{"id":1948,"date":"2020-04-17T06:22:11","date_gmt":"2020-04-17T06:22:11","guid":{"rendered":"http:\/\/anomica.themetechmount.net\/anomica-data\/?page_id=1948"},"modified":"2024-09-11T18:34:39","modified_gmt":"2024-09-11T15:34:39","slug":"home-onepage","status":"publish","type":"page","link":"https:\/\/cybersecurity.hots.sa\/","title":{"rendered":"Home Onepage"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; tm_zindex=&#8221;2&#8243; full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1587043459453{margin-top: -82px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; el_id=&#8221;about-us&#8221;][vc_column tm_col_bg_expand=&#8221;left&#8221; tm_zindex=&#8221;1&#8243; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1694358259859{margin-top: -90px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2023\/09\/about-us.jpg?id=4713) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;tm-colbgimage-full&#8221; tm_responsive_css=&#8221;63463002|colbreak_no|||||||||colbreak_no|0px||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][\/vc_column][vc_column tm_col_bg_expand=&#8221;right&#8221; tm_bgimage_position=&#8221;left_top&#8221; tm_zindex=&#8221;2&#8243; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1587104299055{margin-left: -82px !important;padding-top: 145px !important;padding-bottom: 25px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2020\/04\/col-bg-one.jpg?id=1952) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; tm_responsive_css=&#8221;58704698|colbreak_no||||-|||||colbreak_no||||0px|||||colbreak_no|||||40px|||||colbreak_no|||||||||&#8221; el_class=&#8221;tm-hidecolbg-767&#8243;][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1587036679524{padding-bottom: 15px !important;padding-left: 55px !important;}&#8221; tm_responsive_css=&#8221;41141211|colbreak_no|||||||||colbreak_no||||||||15px|colbreak_no||||||||||colbreak_no|||||||||&#8221;]<div class=\"tm-element-heading-wrapper tm-heading-inner tm-element-align-left tm-seperator-solid tm-heading-style-vertical \"><section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-vc_cta3-actions-no tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >About Us<\/h4>\n<h2 class=\"tm-custom-heading \" >Your Trusted Outsourced Cybersecurity <cite>Partner<\/cite><\/h2>\n<\/div><\/header><\/div><\/div><\/div><\/section><\/div> <!-- .tm-element-heading-wrapper container --> [vc_column_text]Located in the heart of Saudi Arabia, the Cybersecurity Center stands as a beacon of digital safety in an increasingly interconnected world. Recognizing the paramount importance of robust cybersecurity in today\u2019s digital age, we have dedicated ourselves to crafting state-of-the-art outsourcing solutions tailored to the unique needs of businesses and organizations.<\/p>\n<p>Our expertise is rooted in a deep understanding of both the regional and global cyber landscapes, ensuring that our clients receive comprehensive protection against a wide array of threats. By partnering with us, entities not only benefit from top-tier cybersecurity measures but also contribute to fostering a safer digital environment for the entire nation.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;tm-column-inline&#8221; css=&#8221;.vc_custom_1587036804868{margin-top: -35px !important;padding-bottom: 4px !important;padding-left: 30px !important;}&#8221; tm_responsive_css=&#8221;36971941|colbreak_no|||||||||colbreak_no||||||||0px|colbreak_no||||||||||colbreak_no|||||||||&#8221;][vc_column_inner width=&#8221;1\/2&#8243;]<ul class=\"tm-list tm-list-style-icon tm-list-icon-color-skincolor tm-black tm-icon-skincolor tm-list-textsize- tm-list-icon-library-fontawesome\"><li><i class=\"tm-skincolor fa fa-circle-o\"><\/i>  <span class=\"tm-list-li-content\">System Vulnerability Scans\n\n\n<\/span><\/li><li><i class=\"tm-skincolor fa fa-circle-o\"><\/i>  <span class=\"tm-list-li-content\">Digital Safety Awareness<\/span><\/li><li><i class=\"tm-skincolor fa fa-circle-o\"><\/i>  <span class=\"tm-list-li-content\">Secure Code Development<\/span><\/li><\/ul>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; tm_responsive_css=&#8221;88119178|colbreak_no|||||||||colbreak_no|||||||||colbreak_no|||||||||550px|colbreak_no|-33px||||||||&#8221;]<ul class=\"tm-list tm-list-style-icon tm-list-icon-color-skincolor tm-black tm-icon-skincolor tm-list-textsize- tm-list-icon-library-fontawesome\"><li><i class=\"tm-skincolor fa fa-circle-o\"><\/i>  <span class=\"tm-list-li-content\">Threat Intelligence & Analysis\n\n<\/span><\/li><li><i class=\"tm-skincolor fa fa-circle-o\"><\/i>  <span class=\"tm-list-li-content\">Forensic Investigation<\/span><\/li><li><i class=\"tm-skincolor fa fa-circle-o\"><\/i>  <span class=\"tm-list-li-content\">Incident Discovery<\/span><\/li><\/ul>[\/vc_column_inner][\/vc_row_inner][vc_separator css=&#8221;.vc_custom_1580809229531{margin-bottom: 30px !important;padding-left: 30px !important;}&#8221;][vc_row_inner el_class=&#8221;tm-column-inline&#8221; css=&#8221;.vc_custom_1580461190937{padding-left: 40px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1580452090130{padding-right: 0px !important;}&#8221;][vc_column_text][\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1580452099322{padding-left: 5px !important;}&#8221;]<p style=\"text-align:left;font-size:16px;\" class=\"tm-custom-heading tm-text-custom-size \" ><\/p>\n[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221; css=&#8221;.vc_custom_1587043473661{padding-bottom: 0px !important;}&#8221; tm_responsive_css=&#8221;38955275|colbreak_no|||||||||colbreak_no|||||0px||||colbreak_no||||||||||colbreak_no|||||||||&#8221; el_id=&#8221;services&#8221;][vc_column]<div class=\"themetechmount-boxes themetechmount-boxes-service themetechmount-boxes-view-carousel themetechmount-boxes-col-three themetechmount-boxes-sortable-no themetechmount-boxes-textalign-center tm-cta3-rev-heading tm-boxes-carousel-arrows-1\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"1\" data-tm-centermode=\"0\" data-tm-centerpadding=\"300\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-service-inner \"><div class=\"themetechmount-box-heading-wrapper tm-element-align-center\"><div class=\"tm-element-heading-wrapper tm-heading-inner tm-element-align-center tm-seperator-solid tm-heading-style-vertical \"><section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-center tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-vc_cta3-actions-no tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >Our Services<\/h4>\n<h2 class=\"tm-custom-heading \" >Guarding Your Digital Frontier with <cite>Precision &amp; Expertise<\/cite><\/h2>\n<\/div><\/header><\/div><\/div><\/div><\/section><\/div> <!-- .tm-element-heading-wrapper container --> <\/div> <!-- .tm-element-heading-wrapper container --> \n\t\t\t\n\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><article class=\"themetechmount-box themetechmount-box-service themetechmount-box-view-style-one themetechmount-service-box-view-style-one  \">\n\t<div class=\"themetechmount-post-item\">\t\n\t\t<div class=\"themetechmount-post-item-inner\">\n\t\t\t<div class=\"tm-featured-wrapper tm-tm_service-featured-wrapper\"><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=cloud-security-solutions\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/cloud-security-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"cloud security solutions\" data-id=\"4796\" \/><\/a><\/div>\t\t<\/div>\n\t\t\n\t\t<div class=\"themetechmount-box-bottom-content\">\t\n\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=cloud-security-solutions\">CLOUD SECURITY SOLUTIONS<\/a><\/h4><\/div>\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t\t\t\t\t<div class=\"tm-short-desc\">\n\t\t\t\t\tA robust suite of cloud security tools is essential in today's digitized business world, where many enterprises are transitioning to the cloud. \t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div> \n\t\t\t<div class=\"themetechmount-serviceboxbox-readmore\">\n\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=cloud-security-solutions\">Read More<\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div><div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><article class=\"themetechmount-box themetechmount-box-service themetechmount-box-view-style-one themetechmount-service-box-view-style-one  \">\n\t<div class=\"themetechmount-post-item\">\t\n\t\t<div class=\"themetechmount-post-item-inner\">\n\t\t\t<div class=\"tm-featured-wrapper tm-tm_service-featured-wrapper\"><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=ai-powered-network-security-solutions\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/firwall-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"AI-POWERED NETWORK SECURITY SOLUTIONS\" data-id=\"4808\" \/><\/a><\/div>\t\t<\/div>\n\t\t\n\t\t<div class=\"themetechmount-box-bottom-content\">\t\n\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=ai-powered-network-security-solutions\">AI-POWERED NETWORK SECURITY SOLUTIONS<\/a><\/h4><\/div>\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t\t\t\t\t<div class=\"tm-short-desc\">\n\t\t\t\t\tAI-powered network security solutions can significantly enhance organizations' ability to detect and respond to cyber threats. \t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div> \n\t\t\t<div class=\"themetechmount-serviceboxbox-readmore\">\n\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=ai-powered-network-security-solutions\">Read More<\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div><div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><article class=\"themetechmount-box themetechmount-box-service themetechmount-box-view-style-one themetechmount-service-box-view-style-one  \">\n\t<div class=\"themetechmount-post-item\">\t\n\t\t<div class=\"themetechmount-post-item-inner\">\n\t\t\t<div class=\"tm-featured-wrapper tm-tm_service-featured-wrapper\"><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=cybersecurity-consultation-and-risk-compliance-management\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/consulting-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"consulting service\" data-id=\"4814\" \/><\/a><\/div>\t\t<\/div>\n\t\t\n\t\t<div class=\"themetechmount-box-bottom-content\">\t\n\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=cybersecurity-consultation-and-risk-compliance-management\">CYBERSECURITY CONSULTATION AND RISK COMPLIANCE MANAGEMENT<\/a><\/h4><\/div>\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t\t\t\t\t<div class=\"tm-short-desc\">\n\t\t\t\t\tExpert guidance to fortify your digital defenses and ensure regulatory adherence, safeguarding your business from threats and liabilities.\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div> \n\t\t\t<div class=\"themetechmount-serviceboxbox-readmore\">\n\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=cybersecurity-consultation-and-risk-compliance-management\">Read More<\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div><div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><article class=\"themetechmount-box themetechmount-box-service themetechmount-box-view-style-one themetechmount-service-box-view-style-one  \">\n\t<div class=\"themetechmount-post-item\">\t\n\t\t<div class=\"themetechmount-post-item-inner\">\n\t\t\t<div class=\"tm-featured-wrapper tm-tm_service-featured-wrapper\"><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=data-loss-prevention-dlp-and-encryption\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/data-encryption-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"data-encryption with cybersecurity based on Saudi Arabia\" data-id=\"4826\" \/><\/a><\/div>\t\t<\/div>\n\t\t\n\t\t<div class=\"themetechmount-box-bottom-content\">\t\n\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=data-loss-prevention-dlp-and-encryption\">DATA LOSS PREVENTION (DLP) AND ENCRYPTION<\/a><\/h4><\/div>\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t\t\t\t\t<div class=\"tm-short-desc\">\n\t\t\t\t\tThese solutions are critical tools that help organizations protect sensitive data and maintain compliance with relevant regulations\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div> \n\t\t\t<div class=\"themetechmount-serviceboxbox-readmore\">\n\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=data-loss-prevention-dlp-and-encryption\">Read More<\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div><div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><article class=\"themetechmount-box themetechmount-box-service themetechmount-box-view-style-one themetechmount-service-box-view-style-one  \">\n\t<div class=\"themetechmount-post-item\">\t\n\t\t<div class=\"themetechmount-post-item-inner\">\n\t\t\t<div class=\"tm-featured-wrapper tm-tm_service-featured-wrapper\"><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=security-awareness-training\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/06\/post-seven-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"SECURITY AWARENESS TRAINING\" data-id=\"4189\" \/><\/a><\/div>\t\t<\/div>\n\t\t\n\t\t<div class=\"themetechmount-box-bottom-content\">\t\n\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=security-awareness-training\">SECURITY AWARENESS TRAINING<\/a><\/h4><\/div>\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t\t\t\t\t<div class=\"tm-short-desc\">\n\t\t\t\t\tIs a key part of any cybersecurity strategy as it focuses on addressing the human element of security,which is often the most vulnerable point of attack in any organization.\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div> \n\t\t\t<div class=\"themetechmount-serviceboxbox-readmore\">\n\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?tm_service=security-awareness-training\">Read More<\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div>\n\t\t\t<\/div>\n\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1587037124303{padding-bottom: 0px !important;}&#8221; tm_responsive_css=&#8221;68074019|colbreak_no|||||||||colbreak_no|||||50px||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][vc_column tm_col_bg_expand=&#8221;left&#8221; width=&#8221;3\/4&#8243; css=&#8221;.vc_custom_1587039947045{padding-top: 115px !important;padding-bottom: 90px !important;background-image: url(http:\/\/anomica.themetechmount.net\/anomica-onepage\/wp-content\/uploads\/sites\/4\/2020\/02\/colbg-002.jpg?id=1920) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; tm_responsive_css=&#8221;80981289|colbreak_no|||||||||colbreak_no|||||35px||35px||colbreak_no||||||||||colbreak_no|||||||||&#8221;][vc_row_inner break_in_responsive=&#8221;991&#8243; css=&#8221;.vc_custom_1587036888820{padding-right: 265px !important;}&#8221; tm_responsive_css=&#8221;39697111|colbreak_no||||||0px|||colbreak_no|||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][vc_column_inner width=&#8221;5\/6&#8243;]<div class=\"tm-element-heading-wrapper tm-heading-inner tm-element-align-left tm-seperator-solid tm-heading-style-vertical \"><section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-vc_cta3-actions-no tm-cta3-with-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >Voices of Cyber Vigilance<\/h4>\n<h2 class=\"tm-custom-heading \" >Navigating the Digital Realm with<br \/>\n<cite>Expert Insights<\/cite><\/h2>\n<\/div><\/header><div class=\"tm-cta3-content-wrapper\"><div data-elementor-type=\"wp-post\" data-elementor-id=\"946\" class=\"elementor elementor-946\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2906b81d tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2906b81d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7beb5953\" data-id=\"7beb5953\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-658b845c elementor-widget elementor-widget-image\" data-id=\"658b845c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"565\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/post-seven-1024x683.jpg\" class=\"attachment-large size-large wp-image-2262\" alt=\"\" srcset=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/post-seven-1024x683.jpg 1024w, https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/post-seven-300x200.jpg 300w, https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/post-seven-768x512.jpg 768w, https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/post-seven.jpg 1200w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\" data-id=\"2262\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88ee56a tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88ee56a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40223a9f\" data-id=\"40223a9f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ffe5c70 elementor-widget elementor-widget-heading\" data-id=\"5ffe5c70\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Why is Security Awareness Training Important? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d591299 elementor-widget elementor-widget-text-editor\" data-id=\"1d591299\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Security threats aren&#8217;t just technological; they often rely on manipulating human behavior through techniques like phishing, baiting, or pretexting. A significant number of cybersecurity incidents occur due to employee mistakes, making employees an organization&#8217;s weakest security link.<\/p><p>Security Awareness Training helps employees understand the role they play in helping to combat information security breaches. This training empowers them with the knowledge to recognize, report, and avoid security threats.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5382aa06 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5382aa06\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63bc93b9\" data-id=\"63bc93b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b81fd7c elementor-widget elementor-widget-image\" data-id=\"7b81fd7c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"565\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/project-seven-1024x683.jpg\" class=\"attachment-large size-large wp-image-2263\" alt=\"\" srcset=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/project-seven-1024x683.jpg 1024w, https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/project-seven-300x200.jpg 300w, https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/project-seven-768x512.jpg 768w, https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/09\/project-seven.jpg 1200w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\" data-id=\"2263\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b02842 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b02842\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74eb29b5\" data-id=\"74eb29b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f0137e6 elementor-widget elementor-widget-heading\" data-id=\"3f0137e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Does Security Awareness Training Include? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b656761 elementor-widget elementor-widget-text-editor\" data-id=\"1b656761\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A comprehensive Security Awareness Training program may include:<\/p><p>\u00a0<\/p><ul><li><strong>Understanding Cyber Threats<\/strong>: Training employees to recognize different types of cyber threats, such as phishing attacks, ransomware, and social engineering scams.<\/li><li><strong>Secure Behaviors<\/strong>: Educating employees on best practices for password management, secure browsing, email security, and the proper use of social media.<\/li><li><strong>Data Protection and Privacy<\/strong>: Instructing employees on the importance of data privacy and the proper handling of sensitive data, in compliance with laws like the General Data Protection Regulation (GDPR).<\/li><li><strong>Device Management<\/strong>: Teaching employees how to securely use and maintain their devices, including updating software, recognizing suspicious activity, and reporting lost or stolen devices.<\/li><li><strong>Incident Reporting:<\/strong> Establishing clear procedures for reporting perceived security incidents quickly and effectively.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1959e830 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1959e830\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-bottom:0;flex-grow:1;border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/section><\/div> <!-- .tm-element-heading-wrapper container --> <div class=\"themetechmount-boxes themetechmount-boxes-testimonial themetechmount-boxes-view-carousel themetechmount-boxes-col-one themetechmount-boxes-sortable-no themetechmount-boxes-textalign-left tm-cta3-rev-heading tm-boxes-carousel-arrows-hide arrow-style-right\" data-tm-speed=\"1500\" data-tm-autoplay=\"0\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"hide\" data-tm-centermode=\"0\" data-tm-centerpadding=\"300\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-testimonial-inner \">\n\t\t\t\n\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-12 col-sm-12 col-md-12 col-xs-12 long_desc\"><article class=\"themetechmount-box themetechmount-box-testimonial themetechmount-box-view-style-1 themetechmount-testimonial-box-view-style-4\">\n\t<div class=\"themetechmount-post-item\">\n\t\t\n\t\t<div class=\"themetechmount-box-content\">\t\t\t\t\n\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t<blockquote class=\"themetechmount-testimonial-text\">Cybersecurity is a shared responsibility, and it boils down to this: In cybersecurity, the more systems we secure, the more secure we all are<\/blockquote>\n\t\t\t <\/div>\n\t\t\t <div class=\"themetechmount-box-author\">\t\t\n\t\t\t\t <div class=\"themetechmount-ratting-star\"> <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i> <\/div>\n\t\t\t\t <div class=\"themetechmount-box-title\"><h3 class=\"themetechmount-author-name\">Jeh Johnson<\/h3><span class=\"themetechmount-box-footer\">former U.S. Secretary of Homeland Security<\/span><\/div>\n\t\t\t<\/div>\n\t\t\t <div class=\"clearfix\"><\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div><div class=\"tm-box-col-wrapper col-lg-12 col-sm-12 col-md-12 col-xs-12 long_desc\"><article class=\"themetechmount-box themetechmount-box-testimonial themetechmount-box-view-style-1 themetechmount-testimonial-box-view-style-4\">\n\t<div class=\"themetechmount-post-item\">\n\t\t\n\t\t<div class=\"themetechmount-box-content\">\t\t\t\t\n\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t<blockquote class=\"themetechmount-testimonial-text\">The greatest weapon against cyber threats is knowledge<\/blockquote>\n\t\t\t <\/div>\n\t\t\t <div class=\"themetechmount-box-author\">\t\t\n\t\t\t\t <div class=\"themetechmount-ratting-star\"> <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i> <\/div>\n\t\t\t\t <div class=\"themetechmount-box-title\"><h3 class=\"themetechmount-author-name\">Anonymous<\/h3><\/div>\n\t\t\t<\/div>\n\t\t\t <div class=\"clearfix\"><\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div><div class=\"tm-box-col-wrapper col-lg-12 col-sm-12 col-md-12 col-xs-12 short_desc\"><article class=\"themetechmount-box themetechmount-box-testimonial themetechmount-box-view-style-1 themetechmount-testimonial-box-view-style-4\">\n\t<div class=\"themetechmount-post-item\">\n\t\t\n\t\t<div class=\"themetechmount-box-content\">\t\t\t\t\n\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t<blockquote class=\"themetechmount-testimonial-text\">Passwords are like underwear: don\u2019t let people see them, change them very often, and you shouldn\u2019t share them with strangers.<\/blockquote>\n\t\t\t <\/div>\n\t\t\t <div class=\"themetechmount-box-author\">\t\t\n\t\t\t\t <div class=\"themetechmount-ratting-star\"> <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i>  <i class=\"tm-anomica-icon-star-1 tm-active\"><\/i> <\/div>\n\t\t\t\t <div class=\"themetechmount-box-title\"><h3 class=\"themetechmount-author-name\">Chris Pirillo<\/h3><span class=\"themetechmount-box-footer\">tech expert<\/span><\/div>\n\t\t\t<\/div>\n\t\t\t <div class=\"clearfix\"><\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/article><\/div>\n\t\t\t<\/div>\n\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column tm_col_bg_expand=&#8221;right&#8221; width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1587104403359{padding-bottom: 65px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2020\/04\/col-bg-7.jpg?id=1954) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; tm_responsive_css=&#8221;84536881|colbreak_no|||||||||colbreak_no|||||||||colbreak_no|||||||0px|||colbreak_no|||||||||&#8221;][vc_row_inner css=&#8221;.vc_custom_1587036900835{margin-left: -260px !important;}&#8221; tm_responsive_css=&#8221;63632889|colbreak_no|||||||||colbreak_no||||0px|||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][vc_column_inner css=&#8221;.vc_custom_1587103679754{padding-top: 87px !important;padding-left: 0px !important;}&#8221; tm_responsive_css=&#8221;42888161|colbreak_no|||||||||colbreak_no|||||||||colbreak_no|||||20px|||||colbreak_no|||||||||&#8221;][vc_single_image image=&#8221;4779&#8243; img_size=&#8221;553&#215;596&#8243; css=&#8221;.vc_custom_1694362383600{margin-bottom: 20px !important;border-top-width: 10px !important;border-right-width: 10px !important;border-bottom-width: 10px !important;border-left-width: 10px !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row tm_textcolor=&#8221;white&#8221; tm_bgimagefixed=&#8221;true&#8221; full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1694359425253{padding-top: 45px !important;padding-bottom: 52px !important;background: #263045 url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2023\/09\/SLIDER20.jpg?id=4706) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; tm_responsive_css=&#8221;22197939|colbreak_no|||||||||colbreak_no|0px||||20px||30px||colbreak_no|||||||50px|||colbreak_no|||||||||&#8221;][vc_column width=&#8221;1\/4&#8243;]\n\n<div class=\"tm-fid inside tm-fid-with-icon tm-fid-view-topicon tm-fid-no-border\">\n\t<div class=\"tm-fid-icon-wrapper\"><i class=\"kw_anomica flaticon-data-1\"><\/i><\/div>\t<div class=\"tm-fld-contents\">\n\t\t<h4 class=\"tm-fid-inner\">\n\t\t\t\t\t\t<span\n\t\t\t\tdata-appear-animation = \"animateDigits\"\n\t\t\t\tdata-from             = \"0\"\n\t\t\t\tdata-to               = \"5000\"\n\t\t\t\tdata-interval         = \"20\"\n\t\t\t\tdata-before           = \"\"\n\t\t\t\tdata-before-style     = \"span\"\n\t\t\t\tdata-after            = \"+\"\n\t\t\t\tdata-after-style      = \"span\"\n\t\t\t\t>\n\t\t\t\t\t5000\t\t\t<\/span>\n\t\t\t<span>+<\/span>\t\t<\/h4>\n\t\t<h3 class=\"tm-fid-title\"><span>Phishing Attempts Identified &amp; Blocked<br><\/span><\/h3>\n\t<\/div><!-- .tm-fld-contents -->\n\t<\/div>\n\n\n\n[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\n\n<div class=\"tm-fid inside tm-fid-with-icon tm-fid-view-topicon tm-fid-no-border\">\n\t<div class=\"tm-fid-icon-wrapper\"><i class=\"kw_anomica flaticon-report\"><\/i><\/div>\t<div class=\"tm-fld-contents\">\n\t\t<h4 class=\"tm-fid-inner\">\n\t\t\t\t\t\t<span\n\t\t\t\tdata-appear-animation = \"animateDigits\"\n\t\t\t\tdata-from             = \"0\"\n\t\t\t\tdata-to               = \"90\"\n\t\t\t\tdata-interval         = \"1\"\n\t\t\t\tdata-before           = \"\"\n\t\t\t\tdata-before-style     = \"sup\"\n\t\t\t\tdata-after            = \"%\"\n\t\t\t\tdata-after-style      = \"span\"\n\t\t\t\t>\n\t\t\t\t\t90\t\t\t<\/span>\n\t\t\t<span>%<\/span>\t\t<\/h4>\n\t\t<h3 class=\"tm-fid-title\"><span>Threat Detection Rate Achieved<br><\/span><\/h3>\n\t<\/div><!-- .tm-fld-contents -->\n\t<\/div>\n\n\n\n[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\n\n<div class=\"tm-fid inside tm-fid-with-icon tm-fid-view-topicon tm-fid-no-border\">\n\t<div class=\"tm-fid-icon-wrapper\"><i class=\"kw_anomica flaticon-process\"><\/i><\/div>\t<div class=\"tm-fld-contents\">\n\t\t<h4 class=\"tm-fid-inner\">\n\t\t\t\t\t\t<span\n\t\t\t\tdata-appear-animation = \"animateDigits\"\n\t\t\t\tdata-from             = \"0\"\n\t\t\t\tdata-to               = \"3\"\n\t\t\t\tdata-interval         = \"1\"\n\t\t\t\tdata-before           = \"\"\n\t\t\t\tdata-before-style     = \"sup\"\n\t\t\t\tdata-after            = \"\"\n\t\t\t\tdata-after-style      = \"sub\"\n\t\t\t\t>\n\t\t\t\t\t3\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t<h3 class=\"tm-fid-title\"><span>Innovative Security Solutions Launched<br><\/span><\/h3>\n\t<\/div><!-- .tm-fld-contents -->\n\t<\/div>\n\n\n\n[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\n\n<div class=\"tm-fid inside tm-fid-with-icon tm-fid-view-topicon tm-fid-no-border\">\n\t<div class=\"tm-fid-icon-wrapper\"><i class=\"kw_anomica flaticon-developer\"><\/i><\/div>\t<div class=\"tm-fld-contents\">\n\t\t<h4 class=\"tm-fid-inner\">\n\t\t\t\t\t\t<span\n\t\t\t\tdata-appear-animation = \"animateDigits\"\n\t\t\t\tdata-from             = \"0\"\n\t\t\t\tdata-to               = \"15\"\n\t\t\t\tdata-interval         = \"1\"\n\t\t\t\tdata-before           = \"\"\n\t\t\t\tdata-before-style     = \"sup\"\n\t\t\t\tdata-after            = \"\"\n\t\t\t\tdata-after-style      = \"sub\"\n\t\t\t\t>\n\t\t\t\t\t15\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t<h3 class=\"tm-fid-title\"><span>Dedicated Cybersecurity Experts on Board<br><\/span><\/h3>\n\t<\/div><!-- .tm-fld-contents -->\n\t<\/div>\n\n\n\n[\/vc_column][\/vc_row][vc_row tm_bgcolor=&#8221;grey&#8221; tm_bgimagefixed=&#8221;&#8221; full_width=&#8221;stretch_row_content_no_spaces&#8221; css=&#8221;.vc_custom_1587103521056{padding-bottom: 150px !important;}&#8221; tm_responsive_css=&#8221;34654347|colbreak_no|||||||||colbreak_no|||||40px||20px||colbreak_no||||||||||colbreak_no|||||||||&#8221; el_id=&#8221;projects&#8221;][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1587043511126{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; el_id=&#8221;contact-us&#8221;][vc_column tm_col_bg_expand=&#8221;left&#8221; tm_bgimage_position=&#8221;right_top&#8221; tm_zindex=&#8221;2&#8243; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1587104505562{padding-top: 130px !important;padding-right: 25px !important;padding-bottom: 90px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2020\/04\/row-bg-6.jpg?id=1956) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;tm-rightoverlay-columnbox tm-hidecolbg-767&#8243; tm_responsive_css=&#8221;59614964|colbreak_no|||||||||colbreak_no|||||90px|15px|40px||colbreak_no|||||40px|||||colbreak_no|||||||||&#8221;][vc_row_inner][vc_column_inner]<div class=\"tm-element-heading-wrapper tm-heading-inner tm-element-align-left tm-seperator-solid tm-heading-style-vertical \"><section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-vc_cta3-actions-no tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >Reach Out to Us<\/h4>\n<h2 class=\"tm-custom-heading \" >Secure Your Digital Future with <cite>Hots Cybersecurity <\/cite>Today<\/h2>\n<\/div><\/header><\/div><\/div><\/div><\/section><\/div> <!-- .tm-element-heading-wrapper container --> \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1048-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F1948#wpcf7-f1048-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"1048\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.8\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1048-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"tm-commonform tm-team-contact\">\n\t<div class=\"row\">\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"First Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-lname\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Last Name\" value=\"\" type=\"text\" name=\"your-lname\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"row\">\n\t\t<div class=\"col-md-12\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"row\">\n\t\t<div class=\"col-md-12\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"row\">\n\t\t<div class=\"col-md-12\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"5\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"your-message\"><\/textarea><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"tm-team-frm-btn\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner tm-vc_general tm-vc_btn3 tm-vc_btn3-style-flat tm-vc_btn3- tm-vc_btn3-color-skincolor\" type=\"submit\" value=\"Book An Appointment\" \/><br \/>\n\t\t<div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n\t<\/div>\n<\/div>\n<\/form>\n<\/div>\n[\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column tm_col_bg_expand=&#8221;right&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1587104476152{margin-top: -90px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/12\/post-img-three.jpg?id=1789) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;tm-colbgimage-full&#8221; tm_responsive_css=&#8221;76394901|colbreak_no|||||||||colbreak_no|0px||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][\/vc_column][\/vc_row][vc_row tm_bgcolor=&#8221;skincolor&#8221; tm_bgimagefixed=&#8221;&#8221; tm_zindex=&#8221;2&#8243; full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1587041031533{padding-top: 55px !important;padding-bottom: 50px !important;}&#8221;][vc_column]<div class=\"themetechmount-boxes themetechmount-boxes-client themetechmount-boxes-view-carousel themetechmount-boxes-col-five themetechmount-boxes-sortable- themetechmount-boxes-textalign-center tm-cta3-rev-heading tm-boxes-carousel-arrows-hide\" data-tm-speed=\"1500\" data-tm-autoplay=\"0\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"hide\" data-tm-centermode=\"0\" data-tm-centerpadding=\"300\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-client-inner \"><\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column][\/vc_row][vc_row tm_bgcolor=&#8221;grey&#8221; tm_bgimagefixed=&#8221;&#8221; full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1567512953467{padding-bottom: 105px !important;}&#8221; tm_responsive_css=&#8221;64903502|colbreak_no|||||||||colbreak_no|||||40px||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][vc_column]<div class=\"tm-element-heading-wrapper tm-heading-inner tm-element-align-center tm-seperator-solid tm-heading-style-vertical \"><section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-center tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-vc_cta3-actions-no tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >Blog<\/h4>\n<h2 class=\"tm-custom-heading \" >Check Out Our <cite>Latest News<\/cite><\/h2>\n<\/div><\/header><\/div><\/div><\/div><\/section><\/div> <!-- .tm-element-heading-wrapper container --> [\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221; full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1587043525809{padding-top: 0px !important;}&#8221; tm_responsive_css=&#8221;72941381|colbreak_no|||||||||colbreak_no|||||||40px||colbreak_no||||||||||colbreak_no|||||||||&#8221; el_id=&#8221;blog&#8221;][vc_column css=&#8221;.vc_custom_1567512175817{margin-top: -110px !important;}&#8221;]<div class=\"themetechmount-boxes themetechmount-boxes-blog themetechmount-boxes-view-carousel themetechmount-boxes-col-three themetechmount-boxes-sortable-no themetechmount-boxes-textalign-center tm-cta3-rev-heading tm-boxes-carousel-arrows-hide\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"hide\" data-tm-centermode=\"0\" data-tm-centerpadding=\"300\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-blog-inner \">\n\t\t\t\n\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 cyber-data digital security\"><article class=\"themetechmount-box themetechmount-box-blog themetechmount-blogbox-style-two themetechmount-blogbox-format- \">\n\t<div class=\"post-item\">\n\t\t<div class=\"themetechmount-box-content\">\t\t\n\t\t\t<div class=\"tm-featured-outer-wrapper tm-post-featured-outer-wrapper\">\n\t\t\t\t<div class=\"tm-featured-wrapper tm-post-featured-wrapper tm-post-format-\"><a href=\"https:\/\/cybersecurity.hots.sa\/?p=4659\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/06\/cybersecurity-companies-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"The Imperative of Cybersecurity in Small Companies: Protecting the Underestimated\" data-id=\"4788\" \/><\/a><\/div>\t\t\t\t<div class=\"tm-box-post-date\">\n\t\t\t\t\t<span>03<\/span>\n\t\t\t\t\tJul\t\t\t\t<\/div>\t\n\t\t\t\t<div class=\"tm-blog-overlay-iconbox\">\n\t\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?p=4659\" rel=\"bookmark\"><i class=\"tm-anomica-icon-plus-1\"><\/i><\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\t\t\n\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t<div class=\"entry-header\">\n\t\t\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?p=4659\">The Imperative of Cybersecurity in Small Companies: Protecting the Underestimated<\/a><\/h4><\/div>\t\t\t\t\t<div class=\"tm-entry-meta-wrapper\"><div class=\"entry-meta tm-entry-meta tm-entry-meta-blogbox\"><span class=\"tm-meta-line comments-link\"><i class=\"tm-anomica-icon-chat\"><\/i> <a href=\"https:\/\/cybersecurity.hots.sa\/?p=4659#respond\">0 Comments<\/a><\/span><span class=\"tm-meta-line byline\"><i class=\"fa fa-user\"><\/i> <span class=\"author vcard\"><span class=\"screen-reader-text tm-hide\">Author <\/span><a class=\"url fn n\" href=\"https:\/\/cybersecurity.hots.sa\/?author=5\">wphotssaadmin@hots.sa<\/a><\/span><\/span><\/div><\/div>\t\t\t\t<\/div>\t\t\n\t\t\t\t<div class=\"themetechmount-box-desc-text\">In the vast landscape of the business world, small companies often operate under the radar, overshad...<\/div>\n\t\t\t    <div class=\"themetechmount-box-desc-footer\">\n\t\t\t\t\t<div class=\"themetechmount-blogbox-desc-footer\">\n\t\t\t\t\t\t<div class=\"themetechmount-blogbox-footer-left themetechmount-wrap-cell\"><a href=\"https:\/\/cybersecurity.hots.sa\/?p=4659\">Read More<\/a><\/div>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\t\t\n\t\t\t<\/div>\n        <\/div>\n\t<\/div>\n<\/article>\n<\/div><div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 cyber-data design\"><article class=\"themetechmount-box themetechmount-box-blog themetechmount-blogbox-style-two themetechmount-blogbox-format- \">\n\t<div class=\"post-item\">\n\t\t<div class=\"themetechmount-box-content\">\t\t\n\t\t\t<div class=\"tm-featured-outer-wrapper tm-post-featured-outer-wrapper\">\n\t\t\t\t<div class=\"tm-featured-wrapper tm-post-featured-wrapper tm-post-format-\"><a href=\"https:\/\/cybersecurity.hots.sa\/?p=1200\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/10\/post-two-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"5 Easy Ways to Improve Your Web Security\" data-id=\"4179\" \/><\/a><\/div>\t\t\t\t<div class=\"tm-box-post-date\">\n\t\t\t\t\t<span>15<\/span>\n\t\t\t\t\tJun\t\t\t\t<\/div>\t\n\t\t\t\t<div class=\"tm-blog-overlay-iconbox\">\n\t\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?p=1200\" rel=\"bookmark\"><i class=\"tm-anomica-icon-plus-1\"><\/i><\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\t\t\n\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t<div class=\"entry-header\">\n\t\t\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?p=1200\">5 Easy Ways to Improve Your Web Security<\/a><\/h4><\/div>\t\t\t\t\t<div class=\"tm-entry-meta-wrapper\"><div class=\"entry-meta tm-entry-meta tm-entry-meta-blogbox\"><span class=\"tm-meta-line comments-link\"><i class=\"tm-anomica-icon-chat\"><\/i> <a href=\"https:\/\/cybersecurity.hots.sa\/?p=1200#respond\">0 Comments<\/a><\/span><span class=\"tm-meta-line byline\"><i class=\"fa fa-user\"><\/i> <span class=\"author vcard\"><span class=\"screen-reader-text tm-hide\">Author <\/span><a class=\"url fn n\" href=\"https:\/\/cybersecurity.hots.sa\/?author=5\">wphotssaadmin@hots.sa<\/a><\/span><\/span><\/div><\/div>\t\t\t\t<\/div>\t\t\n\t\t\t\t<div class=\"themetechmount-box-desc-text\">In today's digital age, web security is more crucial than ever. With cyber threats evolving and mult...<\/div>\n\t\t\t    <div class=\"themetechmount-box-desc-footer\">\n\t\t\t\t\t<div class=\"themetechmount-blogbox-desc-footer\">\n\t\t\t\t\t\t<div class=\"themetechmount-blogbox-footer-left themetechmount-wrap-cell\"><a href=\"https:\/\/cybersecurity.hots.sa\/?p=1200\">Read More<\/a><\/div>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\t\t\n\t\t\t<\/div>\n        <\/div>\n\t<\/div>\n<\/article>\n<\/div><div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 cyber-data security\"><article class=\"themetechmount-box themetechmount-box-blog themetechmount-blogbox-style-two themetechmount-blogbox-format- \">\n\t<div class=\"post-item\">\n\t\t<div class=\"themetechmount-box-content\">\t\t\n\t\t\t<div class=\"tm-featured-outer-wrapper tm-post-featured-outer-wrapper\">\n\t\t\t\t<div class=\"tm-featured-wrapper tm-post-featured-wrapper tm-post-format-\"><a href=\"https:\/\/cybersecurity.hots.sa\/?p=4658\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"490\" src=\"https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2019\/06\/data-loss-article-654x490.jpg\" class=\"attachment-themetechmount-img-blog-top size-themetechmount-img-blog-top wp-post-image\" alt=\"Understanding Cybersecurity Data Loss: Causes, Consequences, and Countermeasures\" data-id=\"4782\" \/><\/a><\/div>\t\t\t\t<div class=\"tm-box-post-date\">\n\t\t\t\t\t<span>14<\/span>\n\t\t\t\t\tJun\t\t\t\t<\/div>\t\n\t\t\t\t<div class=\"tm-blog-overlay-iconbox\">\n\t\t\t\t\t<a href=\"https:\/\/cybersecurity.hots.sa\/?p=4658\" rel=\"bookmark\"><i class=\"tm-anomica-icon-plus-1\"><\/i><\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\t\t\n\t\t\t<div class=\"themetechmount-box-desc\">\n\t\t\t\t<div class=\"entry-header\">\n\t\t\t\t\t<div class=\"themetechmount-box-title\"><h4><a href=\"https:\/\/cybersecurity.hots.sa\/?p=4658\">Understanding Cybersecurity Data Loss: Causes, Consequences, and Countermeasures<\/a><\/h4><\/div>\t\t\t\t\t<div class=\"tm-entry-meta-wrapper\"><div class=\"entry-meta tm-entry-meta tm-entry-meta-blogbox\"><span class=\"tm-meta-line comments-link\"><i class=\"tm-anomica-icon-chat\"><\/i> <a href=\"https:\/\/cybersecurity.hots.sa\/?p=4658#respond\">0 Comments<\/a><\/span><span class=\"tm-meta-line byline\"><i class=\"fa fa-user\"><\/i> <span class=\"author vcard\"><span class=\"screen-reader-text tm-hide\">Author <\/span><a class=\"url fn n\" href=\"https:\/\/cybersecurity.hots.sa\/?author=5\">wphotssaadmin@hots.sa<\/a><\/span><\/span><\/div><\/div>\t\t\t\t<\/div>\t\t\n\t\t\t\t<div class=\"themetechmount-box-desc-text\">In the digital age, data is often referred to as the 'new oil' \u2013 a valuable resource that powers b...<\/div>\n\t\t\t    <div class=\"themetechmount-box-desc-footer\">\n\t\t\t\t\t<div class=\"themetechmount-blogbox-desc-footer\">\n\t\t\t\t\t\t<div class=\"themetechmount-blogbox-footer-left themetechmount-wrap-cell\"><a href=\"https:\/\/cybersecurity.hots.sa\/?p=4658\">Read More<\/a><\/div>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\t\t\n\t\t\t<\/div>\n        <\/div>\n\t<\/div>\n<\/article>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; tm_zindex=&#8221;2&#8243; full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1587043459453{margin-top: -82px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; el_id=&#8221;about-us&#8221;][vc_column tm_col_bg_expand=&#8221;left&#8221; tm_zindex=&#8221;1&#8243; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1694358259859{margin-top: -90px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2023\/09\/about-us.jpg?id=4713) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;tm-colbgimage-full&#8221; tm_responsive_css=&#8221;63463002|colbreak_no|||||||||colbreak_no|0px||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221;][\/vc_column][vc_column tm_col_bg_expand=&#8221;right&#8221; tm_bgimage_position=&#8221;left_top&#8221; tm_zindex=&#8221;2&#8243; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1587104299055{margin-left: -82px !important;padding-top: 145px !important;padding-bottom: 25px !important;background-image: url(https:\/\/cybersecurity.hots.sa\/wp-content\/uploads\/2020\/04\/col-bg-one.jpg?id=1952) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; tm_responsive_css=&#8221;58704698|colbreak_no||||-|||||colbreak_no||||0px|||||colbreak_no|||||40px|||||colbreak_no|||||||||&#8221; el_class=&#8221;tm-hidecolbg-767&#8243;][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1587036679524{padding-bottom: 15px !important;padding-left: 55px !important;}&#8221; &hellip; <a href=\"https:\/\/cybersecurity.hots.sa\/?p=4658\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Understanding Cybersecurity Data Loss: Causes, Consequences, and Countermeasures<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":19,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1948","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=\/wp\/v2\/pages\/1948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1948"}],"version-history":[{"count":23,"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=\/wp\/v2\/pages\/1948\/revisions"}],"predecessor-version":[{"id":4856,"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=\/wp\/v2\/pages\/1948\/revisions\/4856"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.hots.sa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}