{"id":237,"date":"2024-10-10T23:27:13","date_gmt":"2024-10-10T23:27:13","guid":{"rendered":"https:\/\/symtec.flywheelsites.com\/?page_id=237"},"modified":"2026-05-01T02:10:43","modified_gmt":"2026-05-01T08:10:43","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/symtec.com\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n\n\t<section class=\"section\" id=\"section_744845926\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/10\/gray-bg.svg\" class=\"bg attachment- size-\" alt=\"\" \/>\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\t<div class=\"ux-shape-divider ux-shape-divider--bottom ux-shape-divider--style-curve-2\">\n\t\t<svg viewBox=\"0 0 1000 100\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n\t<path class=\"ux-shape-fill\" d=\"M-24 100C493.5 -2.66667 804 -2.66667 1011 100H-24Z\"\/>\n<\/svg>\n\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"gap-2129689198\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-2129689198 {\n  padding-top: 150px;\n}\n@media (min-width:850px) {\n  #gap-2129689198 {\n    padding-top: 100px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-middle align-center\"  id=\"row-777514112\">\n\n\n\t<div id=\"col-1159718910\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2092443342\" class=\"text\">\n\t\t\n\n<h1 class=\"mb-0\"> Cybersecurity Solutions<\/h1>\n\n\t\t\n<style>\n#text-2092443342 {\n  font-size: 1.1rem;\n}\n@media (min-width:550px) {\n  #text-2092443342 {\n    font-size: 1.3rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<p>The media is full of stories about businesses, both local and national, that have faced devastating financial and operational impacts due to cyber breaches. These incidents highlight a harsh reality: the stakes are high when it comes to cybersecurity.<\/p>\n\n<a href=\"\/free-consultation\/\" class=\"button primary\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t\t<span>Get Started<\/span>\n\t<\/a>\n\n\n<a href=\"tel:+14358179471\" class=\"button secondary\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t<i class=\"icon-phone\" aria-hidden=\"true\"><\/i>\t<span>(435) 817-9471<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1159718910 > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n@media (min-width:850px) {\n  #col-1159718910 > .col-inner {\n    padding: 0px 50px 0px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1251429481\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_2022992226\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img decoding=\"async\" width=\"1020\" height=\"1020\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/10\/cybersecurity.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_2022992226 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1924497034\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1924497034 {\n  padding-top: 127px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_744845926 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 60vh;\n}\n#section_744845926 .section-bg-overlay {\n  background-color: rgba(255, 255, 255, 0.924);\n}\n#section_744845926 .section-bg img {\n  object-position: 90% 0%;\n}\n#section_744845926 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section\" id=\"section_1075193268\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/10\/logo-bg.svg\" class=\"bg attachment- size-\" alt=\"\" \/>\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row align-middle align-center\"  id=\"row-1280970967\">\n\n\n\t<div id=\"col-309095867\" class=\"col medium-10 small-12 large-6\"  data-animate=\"bounceInLeft\">\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_430545604\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img decoding=\"async\" width=\"1020\" height=\"1019\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity1.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity1.png 1024w, https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity1-500x500.png 500w, https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity1-150x150.png 150w, https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity1-768x767.png 768w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_430545604 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1678155993\" class=\"col medium-10 small-12 large-6 medium-col-first\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-4131317480\" class=\"text\">\n\t\t\n\n<h2>Protect Your Business with Scalable and Affordable Cybersecurity Solutions<br \/>\n<\/h2>\n\t\t\n<style>\n#text-4131317480 {\n  font-size: 1.15rem;\n}\n<\/style>\n\t<\/div>\n\t\n<p>The good news? Cybersecurity protections are becoming increasingly affordable and scalable for businesses of all sizes. While no solution can completely guarantee immunity from a data breach, taking a proactive, multi-layered approach significantly reduces risks and strengthens your defense.<\/p>\n<a href=\"\/free-consultation\/\" class=\"button secondary\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t\t<span>Get a Free Cybersecurity Consultation<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1678155993 > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n@media (min-width:850px) {\n  #col-1678155993 > .col-inner {\n    padding: 0px 0px 0px 50px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1238279284\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1238279284 {\n  padding-top: 90px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-center\"  id=\"row-1654757947\">\n\n\n\t<div id=\"col-366245950\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3115919587\" class=\"text\">\n\t\t\n\n<h2>Effective Cybersecurity Requires a Team Effort<br \/>\n<\/h2>\n\t\t\n<style>\n#text-3115919587 {\n  font-size: 1rem;\n}\n@media (min-width:550px) {\n  #text-3115919587 {\n    font-size: 1.3rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<p>At SymTec, we help you identify your unique risks and vulnerabilities. We understand that not all protections make sense for every business, which is why we create tailored, cost-effective plans to safeguard your operations. Building a robust cybersecurity strategy requires collaboration and attention to detail across several key areas:<\/p>\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-366245950 > .col-inner {\n  padding: 0px 50px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1178450042\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"accordion\">\n\n\t<div id=\"accordion-2427943330\" class=\"accordion-item\">\n\t\t<a id=\"accordion-2427943330-label\" class=\"accordion-title plain active\" href=\"#accordion-item-smart-employees\" aria-expanded=\"true\" aria-controls=\"accordion-2427943330-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Smart Employees<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-2427943330-content\" class=\"accordion-inner\" style=\"display: block;\" aria-labelledby=\"accordion-2427943330-label\">\n\t\t\t\n\n<p>A well-trained workforce is the first line of defense, staying alert to phishing emails, social engineering, and other potential threats.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-1760200155\" class=\"accordion-item\">\n\t\t<a id=\"accordion-1760200155-label\" class=\"accordion-title plain\" href=\"#accordion-item-trusted-vendors\" aria-expanded=\"false\" aria-controls=\"accordion-1760200155-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Trusted Vendors<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-1760200155-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-1760200155-label\">\n\t\t\t\n\n<p>Partner with vendors who prioritize secure practices in their tools and services.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-4235723346\" class=\"accordion-item\">\n\t\t<a id=\"accordion-4235723346-label\" class=\"accordion-title plain\" href=\"#accordion-item-it-best-practices\" aria-expanded=\"false\" aria-controls=\"accordion-4235723346-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>IT Best Practices<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-4235723346-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-4235723346-label\">\n\t\t\t\n\n<p>Implement processes designed to close known vulnerabilities, such as regular updates and patch management.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-1582470285\" class=\"accordion-item\">\n\t\t<a id=\"accordion-1582470285-label\" class=\"accordion-title plain\" href=\"#accordion-item-policies-and-procedures\" aria-expanded=\"false\" aria-controls=\"accordion-1582470285-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Policies and Procedures<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-1582470285-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-1582470285-label\">\n\t\t\t\n\n<p>Use advanced solutions that actively identify and block attacks before they cause harm.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-2763466568\" class=\"accordion-item\">\n\t\t<a id=\"accordion-2763466568-label\" class=\"accordion-title plain\" href=\"#accordion-item-detection-and-prevention-tools\" aria-expanded=\"false\" aria-controls=\"accordion-2763466568-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Detection and Prevention Tools<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-2763466568-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-2763466568-label\">\n\t\t\t\n\n<p>Develop a clear framework to assess, manage, and mitigate risks effectively.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1783539164\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1783539164 {\n  padding-top: 90px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-center\"  id=\"row-299387625\">\n\n\n\t<div id=\"col-1998910368\" class=\"col pb-0 medium-10 small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"row row-collapse\"  id=\"row-1696000730\">\n\n\n\t<div id=\"col-468816307\" class=\"col medium-12 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3836288678\" class=\"text\">\n\t\t\n\n<h2 class=\"mb-0\">What Are the Costs of a Cyber Breach?<\/h2>\n\n\t\t\n<style>\n#text-3836288678 {\n  font-size: 1.3rem;\n}\n<\/style>\n\t<\/div>\n\t\n<p>The consequences of a cyber breach extend far beyond financial losses:<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row align-equal row-box-shadow-5\"  id=\"row-24041811\">\n\n\n\t<div id=\"col-1866689046\" class=\"col medium-12 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 45px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M32 184c35.3 0 64-28.7 64-64l0-.5c-18.5-1.4-37.1-4.4-55.8-9.5c-2.2-.6-4.9-.2-6.9 1.2c-.9 .6-1.2 1.1-1.3 1.2c0 0 0 0 0 0s0 0 0 0s0 0 0 0s0 0 0 0c0 0 0 0 0 .1L32 184zm0 192l0 46.3c0 6.8 3.7 10.4 6.2 11.3C57.3 440.8 76.5 445 96 446.8l0-6.8c0-35.3-28.7-64-64-64zm0-32c53 0 96 43 96 96l0 8c44.7-1 91.1-11.7 141.3-24.5c4.3-1.1 8.6-2.2 13-3.3c51.8-13.3 108-27.6 165.7-28.6c.2-52.8 43.1-95.6 96-95.6l0-128c-53 0-96-43-96-96l0-8c-44.7 1-91.1 11.7-141.3 24.5c-4.3 1.1-8.6 2.2-13 3.3c-51.8 13.3-108 27.6-165.7 28.6c-.2 52.8-43.1 95.6-96 95.6l0 128zm503.8 58c2.2 .6 4.9 .2 6.9-1.2c.9-.6 1.2-1.1 1.3-1.2c0 0 0 0 0 0l0-.1 0-71.5c-35.3 0-64 28.7-64 64l0 .5c18.5 1.4 37.1 4.4 55.8 9.5zM480 72c0 35.3 28.7 64 64 64l0-46.3c0-6.8-3.7-10.4-6.2-11.3C518.7 71.2 499.5 67 480 65.2l0 6.8zM0 422.3L0 112.5C0 88.6 25.6 72.8 48.7 79.1c79.8 21.8 159.6 1.5 239.3-18.9c87-22.2 174-44.4 261-11.9c16.9 6.3 27 23.2 27 41.3l0 309.9c0 23.9-25.6 39.7-48.7 33.4c-79.8-21.8-159.6-1.5-239.3 18.9c-87 22.2-174 44.4-261 11.9c-16.9-6.3-27-23.2-27-41.3zM224 256c0 47 31.3 80 64 80s64-33 64-80s-31.3-80-64-80s-64 33-64 80zm64-112c55.6 0 96 53 96 112s-40.4 112-96 112s-96-53-96-112s40.4-112 96-112z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Financial Impact<\/h3>\n<p><span style=\"font-weight: 400;\">\u00a0The average cost of a data breach in the U.S. was <\/span><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">$4.88 million in 2024.<\/span><\/a><span style=\"font-weight: 400;\"> Ransomware attacks alone can paralyze operations and lead to significant ransom payments.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1817669191\" class=\"col medium-12 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 45px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M288 32C174.4 32 80.6 116.5 66 226.1c-1.2 8.8-9.2 14.9-18 13.7s-14.9-9.2-13.7-18C50.9 96.6 158.2 0 288 0C429.4 0 544 114.6 544 256s-114.6 256-256 256c-57.6 0-110.8-19.1-153.6-51.2c-7.1-5.3-8.5-15.3-3.2-22.4s15.3-8.5 22.4-3.2C191 463.3 237.5 480 288 480c123.7 0 224-100.3 224-224S411.7 32 288 32zM64 317.5c-5.3 7.2-10.8 15.1-15.8 23c-5.4 8.5-9.8 16.4-12.8 23.1c-2.6 5.8-3.2 8.8-3.4 9.5l0 .1C32 385.5 43.7 400 64 400s32-14.5 32-26.7c0 .1 0 .1 0-.1c-.1-.7-.8-3.7-3.4-9.6c-3-6.7-7.4-14.5-12.8-23.1c-5-7.9-10.5-15.8-15.8-23zm-8.6-41.4c4.3-5.5 12.8-5.5 17.1 0c17.6 21.7 55.5 72.2 55.5 97.2c0 32.5-28.7 58.7-64 58.7s-64-26.2-64-58.7c0-25 38.1-75.5 55.5-97.2zM367.6 248a24 24 0 1 1 0 48 24 24 0 1 1 0-48zm-136 24a24 24 0 1 1 -48 0 24 24 0 1 1 48 0zM211.3 171.3l-7.4 7.4c-23.6 23.6-53.9 39.2-86.8 44.7l-2.5 .4c-8.7 1.5-17-4.4-18.4-13.2s4.4-17 13.2-18.4l2.5-.4c26.3-4.4 50.6-16.9 69.5-35.7l7.4-7.4c6.2-6.2 16.4-6.2 22.6 0s6.2 16.4 0 22.6zm153.4-22.6c6.2-6.2 16.4-6.2 22.6 0l7.4 7.4c18.9 18.9 43.2 31.4 69.5 35.7l2.5 .4c8.7 1.5 14.6 9.7 13.2 18.4s-9.7 14.6-18.4 13.2l-2.5-.4c-32.9-5.5-63.3-21.1-86.8-44.7l-7.4-7.4c-6.2-6.2-6.2-16.4 0-22.6zM283.8 304l8.4 0c50.7 0 91.8 41.1 91.8 91.8c0 11.2-9 20.2-20.2 20.2l-151.6 0c-11.2 0-20.2-9-20.2-20.2c0-50.7 41.1-91.8 91.8-91.8zm67 80c-5.5-27.4-29.6-48-58.6-48l-8.4 0c-29 0-53.2 20.6-58.6 48l125.7 0z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Reputational Damage<\/h3>\n<p>Losing customer trust can take years to rebuild, especially if sensitive data is exposed<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1009085962\" class=\"col medium-12 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 40px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M34.5 420.4c-1.6 2.8-2.5 6-2.5 9.3c0 10.2 8.2 18.4 18.4 18.4l411.2 0c10.2 0 18.4-8.2 18.4-18.4c0-3.3-.9-6.4-2.5-9.3L276.5 75.8C272.2 68.5 264.4 64 256 64s-16.2 4.5-20.5 11.8L34.5 420.4zM6.9 404.2l201-344.6C217.9 42.5 236.2 32 256 32s38.1 10.5 48.1 27.6l201 344.6c4.5 7.7 6.9 16.5 6.9 25.4c0 27.8-22.6 50.4-50.4 50.4L50.4 480C22.6 480 0 457.4 0 429.6c0-8.9 2.4-17.7 6.9-25.4zM256 160c8.8 0 16 7.2 16 16l0 128c0 8.8-7.2 16-16 16s-16-7.2-16-16l0-128c0-8.8 7.2-16 16-16zM232 384a24 24 0 1 1 48 0 24 24 0 1 1 -48 0z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Operational Disruption<\/h3>\n<p>Downtime caused by breaches can halt your business, leading to loss of productivity and revenue.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-24041811 > .col > .col-inner {\n  padding: 50px 50px 50px 50px;\n  background-color: rgb(255,255,255);\n  border-radius: 10px;\n}\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1075193268 {\n  padding-top: 40px;\n  padding-bottom: 40px;\n}\n#section_1075193268 .section-bg-overlay {\n  background-color: rgba(255, 255, 255, 0.849);\n}\n#section_1075193268 .section-bg img {\n  object-position: 61% 5%;\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section dark\" id=\"section_2003459878\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/10\/gray-bg.svg\" class=\"bg attachment- size-\" alt=\"\" \/>\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\t<div class=\"ux-shape-divider ux-shape-divider--top ux-shape-divider--style-curve-2\">\n\t\t<svg viewBox=\"0 0 1000 100\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n\t<path class=\"ux-shape-fill\" d=\"M-24 100C493.5 -2.66667 804 -2.66667 1011 100H-24Z\"\/>\n<\/svg>\n\t<\/div>\n\n\t<div class=\"ux-shape-divider ux-shape-divider--bottom ux-shape-divider--style-curve\">\n\t\t<svg viewBox=\"0 0 1000 100\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n\t<path class=\"ux-shape-fill\" d=\"M0 0C0 0 200 50 500 50C800 50 1000 0 1000 0V101H0V1V0Z\"\/>\n<\/svg>\n\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"gap-1626524960\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1626524960 {\n  padding-top: 39px;\n}\n@media (min-width:550px) {\n  #gap-1626524960 {\n    padding-top: 106px;\n  }\n}\n@media (min-width:850px) {\n  #gap-1626524960 {\n    padding-top: 159px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-center\"  id=\"row-1723693495\">\n\n\n\t<div id=\"col-818832823\" class=\"col medium-10 small-12 large-7\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2977967562\" class=\"text\">\n\t\t\n\n<h2><em>Free IT Operations Gap Analysis <\/em><\/h2>\n\t\t\n<style>\n#text-2977967562 {\n  font-size: 1rem;\n}\n@media (min-width:550px) {\n  #text-2977967562 {\n    font-size: 1.2rem;\n  }\n}\n@media (min-width:850px) {\n  #text-2977967562 {\n    font-size: 1.3rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<p>We help you understand your current expectations and how well your IT is matching it. Other IT providers are going to tell you what they think you need without ever getting a clear view of your expectations.<\/p>\n<a href=\"\/free-consultation\/\" class=\"button primary\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t\t<span>Get Started<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-2072787818\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-2072787818 {\n  padding-top: 29px;\n}\n@media (min-width:550px) {\n  #gap-2072787818 {\n    padding-top: 93px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_2003459878 {\n  padding-top: 84px;\n  padding-bottom: 84px;\n}\n#section_2003459878 .section-bg-overlay {\n  background-color: rgba(0, 56, 75, 0.89);\n}\n#section_2003459878 .ux-shape-divider--top svg {\n  height: 46px;\n  --divider-top-width: 100%;\n}\n#section_2003459878 .ux-shape-divider--bottom svg {\n  height: 63px;\n  --divider-width: 100%;\n}\n@media (min-width:550px) {\n  #section_2003459878 .ux-shape-divider--top svg {\n    height: 91px;\n  }\n  #section_2003459878 .ux-shape-divider--bottom svg {\n    height: 150px;\n  }\n}\n@media (min-width:850px) {\n  #section_2003459878 .ux-shape-divider--top svg {\n    height: 150px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n<div class=\"row align-center\"  id=\"row-1100894062\">\n\n\n\t<div id=\"col-1513253396\" class=\"col pb-0 medium-10 small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"row align-center row-solid\"  id=\"row-543447685\">\n\n\n\t<div id=\"col-1030004815\" class=\"col medium-10 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2746187769\" class=\"text\">\n\t\t\n\n<h2 class=\"mb-0\">SymTec&#8217;s Cybersecurity Services at a Glance<br \/>\n<\/h2>\n\t\t\n<style>\n#text-2746187769 {\n  font-size: 1.05rem;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We offer a comprehensive range of services designed to protect your business from evolving threats:<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1151110441\" class=\"col medium-10 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-210065034\" class=\"text\">\n\t\t\n\n<p style=\"color: #7ac142;\nfont-weight: 700;\nfont-style: italic;\nfont-family: Merriweather, sans-serif;\nfont-size: 2.1em;\nmargin: 0;\">1<\/p>\n\t\t\n<style>\n#text-210065034 {\n  font-size: 2rem;\n  color: #7ac142;\n}\n#text-210065034 > * {\n  color: #7ac142;\n}\n<\/style>\n\t<\/div>\n\t\n<h4 class=\"alt-font\">Risk Assessments and Audits<\/h4>\n<p>Identify vulnerabilities and areas for improvement in your IT infrastructure.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-82600136\" class=\"col medium-10 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2193244933\" class=\"text\">\n\t\t\n\n<p style=\"color: #7ac142;\nfont-weight: 700;\nfont-style: italic;\nfont-family: Merriweather, sans-serif;\nfont-size: 2.1em;\nmargin: 0;\">2<\/p>\n\t\t\n<style>\n#text-2193244933 {\n  font-size: 2rem;\n  color: #7ac142;\n}\n#text-2193244933 > * {\n  color: #7ac142;\n}\n<\/style>\n\t<\/div>\n\t\n<h4 class=\"alt-font\">Employee Training Programs<\/h4>\n<p>Empower your team to recognize and avoid common cyber threats.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1820095553\" class=\"col medium-10 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3531211418\" class=\"text\">\n\t\t\n\n<p style=\"color: #7ac142;\nfont-weight: 700;\nfont-style: italic;\nfont-family: Merriweather, sans-serif;\nfont-size: 2.1em;\nmargin: 0;\">3<\/p>\n\t\t\n<style>\n#text-3531211418 {\n  font-size: 2rem;\n  color: #7ac142;\n}\n#text-3531211418 > * {\n  color: #7ac142;\n}\n<\/style>\n\t<\/div>\n\t\n<h4 class=\"alt-font\">Endpoint Protection<\/h4>\n<p>Safeguard devices with advanced tools that prevent unauthorized access.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1012813068\" class=\"col medium-10 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2596730400\" class=\"text\">\n\t\t\n\n<p style=\"color: #7ac142;\nfont-weight: 700;\nfont-style: italic;\nfont-family: Merriweather, sans-serif;\nfont-size: 2.1em;\nmargin: 0;\">4<\/p>\n\t\t\n<style>\n#text-2596730400 {\n  font-size: 2rem;\n  color: #7ac142;\n}\n#text-2596730400 > * {\n  color: #7ac142;\n}\n<\/style>\n\t<\/div>\n\t\n<h4 class=\"alt-font\">Managed Detection and Response (MDR)<\/h4>\n<p>Monitor and respond to threats in real-time with 24\/7 support.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1654561804\" class=\"col medium-10 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1875417508\" class=\"text\">\n\t\t\n\n<p style=\"color: #7ac142;\nfont-weight: 700;\nfont-style: italic;\nfont-family: Merriweather, sans-serif;\nfont-size: 2.1em;\nmargin: 0;\">5<\/p>\n\t\t\n<style>\n#text-1875417508 {\n  font-size: 2rem;\n  color: #7ac142;\n}\n#text-1875417508 > * {\n  color: #7ac142;\n}\n<\/style>\n\t<\/div>\n\t\n<h4 class=\"alt-font\">Compliance Consulting<br \/>\n<\/h4>\n<p>Ensure your business meets regulatory requirements like the FTC Safeguards Rule or HIPAA.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-543447685 > .col > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n@media (min-width:850px) {\n  #row-543447685 > .col > .col-inner {\n    padding: 0px 30px 0px 30px;\n  }\n}\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t<section class=\"section\" id=\"section_858031476\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"gap-1313196447\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1313196447 {\n  padding-top: 90px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-center\"  id=\"row-1635242803\">\n\n\n\t<div id=\"col-225143050\" class=\"col pb-0 medium-10 small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"row row-collapse\"  id=\"row-1516444819\">\n\n\n\t<div id=\"col-1017553238\" class=\"col medium-12 small-12 large-7\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3700635687\" class=\"text\">\n\t\t\n\n<h2 class=\"mb-0\">Why SymTec<br \/> Stands Out in Cybersecurity<br \/>\n<\/h2>\n\t\t\n<style>\n#text-3700635687 {\n  font-size: 1.3rem;\n}\n<\/style>\n\t<\/div>\n\t\n<p>When you partner with SymTec, you get more than just protection\u2014you gain a strategic ally:<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row align-center row-divided\"  id=\"row-77893924\">\n\n\n\t<div id=\"col-711304306\" class=\"col medium-5 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 35px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 384 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M145.5 68c5.3-20.7 24.1-36 46.5-36s41.2 15.3 46.5 36c1.8 7.1 8.2 12 15.5 12l18 0c8.8 0 16 7.2 16 16l0 32-96 0-96 0 0-32c0-8.8 7.2-16 16-16l18 0c7.3 0 13.7-4.9 15.5-12zM192 0c-32.8 0-61 19.8-73.3 48L112 48C91.1 48 73.3 61.4 66.7 80L64 80C28.7 80 0 108.7 0 144L0 448c0 35.3 28.7 64 64 64l256 0c35.3 0 64-28.7 64-64l0-304c0-35.3-28.7-64-64-64l-2.7 0c-6.6-18.6-24.4-32-45.3-32l-6.7 0C253 19.8 224.8 0 192 0zM320 112c17.7 0 32 14.3 32 32l0 304c0 17.7-14.3 32-32 32L64 480c-17.7 0-32-14.3-32-32l0-304c0-17.7 14.3-32 32-32l0 16c0 17.7 14.3 32 32 32l96 0 96 0c17.7 0 32-14.3 32-32l0-16zM208 80a16 16 0 1 0 -32 0 16 16 0 1 0 32 0zM171.3 235.3c6.2-6.2 6.2-16.4 0-22.6s-16.4-6.2-22.6 0L112 249.4 99.3 236.7c-6.2-6.2-16.4-6.2-22.6 0s-6.2 16.4 0 22.6l24 24c6.2 6.2 16.4 6.2 22.6 0l48-48zM192 272c0 8.8 7.2 16 16 16l64 0c8.8 0 16-7.2 16-16s-7.2-16-16-16l-64 0c-8.8 0-16 7.2-16 16zm-32 96c0 8.8 7.2 16 16 16l96 0c8.8 0 16-7.2 16-16s-7.2-16-16-16l-96 0c-8.8 0-16 7.2-16 16zm-48 24a24 24 0 1 0 0-48 24 24 0 1 0 0 48z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Customizable Solutions<\/h3>\n<p>Our services are tailored to your business needs, whether you\u2019re a small startup or a large enterprise.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-2088707431\" class=\"col medium-5 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 44px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M292.7 196.7c-6.2 6.2-6.2 16.4 0 22.6s16.4 6.2 22.6 0L480 54.6 480 160c0 8.8 7.2 16 16 16s16-7.2 16-16l0-144c0-8.8-7.2-16-16-16L352 0c-8.8 0-16 7.2-16 16s7.2 16 16 16l105.4 0L292.7 196.7zM219.3 315.3c6.2-6.2 6.2-16.4 0-22.6s-16.4-6.2-22.6 0L32 457.4 32 352c0-8.8-7.2-16-16-16s-16 7.2-16 16L0 496c0 8.8 7.2 16 16 16l144 0c8.8 0 16-7.2 16-16s-7.2-16-16-16L54.6 480 219.3 315.3z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Scalability<\/h3>\n<p>As your business grows, our solutions adapt to meet new challenges.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-474032175\" class=\"col medium-5 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 40px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M480 448c0 17.7-14.3 32-32 32l-224 0 0 16c0 5.5-1 10.9-2.7 16L448 512c35.3 0 64-28.7 64-64l0-284.1c0-12.7-5.1-24.9-14.1-33.9L382.1 14.1c-9-9-21.2-14.1-33.9-14.1L192 0c-35.3 0-64 28.7-64 64l0 71.1 .1-.1c1.5-.7 4-2 6.6-3c8.2-3.4 16.9-4.6 25.3-4L160 64c0-17.7 14.3-32 32-32l128 0 0 112c0 26.5 21.5 48 48 48l112 0 0 256zm-.5-288L368 160c-8.8 0-16-7.2-16-16l0-111.5c2.8 .7 5.4 2.1 7.4 4.2L475.3 152.6c2.1 2.1 3.5 4.6 4.2 7.4zM249.8 288c0-.8 .2-2.4 3.5-10.4c6.3-15.4 1.6-33.1-11.6-43.2c-6.9-5.3-7.8-6.6-8.2-7.3s-1-2.1-2.2-10.7c-2.2-16.5-15.2-29.4-31.6-31.6c-8.6-1.2-10-1.8-10.7-2.2s-2-1.3-7.3-8.2c-10.2-13.1-27.9-17.9-43.2-11.6c-8 3.3-9.6 3.5-10.4 3.5s-2.4-.2-10.4-3.5c-15.4-6.3-33.1-1.6-43.2 11.6c-5.3 6.9-6.6 7.8-7.3 8.2s-2.1 1-10.7 2.2C39.9 187 27 199.9 24.7 216.4c-1.2 8.6-1.8 10-2.2 10.7s-1.3 2-8.2 7.3C1.2 244.5-3.5 262.2 2.8 277.6c3.3 8 3.5 9.6 3.5 10.4c0 0 0 0 0 0c0 .8-.2 2.4-3.5 10.4c-6.3 15.4-1.6 33.1 11.6 43.2c6.9 5.3 7.8 6.6 8.2 7.3s1 2.1 2.2 10.7C27 376.1 39.9 389 56.4 391.3c3.7 .5 6.1 .9 7.6 1.2L64 496c0 5.9 3.2 11.3 8.5 14.1s11.5 2.5 16.4-.8L128 483.2l39.1 26.1c4.9 3.3 11.2 3.6 16.4 .8s8.5-8.2 8.5-14.1l0-103.5c1.6-.3 3.9-.7 7.6-1.2c16.5-2.2 29.4-15.2 31.6-31.6c1.2-8.6 1.8-10 2.2-10.7s1.3-2 8.2-7.3c13.1-10.2 17.9-27.9 11.6-43.2c-3.3-8-3.5-9.6-3.5-10.4c0 0 0 0 0 0zM96 466.1l0-50.9c7.1 1.5 14.6 .9 21.6-2c8-3.3 9.6-3.5 10.4-3.5s2.4 .2 10.4 3.5c7 2.9 14.5 3.4 21.6 2l0 50.9-23.1-15.4c-5.4-3.6-12.4-3.6-17.8 0L96 466.1zM38.2 288s0 0 0 0c0-8.1-2.9-15.4-5.8-22.5c-.8-2.1-.2-4.4 1.6-5.8c6.1-4.7 12.3-9.6 16.3-16.6s5.2-14.8 6.2-22.4c.3-2.2 2-3.9 4.2-4.2c7.7-1 15.4-2.2 22.4-6.2s11.8-10.2 16.6-16.3c1.4-1.8 3.7-2.4 5.8-1.6c7.1 2.9 14.4 5.8 22.5 5.8s15.4-2.9 22.5-5.8c2.1-.8 4.4-.2 5.8 1.6c4.7 6.1 9.6 12.3 16.6 16.3s14.8 5.2 22.4 6.2c2.2 .3 3.9 2 4.2 4.2c1 7.7 2.2 15.4 6.2 22.4s10.2 11.8 16.3 16.6c1.8 1.4 2.4 3.7 1.6 5.8c-2.9 7.1-5.8 14.4-5.8 22.5c0 0 0 0 0 0c0 8.1 2.9 15.4 5.8 22.5c.8 2.1 .2 4.4-1.6 5.8c-6.1 4.7-12.3 9.6-16.3 16.6s-5.2 14.8-6.2 22.4c-.3 2.2-2 3.9-4.2 4.2c-7.7 1-15.4 2.2-22.4 6.2s-11.8 10.2-16.6 16.3c-1.4 1.8-3.7 2.4-5.8 1.6c-7.1-2.9-14.4-5.8-22.5-5.8s-15.4 2.9-22.5 5.8c-2.1 .8-4.4 .2-5.8-1.6c-4.7-6.1-9.6-12.3-16.6-16.3s-14.8-5.2-22.4-6.2c-2.2-.3-3.9-2-4.2-4.2c-1-7.7-2.2-15.4-6.2-22.4s-10.2-11.8-16.3-16.6c-1.8-1.4-2.4-3.7-1.6-5.8c2.9-7.1 5.8-14.4 5.8-22.5z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Industry Expertise<\/h3>\n<p>With specialized knowledge in industries like financial services, healthcare, and retail, we understand the unique risks you face.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1109576047\" class=\"col medium-5 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<div class=\"icon-box featured-box icon-box-top text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 40px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" style=\"color:rgb(0, 80, 107);\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Pro 6.7.2 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) Copyright 2025 Fonticons, Inc.--><path d=\"M384 208A176 176 0 1 0 32 208a176 176 0 1 0 352 0zM343.3 366C307 397.2 259.7 416 208 416C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208c0 51.7-18.8 99-50 135.3L507.3 484.7c6.2 6.2 6.2 16.4 0 22.6s-16.4 6.2-22.6 0L343.3 366z\"\/><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t\t\t\t\t\t\t\n\n<h3 class=\"alt-font\">Proactive Approach<\/h3>\n<p>We don\u2019t just react to threats; we help you stay ahead of them with ongoing monitoring and updates.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-77893924 > .col > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n@media (min-width:850px) {\n  #row-77893924 > .col > .col-inner {\n    padding: 0px 20px 0px 20px;\n  }\n}\n<\/style>\n<\/div>\n\t<div id=\"gap-218789908\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-218789908 {\n  padding-top: 96px;\n}\n@media (min-width:550px) {\n  #gap-218789908 {\n    padding-top: 150px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-middle align-center\"  id=\"row-996618989\">\n\n\n\t<div id=\"col-1317626069\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1277114293\" class=\"text\">\n\t\t\n\n<h2>Partner with SymTec to Secure Your Business<br \/>\n<\/h2>\n\t\t\n<style>\n#text-1277114293 {\n  font-size: 1rem;\n}\n@media (min-width:550px) {\n  #text-1277114293 {\n    font-size: 1.15rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<p>Cybersecurity isn\u2019t just about technology\u2014it\u2019s about understanding your risks, educating your team, and implementing practical solutions to prevent attacks. Let SymTec help you create a strong defense that keeps your business safe, compliant, and prepared for the future. Contact us today to learn how we can protect your business from evolving cyber threats.<\/p>\n<a href=\"\/free-consultation\/\" class=\"button secondary\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t\t<span>See How SymTec Can Help<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1317626069 > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n@media (min-width:850px) {\n  #col-1317626069 > .col-inner {\n    padding: 0px 50px 0px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1870722825\" class=\"col medium-10 small-12 large-6\"  data-animate=\"bounceInRight\">\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1139972470\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img decoding=\"async\" width=\"1020\" height=\"1019\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity2.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity2.png 1024w, https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity2-500x500.png 500w, https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity2-150x150.png 150w, https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/symtec-cybersecurity2-768x767.png 768w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1139972470 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_858031476 {\n  padding-top: 70px;\n  padding-bottom: 70px;\n}\n#section_858031476 .section-bg-overlay {\n  background-color: rgba(255, 255, 255, 0.89);\n}\n<\/style>\n\t<\/section>\n\t\n\n<div class=\"row faqs-section\"  id=\"row-1344378434\">\n\n\n\t<div id=\"col-1291426964\" class=\"col medium-2 small-12 large-2\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1178002318\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-311666041\" class=\"text\">\n\t\t\n\n<h2>Frequently Asked Questions About Cybersecurity<\/h2>\n\t\t\n<style>\n#text-311666041 {\n  font-size: 1.2rem;\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"accordion\">\n\n\t<div id=\"accordion-2198426867\" class=\"accordion-item\">\n\t\t<a id=\"accordion-2198426867-label\" class=\"accordion-title plain\" href=\"#accordion-item-what-cybersecurity-services-does-symtec-offer?\" aria-expanded=\"false\" aria-controls=\"accordion-2198426867-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>What cybersecurity services does SymTec offer?<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-2198426867-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-2198426867-label\">\n\t\t\t\n\n<p>SymTec provides cybersecurity solutions designed to protect your business from threats, strengthen defenses, and safeguard your systems and data.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-4024844694\" class=\"accordion-item\">\n\t\t<a id=\"accordion-4024844694-label\" class=\"accordion-title plain\" href=\"#accordion-item-why-is-cybersecurity-important-for-my-business?\" aria-expanded=\"false\" aria-controls=\"accordion-4024844694-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Why is cybersecurity important for my business?<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-4024844694-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-4024844694-label\">\n\t\t\t\n\n<p>Cybersecurity is essential because it helps protect your organization from evolving threats, unauthorized access, and data loss, keeping your operations and reputation secure.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-202755569\" class=\"accordion-item\">\n\t\t<a id=\"accordion-202755569-label\" class=\"accordion-title plain\" href=\"#accordion-item-can-symtec-help-prevent-ransomware-and-cyberattacks?\" aria-expanded=\"false\" aria-controls=\"accordion-202755569-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Can SymTec help prevent ransomware and cyberattacks?<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-202755569-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-202755569-label\">\n\t\t\t\n\n<p>Yes \u2014 SymTec\u2019s cybersecurity services focus on proactive protection measures to help reduce the risk of attacks and support ongoing security.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-3183670145\" class=\"accordion-item\">\n\t\t<a id=\"accordion-3183670145-label\" class=\"accordion-title plain\" href=\"#accordion-item-is-cybersecurity-support-available-for-businesses-of-all-sizes?\" aria-expanded=\"false\" aria-controls=\"accordion-3183670145-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>Is cybersecurity support available for businesses of all sizes?<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-3183670145-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-3183670145-label\">\n\t\t\t\n\n<p>SymTec\u2019s cybersecurity solutions are designed to support a wide range of businesses looking to improve their security posture and mitigate risk.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-2874316630\" class=\"accordion-item\">\n\t\t<a id=\"accordion-2874316630-label\" class=\"accordion-title plain\" href=\"#accordion-item-how-do-i-get-started-with-cybersecurity-services-from-symtec?\" aria-expanded=\"false\" aria-controls=\"accordion-2874316630-content\">\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\" aria-hidden=\"true\"><\/i><\/button>\n\t\t\t<span>How do I get started with cybersecurity services from SymTec?<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-2874316630-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-2874316630-label\">\n\t\t\t\n\n<p>To begin improving your cybersecurity, you can schedule a free consultation to discuss your needs and learn how SymTec can help protect your business.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-681164137\" class=\"col medium-2 small-12 large-2\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-1344378434 > .col > .col-inner {\n  padding: 8% 0px 0px 0px;\n}\n<\/style>\n<\/div>\n\n\t<section class=\"section dark\" id=\"section_497908049\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t<img decoding=\"async\" width=\"1920\" height=\"1086\" src=\"https:\/\/symtec.com\/wp-content\/uploads\/2024\/11\/dark-abstract-bg.png\" class=\"bg attachment- size-\" alt=\"\" \/>\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\t<div class=\"ux-shape-divider ux-shape-divider--top ux-shape-divider--style-curve-2\">\n\t\t<svg viewBox=\"0 0 1000 100\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n\t<path class=\"ux-shape-fill\" d=\"M-24 100C493.5 -2.66667 804 -2.66667 1011 100H-24Z\"\/>\n<\/svg>\n\t<\/div>\n\n\t<div class=\"ux-shape-divider ux-shape-divider--bottom ux-shape-divider--style-curve-invert\">\n\t\t<svg viewBox=\"0 0 1000 100\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n\t<path class=\"ux-shape-fill\" d=\"M500 47.0297C184.4 47.0297 -26 100 -26 100H1026C1026 100 815.6 47.0297 500 47.0297ZM1026 -5.94059H-26V-7H1026V-5.94059Z\"\/>\n<\/svg>\n\n\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"gap-14222228\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-14222228 {\n  padding-top: 80px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<span class=\"scroll-to\" data-label=\"Scroll to: #audit\" data-bullet=\"false\" data-link=\"#audit\" data-title=\"audit\"><a name=\"audit\"><\/a><\/span>\n\n\t<div id=\"gap-305156516\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-305156516 {\n  padding-top: 80px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-center\"  id=\"row-339732064\">\n\n\n\t<div id=\"col-1807225832\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2957270195\" class=\"text\">\n\t\t\n\n<h2><em>Worried About Cyber Threats Targeting Your Business?<\/em><\/h2>\n\t\t\n<style>\n#text-2957270195 {\n  font-size: 1.3rem;\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2260100271\" class=\"text\">\n\t\t\n\n<p>As cyberattacks become more frequent and sophisticated, protecting your data and network can\u2019t be an afterthought. SymTec\u2019s cybersecurity experts help you strengthen defenses, reduce risk, and stay ahead of threats so you can operate with confidence.<\/p>\n\t\t\n<style>\n#text-2260100271 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<a href=\"\/free-consultation\/\" class=\"button primary\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t\t<span>Free Consultation<\/span>\n\t<\/a>\n\n\n<a href=\"tel:+14358179471\" class=\"button white\" style=\"border-radius:5px;padding:5px 25px 5px 25px;\">\n\t<i class=\"icon-phone\" aria-hidden=\"true\"><\/i>\t<span>(435) 817-9471<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1807225832 > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1948506348\" class=\"col medium-10 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\n\n<div style=\"max-width: 980px; margin: 0 auto; overflow: hidden; width: 100%; border-radius: 8px\">\n<iframe\nsrc=\"https:\/\/symtec.sites.glasshivepages.com\/Contact-Us\"\ntitle=\"Contact Symtec\"\nstyle=\"\nborder: 0;\nwidth: 100%;\nheight: 1150px;\ndisplay: block;\nmargin-top: -80px;\nmargin-bottom: -150px;\n\"\nscrolling=\"no\"\nloading=\"lazy\"\n><\/iframe>\n<\/div>\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1948506348 > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-255486716\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-255486716 {\n  padding-top: 75px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_497908049 {\n  padding-top: 84px;\n  padding-bottom: 84px;\n  background-color: rgb(255,255,255);\n}\n#section_497908049 .section-bg-overlay {\n  background-color: rgba(0, 80, 107, 0.663);\n}\n#section_497908049 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_497908049 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-transparent-header.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-237","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/pages\/237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":18,"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/pages\/237\/revisions"}],"predecessor-version":[{"id":2613,"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/pages\/237\/revisions\/2613"}],"wp:attachment":[{"href":"https:\/\/symtec.com\/wp-json\/wp\/v2\/media?parent=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}