it.co.uk\/it-support\/system-security\/\",\"url\":\"https:\/\/regis-it.co.uk\/it-support\/system-security\/\",\"name\":\"System Security - Regis IT Ltd\",\"isPartOf\":{\"@id\":\"https:\/\/regis-it.co.uk\/#website\"},\"datePublished\":\"2021-10-15T10:27:29+00:00\",\"dateModified\":\"2024-04-15T09:29:15+00:00\",\"description\":\"Information about security reviews\",\"breadcrumb\":{\"@id\":\"https:\/\/regis-it.co.uk\/it-support\/system-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/regis-it.co.uk\/it-support\/system-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/regis-it.co.uk\/it-support\/system-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/regis-it.co.uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Support\",\"item\":\"https:\/\/regis-it.co.uk\/it-support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"System Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/regis-it.co.uk\/#website\",\"url\":\"https:\/\/regis-it.co.uk\/\",\"name\":\"Regis IT Ltd\",\"description\":\"Fast, Friendly, Trustworthy Tech Support\",\"publisher\":{\"@id\":\"https:\/\/regis-it.co.uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/regis-it.co.uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/regis-it.co.uk\/#organization\",\"name\":\"Regis IT\",\"url\":\"https:\/\/regis-it.co.uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/regis-it.co.uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/regis-it.co.uk\/wp-content\/uploads\/2022\/06\/Pink-Logo-v3-e1687362898243.png\",\"contentUrl\":\"https:\/\/regis-it.co.uk\/wp-content\/uploads\/2022\/06\/Pink-Logo-v3-e1687362898243.png\",\"width\":300,\"height\":85,\"caption\":\"Regis IT\"},\"image\":{\"@id\":\"https:\/\/regis-it.co.uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/regisit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"System Security - Regis IT Ltd","description":"Information about security reviews","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/regis-it.co.uk\/it-support\/system-security\/","og_locale":"en_GB","og_type":"article","og_title":"System Security - Regis IT Ltd","og_description":"Information about security reviews","og_url":"https:\/\/regis-it.co.uk\/it-support\/system-security\/","og_site_name":"Regis IT Ltd","article_publisher":"https:\/\/www.facebook.com\/regisit","article_modified_time":"2024-04-15T09:29:15+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/regis-it.co.uk\/it-support\/system-security\/","url":"https:\/\/regis-it.co.uk\/it-support\/system-security\/","name":"System Security - Regis IT Ltd","isPartOf":{"@id":"https:\/\/regis-it.co.uk\/#website"},"datePublished":"2021-10-15T10:27:29+00:00","dateModified":"2024-04-15T09:29:15+00:00","description":"Information about security reviews","breadcrumb":{"@id":"https:\/\/regis-it.co.uk\/it-support\/system-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/regis-it.co.uk\/it-support\/system-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/regis-it.co.uk\/it-support\/system-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/regis-it.co.uk\/"},{"@type":"ListItem","position":2,"name":"IT Support","item":"https:\/\/regis-it.co.uk\/it-support\/"},{"@type":"ListItem","position":3,"name":"System Security"}]},{"@type":"WebSite","@id":"https:\/\/regis-it.co.uk\/#website","url":"https:\/\/regis-it.co.uk\/","name":"Regis IT Ltd","description":"Fast, Friendly, Trustworthy Tech Support","publisher":{"@id":"https:\/\/regis-it.co.uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/regis-it.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/regis-it.co.uk\/#organization","name":"Regis IT","url":"https:\/\/regis-it.co.uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/regis-it.co.uk\/#\/schema\/logo\/image\/","url":"https:\/\/regis-it.co.uk\/wp-content\/uploads\/2022\/06\/Pink-Logo-v3-e1687362898243.png","contentUrl":"https:\/\/regis-it.co.uk\/wp-content\/uploads\/2022\/06\/Pink-Logo-v3-e1687362898243.png","width":300,"height":85,"caption":"Regis IT"},"image":{"@id":"https:\/\/regis-it.co.uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/regisit"]}]}},"_links":{"self":[{"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/pages\/200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":50,"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/pages\/200\/revisions"}],"predecessor-version":[{"id":279946,"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/pages\/200\/revisions\/279946"}],"up":[{"embeddable":true,"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/pages\/29"}],"wp:attachment":[{"href":"https:\/\/regis-it.co.uk\/wp-json\/wp\/v2\/media?parent=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}