{"id":635,"date":"2024-02-12T09:31:57","date_gmt":"2024-02-12T09:31:57","guid":{"rendered":"https:\/\/nexacybersecurity.com\/?page_id=635"},"modified":"2024-02-12T11:02:39","modified_gmt":"2024-02-12T11:02:39","slug":"compromise-assessment","status":"publish","type":"page","link":"https:\/\/nexacybersecurity.com\/index.php\/compromise-assessment\/","title":{"rendered":"Compromise Assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"635\" class=\"elementor elementor-635\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4cd32a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4cd32a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29e39ee\" data-id=\"29e39ee\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9db5c06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9db5c06\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2628a5a\" data-id=\"2628a5a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-029d557 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"029d557\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Compromise Assessment<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a71ccb elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7a71ccb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">We provide innovative solutions for your security needs.\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4feb540 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4feb540\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1a0015c elementor-invisible\" data-id=\"1a0015c\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db8e391 elementor-widget elementor-widget-heading\" data-id=\"db8e391\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed7873 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"5ed7873\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">What is <span><span>Compromise assessment<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Compromise assessment is the process of systematically examining systems, networks, and digital assets to identify signs of unauthorized access, malicious activity, or security breaches. It involves analyzing security logs, network traffic, and system configurations to detect indicators of compromise (IOCs) and assess the extent of a potential security compromise.<\/p>\n<p>At Nexa Cyber Security, we recognize the critical importance of proactively identifying and mitigating potential compromises to your organization's digital assets. Our Compromise Assessment Service is meticulously designed to provide comprehensive evaluations of your systems and networks, ensuring early detection and remediation of security breaches.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0653b30\" data-id=\"0653b30\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-717bb45 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"717bb45\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-32599e8 elementor-invisible\" data-id=\"32599e8\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7f4a7c elementor-widget elementor-widget-image\" data-id=\"a7f4a7c\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1156\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127198_17098y_e1p6ut35cdq6irj741h7asr9dpin6so-min.jpg\" class=\"attachment-full size-full wp-image-653\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127198_17098y_e1p6ut35cdq6irj741h7asr9dpin6so-min.jpg 1920w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127198_17098y_e1p6ut35cdq6irj741h7asr9dpin6so-min-300x181.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127198_17098y_e1p6ut35cdq6irj741h7asr9dpin6so-min-1024x617.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127198_17098y_e1p6ut35cdq6irj741h7asr9dpin6so-min-768x462.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127198_17098y_e1p6ut35cdq6irj741h7asr9dpin6so-min-1536x925.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eead932 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eead932\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1fecda5 elementor-invisible\" data-id=\"1fecda5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbf1c67 elementor-widget elementor-widget-heading\" data-id=\"cbf1c67\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nexa Cyber Security's Compromise Assessment Service<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-58042b1 elementor-invisible\" data-id=\"58042b1\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-013dab2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"013dab2\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cc17232\" data-id=\"cc17232\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b18208 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"8b18208\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/nexacybersecurity.com\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-box.min.css\">\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 512 512\" width=\"512\"><g><g><path d=\"m371.5 472.6c-2.5 3.8-6.6 6.1-11.1 6.1h-208.8c-4.5 0-8.7-2.3-11.1-6.1-2.4-3.7-2.7-8.3-1-12.3 5.1-11.4 16.5-18.7 29-18.7h25v-22h125.1v22h25c12.5 0 23.8 7.4 29 18.7 1.7 4 1.3 8.7-1.1 12.3z\"><\/path><\/g><g><g><path d=\"m166.7 157.4c-6.9 25.7-30.5 44.7-58.3 44.7-33.3-.1-60.4-27.1-60.4-60.4 0-27.9 19-51.4 44.7-58.3-.7 2.7-.3.9-.4 58.3 0 8.8 7.2 16 16 16 57.1-.1 55.6.2 58.4-.3z\"><\/path><\/g><g><path d=\"m168.7 141.7c0 2.9-2.4 5.3-5.3 5.3h-55c-2.9 0-5.3-2.4-5.3-5.3v-55c0-3 2.4-5.3 5.3-5.3 33.3 0 60.3 27 60.3 60.3z\"><\/path><\/g><g><path d=\"m163.4 234.4h-110.1c-2.9 0-5.3-2.4-5.3-5.3s2.4-5.3 5.3-5.3h110.1c2.9 0 5.3 2.4 5.3 5.3s-2.4 5.3-5.3 5.3z\"><\/path><\/g><g><path d=\"m163.4 265.8h-110.1c-2.9 0-5.3-2.4-5.3-5.3s2.4-5.3 5.3-5.3h110.1c2.9 0 5.3 2.4 5.3 5.3 0 3-2.4 5.3-5.3 5.3z\"><\/path><\/g><g><path d=\"m163.4 297.3h-110.1c-2.9 0-5.3-2.4-5.3-5.3s2.4-5.3 5.3-5.3h110.1c2.9 0 5.3 2.4 5.3 5.3s-2.4 5.3-5.3 5.3z\"><\/path><\/g><g><path d=\"m266.4 208.5v78.1c0 5.9-4.8 10.7-10.7 10.7h-22.2c-5.9 0-10.7-4.8-10.7-10.7v-78.1c0-5.9 4.7-10.7 10.7-10.7h22.2c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m332.3 153.5v133.1c0 5.9-4.8 10.7-10.7 10.7h-22.2c-5.9 0-10.7-4.8-10.7-10.7v-133.1c0-5.9 4.7-10.7 10.7-10.7h22.2c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m398.1 208.5v78.1c0 5.9-4.8 10.7-10.7 10.7h-22.3c-5.9 0-10.7-4.8-10.7-10.7v-78.1c0-5.9 4.8-10.7 10.7-10.7h22.3c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m464 175.9v110.7c0 5.9-4.8 10.7-10.7 10.7h-22.3c-5.9 0-10.7-4.8-10.7-10.7v-110.7c0-5.9 4.8-10.7 10.7-10.7h22.3c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m376.3 170.3c-1.5 0-3-.7-4.1-1.9l-62.2-74-61.7 59.6c-2.1 2-5.5 2-7.5-.1s-2-5.5.1-7.5l65.9-63.6c1.1-1 2.5-1.6 4-1.5s2.9.8 3.8 1.9l62.7 74.6 61.9-43.7c2.4-1.7 5.7-1.1 7.4 1.3s1.1 5.7-1.3 7.4l-65.9 46.6c-.9.6-2 .9-3.1.9z\"><\/path><\/g><\/g><g><path d=\"m256 359.2c-4 0-7.3 3.3-7.3 7.3s3.3 7.3 7.3 7.3 7.3-3.3 7.3-7.3-3.3-7.3-7.3-7.3z\"><\/path><path d=\"m485.3 33.3h-458.6c-14.8 0-26.7 11.9-26.7 26.6 0 8.5 0 342.8 0 322.4 0 14.7 11.9 26.7 26.7 26.7h458.7c14.7 0 26.7-12 26.7-26.7 0-40.7 0-281.9 0-322.4-.1-14.7-12.1-26.6-26.8-26.6zm-229.3 351.2c-9.9 0-18-8.1-18-18s8.1-18 18-18 18 8.1 18 18-8.1 18-18 18zm234.7-60.6h-469.4v-264c0-2.9 2.4-5.3 5.3-5.3h458.7c2.9 0 5.3 2.4 5.3 5.3v264z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAnalysis\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAnalyze security logs, network traffic, and system activity to detect signs of unauthorized access, malicious activity, or security breaches.\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f4f1256\" data-id=\"f4f1256\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df371d4 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"df371d4\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" data-name=\"Layer 1\" id=\"Layer_1\" viewBox=\"0 0 64 64\"><title><\/title><path d=\"M23,13.364a1,1,0,0,0-1,1v3.272a1,1,0,0,0,1,1h1.067a8.239,8.239,0,0,0,.46,1.108l-.755.756a1,1,0,0,0,0,1.414l2.314,2.314a1,1,0,0,0,1.414,0l.756-.755a8.239,8.239,0,0,0,1.108.46V25a1,1,0,0,0,1,1h3.272a1,1,0,0,0,1-1V23.933a8.239,8.239,0,0,0,1.108-.46l.756.755a1,1,0,0,0,1.414,0l2.314-2.314a1,1,0,0,0,0-1.414l-.755-.756a8.239,8.239,0,0,0,.46-1.108H41a1,1,0,0,0,1-1V14.364a1,1,0,0,0-1-1H39.933a8.239,8.239,0,0,0-.46-1.108l.755-.756a1,1,0,0,0,0-1.414L37.914,7.772a1,1,0,0,0-1.414,0l-.756.755a8.239,8.239,0,0,0-1.108-.46V7a1,1,0,0,0-1-1H30.364a1,1,0,0,0-1,1V8.067a8.239,8.239,0,0,0-1.108.46L27.5,7.772a1,1,0,0,0-1.414,0l-2.314,2.314a1,1,0,0,0,0,1.414l.755.756a8.239,8.239,0,0,0-.46,1.108Zm1.825,2a1,1,0,0,0,.975-.779,6.312,6.312,0,0,1,.817-1.967,1,1,0,0,0-.139-1.24l-.585-.585.9-.9.585.585a1,1,0,0,0,1.24.139A6.312,6.312,0,0,1,30.585,9.8a1,1,0,0,0,.779-.975V8h1.272v.825a1,1,0,0,0,.779.975,6.312,6.312,0,0,1,1.967.817,1,1,0,0,0,1.24-.139l.585-.585.9.9-.585.585a1,1,0,0,0-.139,1.24,6.312,6.312,0,0,1,.817,1.967,1,1,0,0,0,.975.779H40v1.272h-.825a1,1,0,0,0-.975.779,6.312,6.312,0,0,1-.817,1.967,1,1,0,0,0,.139,1.24l.585.585-.9.9-.585-.585a1,1,0,0,0-1.24-.139,6.312,6.312,0,0,1-1.967.817,1,1,0,0,0-.779.975V24H31.364v-.825a1,1,0,0,0-.779-.975,6.312,6.312,0,0,1-1.967-.817,1,1,0,0,0-1.24.139l-.585.585-.9-.9.585-.585a1,1,0,0,0,.139-1.24,6.312,6.312,0,0,1-.817-1.967,1,1,0,0,0-.975-.779H24V15.364Z\"><\/path><path d=\"M51,42V33.548a4.535,4.535,0,0,0-2.463-4.018A5.015,5.015,0,1,0,41.026,29h-.9l-7.88-1.97c-.006,0-.012,0-.018,0a1.021,1.021,0,0,0-.241,0,1.088,1.088,0,0,0-.206,0c-.007,0-.014,0-.021,0L23.877,29h-.9A4.948,4.948,0,0,0,24,26a5,5,0,1,0-8.537,3.53A4.535,4.535,0,0,0,13,33.548V42a1,1,0,0,0,.553.9L15,43.618V50a1,1,0,0,0,1,1h6a1,1,0,0,0,1-1V43.618l1.447-.723A1,1,0,0,0,25,42V36.554l7-4.375,7,4.375V42a1,1,0,0,0,.553.9L41,43.618V50a1,1,0,0,0,1,1h6a1,1,0,0,0,1-1V43.618l1.447-.723A1,1,0,0,0,51,42ZM19,23a3,3,0,1,1-3,3A3,3,0,0,1,19,23Zm12,7.446-7.53,4.706A1,1,0,0,0,23,36v5.382l-1.447.723A1,1,0,0,0,21,43v6H17V43a1,1,0,0,0-.553-.9L15,41.382V33.548A2.551,2.551,0,0,1,17.548,31H24a1,1,0,0,0,.243-.03L31,29.281ZM45,23a3,3,0,1,1-3,3A3,3,0,0,1,45,23Zm4,18.382-1.447.723A1,1,0,0,0,47,43v6H43V43a1,1,0,0,0-.553-.9L41,41.382V36a1,1,0,0,0-.47-.848L33,30.446V29.281l6.757,1.689A1,1,0,0,0,40,31h6.452A2.551,2.551,0,0,1,49,33.548Z\"><\/path><path d=\"M26.076,47.617a1,1,0,0,0,.217,1.09l2,2,1.414-1.414L29.414,49H37V47H27A1,1,0,0,0,26.076,47.617Z\"><\/path><path d=\"M27,45H37a1,1,0,0,0,.707-1.707l-2-2-1.414,1.414.293.293H27Z\"><\/path><path d=\"M32,20a4,4,0,1,0-4-4A4,4,0,0,0,32,20Zm0-6a2,2,0,1,1-2,2A2,2,0,0,1,32,14Z\"><\/path><path d=\"M5.141,40.128A28.279,28.279,0,0,1,4,32.206l-2,0A30.285,30.285,0,0,0,3.223,40.7Z\"><\/path><path d=\"M12.3,9.414l1.314,1.515A28,28,0,0,1,20.3,6.578L19.46,4.752A30.031,30.031,0,0,0,12.3,9.414Z\"><\/path><path d=\"M44.375,4.677l-.826,1.83a28,28,0,0,1,6.713,4.312l1.3-1.524A29.961,29.961,0,0,0,44.375,4.677Z\"><\/path><path d=\"M55.565,47.354a28.219,28.219,0,0,1-5.217,6.052l1.311,1.517a30.246,30.246,0,0,0,5.588-6.481Z\"><\/path><path d=\"M12.387,54.963l1.308-1.52A28.216,28.216,0,0,1,8.466,47.4l-1.68,1.09A30.2,30.2,0,0,0,12.387,54.963Z\"><\/path><path d=\"M5.109,24.28a28.091,28.091,0,0,1,3.3-7.287L6.721,15.909a30.062,30.062,0,0,0-3.533,7.809Z\"><\/path><path d=\"M57.181,15.755,55.5,16.849a28.068,28.068,0,0,1,3.34,7.267l1.917-.573A30.1,30.1,0,0,0,57.181,15.755Z\"><\/path><path d=\"M60,32.149a28.285,28.285,0,0,1-1.125,7.924l1.919.565A30.321,30.321,0,0,0,62,32.149v-.117H60Z\"><\/path><path d=\"M43.652,57.744A27.763,27.763,0,0,1,36.012,60l.284,1.989a29.712,29.712,0,0,0,8.189-2.42Z\"><\/path><path d=\"M32,4.01a28.364,28.364,0,0,1,3.9.27l.275-1.99A30.3,30.3,0,0,0,32,2h-.01a30.14,30.14,0,0,0-4.346.315L27.932,4.3a28.15,28.15,0,0,1,4.059-.294Z\"><\/path><path d=\"M19.569,59.6a29.707,29.707,0,0,0,8.2,2.4l.28-1.99A27.7,27.7,0,0,1,20.4,57.767Z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIOCs\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIdentify indicators of compromise (IOCs) and assess the extent of a potential security compromise.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-567410f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"567410f\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e88ed2c\" data-id=\"e88ed2c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd003e0 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"bd003e0\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 512 512\" width=\"512\"><path d=\"m495.202 94.752-64.792-27.768c-2.562-1.099-5.514-.783-7.789.835l-47.454 33.755c-3.145 2.236-4.244 6.399-2.614 9.897l9.486 20.356-3.553 17.877c-.354 1.781-.091 3.629.744 5.241l9.728 18.769-29.379-14.12 5.221-26.345c.499-2.518-.241-5.123-1.989-7.003l-15.083-16.219 11.682-27.089 26.447-22.468c2.111-1.793 3.145-4.551 2.731-7.289-.413-2.739-2.213-5.069-4.759-6.161l-89.543-38.374c-2.013-.861-4.291-.861-6.303 0l-83.077 35.604c-20.377-21.674-49.292-35.233-81.317-35.233-61.559 0-111.64 50.082-111.64 111.641 0 46.949 29.134 87.219 70.27 103.69v40.217c0 79.329 39.302 153.771 105.132 199.134 1.78 1.227 3.983 1.683 6.103 1.258 2.121-.423 3.98-1.686 5.154-3.501l21.849-33.784 24.013 3.577c2.953.438 5.896-.798 7.649-3.209l6.275-8.632-4.092 21.718-23.354-3.276c-3.177-.45-6.308 1.046-7.963 3.791l-15.187 25.187c-1.134 1.88-1.445 4.144-.861 6.26.584 2.117 2.013 3.9 3.951 4.933 24.021 12.792 46.873 20.285 78.872 25.861.455.079.914.119 1.374.119s.919-.04 1.373-.119c58.402-10.176 111.106-38.989 148.401-81.131 38.691-43.719 59.142-98.418 59.142-158.185v-162.46c.001-3.201-1.906-6.094-4.848-7.354zm-204.067-70.048 74.521 31.937-18.03 15.316c-.752.639-1.371 1.415-1.84 2.279l-51.5-22.072c-2.013-.861-4.29-.861-6.303 0l-61.09 26.182c-3.083-7.5-6.959-14.591-11.524-21.171zm-263.186 95.954c0-52.736 42.904-95.641 95.64-95.641s95.64 42.904 95.64 95.641-42.904 95.641-95.64 95.641-95.64-42.905-95.64-95.641zm161.778 325.067c-57.454-42.712-91.508-109.825-91.508-181.16v-35.177c7.725 1.802 15.757 2.793 24 2.893v32.284c0 63.136 29.989 122.727 80.579 160.95zm52.303-31.016-24.313-3.622c-2.042-.301-4.066.21-5.703 1.335-46.339-35.22-73.795-89.923-73.795-147.856v-33.226c54.67-7.188 97.011-54.081 97.011-110.682 0-9.327-1.156-18.387-3.322-27.053l59.227-25.384 48.277 20.69-8.441 19.573c-1.256 2.913-.672 6.293 1.488 8.616l15.854 17.049-5.631 28.415c-.709 3.579 1.093 7.185 4.382 8.765l56.558 27.183c3.103 1.492 6.811.831 9.207-1.64 2.396-2.47 2.945-6.196 1.361-9.252l-19.462-37.548 3.516-17.692c.331-1.668.123-3.397-.595-4.938l-7.778-16.691.188-.134 53.994 23.139v130.809c0 89.972-64.224 166.588-152.916 182.706-7.175-1.302-14.031-2.948-20.77-4.986l10.339-54.873c.693-3.678-1.256-7.344-4.692-8.826-3.435-1.483-7.439-.386-9.641 2.641zm242.021-150.144c0 111.249-79.252 202.889-192.92 223.312-26.128-4.642-45.714-10.654-65.195-20.143l8.024-13.307 25.68 3.604c1.715.244 3.379-.085 4.81-.834 8.199 2.541 16.532 4.548 25.31 6.081.455.079.915.119 1.375.119.459 0 .919-.04 1.373-.119 46.621-8.121 89.194-32.601 119.876-68.928 30.738-36.396 47.667-82.487 47.667-129.785v-136.084c0-3.2-1.907-6.093-4.849-7.354l-49.872-21.373 22.907-16.294 55.814 23.921zm-360.464-114.094h.003c10.011-.001 18.136-7.838 18.497-17.842l2.657-73.574c.186-5.141-1.604-9.815-5.176-13.521-3.571-3.701-8.178-5.658-13.323-5.658h-5.314c-5.145 0-9.752 1.957-13.323 5.659-3.571 3.703-5.361 8.377-5.176 13.52l2.657 73.573c.362 10.007 8.486 17.843 18.498 17.843zm-4.461-93.828c.546-.566 1.019-.767 1.806-.767h5.314c.789 0 1.261.201 1.807.766.547.567.731 1.048.703 1.835l-2.657 73.574c-.049 1.357-1.151 2.42-2.509 2.42h-.001c-1.357 0-2.459-1.062-2.508-2.42l-2.657-73.572c-.029-.788.155-1.268.702-1.836zm25.928 123.33c0-11.836-9.629-21.465-21.465-21.465s-21.465 9.629-21.465 21.465 9.629 21.465 21.465 21.465 21.465-9.629 21.465-21.465zm-26.93 0c0-3.014 2.452-5.465 5.465-5.465s5.465 2.451 5.465 5.465-2.452 5.465-5.465 5.465-5.465-2.451-5.465-5.465zm254.646 170.858v-101.847c0-9.684-7.879-17.562-17.563-17.562h-84.448v-24.566c0-11.235 9.14-20.376 20.375-20.376s20.376 9.141 20.376 20.376v14.171c0 4.418 3.582 8 8 8h23.958c4.418 0 8-3.582 8-8v-14.171c0-33.269-27.066-60.335-60.334-60.335s-60.334 27.066-60.334 60.334v24.566h-3.738c-9.684 0-17.563 7.879-17.563 17.562v101.847c0 9.685 7.879 17.563 17.563 17.563h128.145c9.684.001 17.563-7.878 17.563-17.562zm-125.97-143.976c0-24.446 19.889-44.335 44.335-44.335s44.334 19.889 44.334 44.335v6.171h-7.958v-6.171c0-20.058-16.318-36.376-36.376-36.376s-36.375 16.318-36.375 36.376v24.566h-7.96zm-21.301 143.976v-101.847c0-.847.716-1.562 1.563-1.562h128.145c.847 0 1.563.716 1.563 1.562v101.847c0 .848-.716 1.563-1.563 1.563h-128.145c-.847 0-1.563-.716-1.563-1.563zm65.636-95.441c-16.622 0-30.144 13.522-30.144 30.144 0 8.946 3.865 17.216 10.527 22.897v16.377c0 10.817 8.8 19.617 19.617 19.617 10.816 0 19.616-8.8 19.616-19.617v-16.377c6.663-5.682 10.527-13.951 10.527-22.897.001-16.621-13.522-30.144-30.143-30.144zm7.413 42.192c-2.36 1.457-3.797 4.033-3.797 6.807v20.42c0 1.961-1.656 3.617-3.616 3.617s-3.617-1.656-3.617-3.617v-20.42c0-2.773-1.437-5.35-3.797-6.807-4.214-2.603-6.73-7.106-6.73-12.048 0-7.799 6.345-14.144 14.144-14.144s14.144 6.345 14.144 14.144c0 4.941-2.516 9.445-6.731 12.048z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSecurity Risks Management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProvide actionable insights and recommendations for mitigating security risks and remediating compromised systems.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-70f4f24\" data-id=\"70f4f24\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ea8892 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5ea8892\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-handshake\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCollaboration\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCollaborate with organizations to develop proactive strategies for enhancing their security posture and resilience against cyber threats.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bb425f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb425f7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a997c1\" data-id=\"6a997c1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d4d1df3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d4d1df3\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6ae1f14 elementor-invisible\" data-id=\"6ae1f14\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dbf626 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"8dbf626\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Why is <span><span>Compromise Assessment<\/span><\/span> Required?<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Compromise assessment is essential for several reasons:<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f73e4e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"f73e4e2\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-9982ebc\" data-id=\"9982ebc\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a3bbc2 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"7a3bbc2\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\" data-name=\"Layer 1\"><path d=\"m2 22h12a1 1 0 0 0 1-1v-7a4.994 4.994 0 0 0 -4.293-4.929 4.5 4.5 0 1 0 -5.414 0 4.994 4.994 0 0 0 -4.293 4.929v7a1 1 0 0 0 1 1zm6-19a2.5 2.5 0 1 1 -2.5 2.5 2.5 2.5 0 0 1 2.5-2.5zm-5 11a3 3 0 0 1 3-3h4a3 3 0 0 1 3 3v6h-10z\"><\/path><path d=\"m62 16h-1v-11a4 4 0 0 0 -4-4h-4a4 4 0 0 0 -4 4v11h-1a1 1 0 0 0 -1 1v4a1 1 0 0 0 1 1h14a1 1 0 0 0 1-1v-4a1 1 0 0 0 -1-1zm-11-11a2 2 0 0 1 2-2h4a2 2 0 0 1 2 2v11h-8zm10 15h-12v-2h12z\"><\/path><path d=\"m53 5h4v2h-4z\"><\/path><path d=\"m52 9h6v2h-6z\"><\/path><path d=\"m35 12h6.827l-2.4 1.681 1.146 1.638 5-3.5a1 1 0 0 0 0-1.638l-5-3.5-1.146 1.638 2.4 1.681h-6.827z\"><\/path><path d=\"m18 10h11v2h-11z\"><\/path><path d=\"m44 38a12 12 0 1 0 -12 12 12.013 12.013 0 0 0 12-12zm-22 0a10 10 0 1 1 10 10 10.011 10.011 0 0 1 -10-10z\"><\/path><path d=\"m36.024 63v-5h.976a1 1 0 0 0 1-1v-4.178a16 16 0 1 0 -12 0v4.178a1 1 0 0 0 1 1h1.024v5h2v-5h4v5zm-18.024-25a14 14 0 1 1 14 14 14.015 14.015 0 0 1 -14-14zm10 18v-2.527a15.444 15.444 0 0 0 8 0v2.527z\"><\/path><path d=\"m32 40a1 1 0 0 0 .97-.757l2-8a1 1 0 0 0 -.97-1.243h-4a1 1 0 0 0 -.97 1.243l2 8a1 1 0 0 0 .97.757zm.719-8-.719 2.877-.719-2.877z\"><\/path><path d=\"m34.5 43.5a2.5 2.5 0 1 0 -2.5 2.5 2.5 2.5 0 0 0 2.5-2.5zm-3 0a.5.5 0 1 1 .5.5.5.5 0 0 1 -.5-.5z\"><\/path><path d=\"m31 2h2v2h-2z\"><\/path><path d=\"m31 6h2v2h-2z\"><\/path><path d=\"m31 10h2v2h-2z\"><\/path><path d=\"m31 14h2v2h-2z\"><\/path><path d=\"m31 18h2v2h-2z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEarly Detection of Security Breaches\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCompromise assessment helps organizations detect security breaches and unauthorized access early in the incident lifecycle. By identifying signs of compromise promptly, organizations can take immediate action to contain the threat and minimize the impact on their digital assets.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-b0968ea\" data-id=\"b0968ea\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f98bd6 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"7f98bd6\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_5\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\"><path d=\"m41.011 45h1.989v2h-1.989z\"><\/path><path d=\"m37.011 45h2v2h-2z\"><\/path><path d=\"m60.657 5c-2.736 0-5.309-1.065-7.243-3-1.289-1.289-3.539-1.289-4.828 0-1.935 1.935-4.507 3-7.243 3-1.292 0-2.343 1.051-2.343 2.343v4.952c0 .237.018.47.028.705h-21.028c-2.757 0-5 2.243-5 5v20c0 2.099.511 4.076 1.398 5.833l-11.969 11.402c-.908.845-1.429 2.041-1.429 3.282 0 2.471 2.012 4.483 4.483 4.483 1.24 0 2.437-.521 3.273-1.421l11.41-11.977c1.758.887 3.735 1.398 5.834 1.398h7v2h-9.5l-3.5 4.667v5.333h36v-5.333l-3.5-4.667h-9.5v-2h15c2.757 0 5-2.243 5-5v-33.705-.295-4.657c0-1.292-1.051-2.343-2.343-2.343zm-9.999 23.939.342.125.342-.125c2.122-.771 4.028-1.932 5.658-3.376v7.437h-8v8h-10.363c.229-.965.363-1.966.363-3 0-7.168-5.832-13-13-13-2.578 0-4.977.764-7 2.063v-8.063h21.33c1.861 4.526 5.559 8.205 10.328 9.939zm6.342 6.061v6h-6v-6zm-42-17c0-1.654 1.346-3 3-3h21.211c.106.679.262 1.344.444 2h-20.655c-1.103 0-2 .897-2 2v9.641c-.764.735-1.433 1.562-2 2.463zm-7.698 42.208c-.469.503-1.132.792-1.819.792-1.369 0-2.483-1.114-2.483-2.483 0-.687.289-1.35.8-1.826l11.661-11.109c.821 1.138 1.819 2.137 2.958 2.958zm7.698-22.208c0-6.065 4.935-11 11-11s11 4.935 11 11-4.935 11-11 11-11-4.935-11-11zm9.5 17h8.5v2h-10zm-2.5 6v-2h32v2zm29.5-6 1.5 2h-10v-2zm-10.5 2h-6v-6h6zm20-11c0 1.654-1.346 3-3 3h-25.104c2.26-1.422 4.06-3.511 5.101-6h19.003c1.103 0 2-.897 2-2v-17.514c.771-.946 1.437-1.973 2-3.057zm0-33.705c0 6.093-3.564 11.628-9 14.201v-11.496h-2v11.496c-5.436-2.574-9-8.108-9-14.201v-4.952c0-.19.153-.343.343-.343 3.27 0 6.345-1.273 8.657-3.586v5.586h2v-5.586c2.312 2.313 5.387 3.586 8.657 3.586.19 0 .343.153.343.343v4.657z\"><\/path><path d=\"m50 11h2v2h-2z\"><\/path><path d=\"m26 29c-4.963 0-9 4.037-9 9s4.037 9 9 9 9-4.037 9-9-4.037-9-9-9zm0 16c-3.859 0-7-3.141-7-7 0-1.902.765-3.626 2-4.889v2.889c0 1.654 1.346 3 3 3h3v-2h-3c-.552 0-1-.448-1-1v-4.315c.911-.434 1.926-.685 3-.685 3.859 0 7 3.141 7 7s-3.141 7-7 7z\"><\/path><path d=\"m21 21h2v2h-2z\"><\/path><path d=\"m39 24c0-1.654-1.346-3-3-3h-11v2h11c.552 0 1 .448 1 1v3h2z\"><\/path><path d=\"m28 33h-3v2h3c.552 0 1 .448 1 1v3h2v-3c0-1.654-1.346-3-3-3z\"><\/path><path d=\"m53 37h2v2h-2z\"><\/path><path d=\"m45 36c0 .552-.448 1-1 1h-3v2h3c1.654 0 3-1.346 3-3v-3h-2z\"><\/path><path d=\"m43 35v-2h-1c-.552 0-1-.448-1-1v-3h-2v3c0 1.654 1.346 3 3 3z\"><\/path><path d=\"m43 29h4v2h-4z\"><\/path><path d=\"m23 41h6v2h-6z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tThreat Hunting and Investigation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCompromise assessment enables organizations to proactively hunt for indicators of compromise (IOCs) and investigate potential security incidents. By analyzing security logs, network traffic, and system activity, organizations can gather evidence and insights to understand the nature and scope of a security compromise.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a6bb54d\" data-id=\"a6bb54d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3500c5d elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"3500c5d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 512 512\" width=\"512\"><path d=\"m504 471.187h-24.113v-308.26c0-4.418-3.582-8-8-8h-65.715c-4.418 0-8 3.582-8 8v308.26h-40.303v-246.214c0-4.418-3.582-8-8-8h-65.714c-4.418 0-8 3.582-8 8v246.214h-40.306v-177.242c0-4.418-3.582-8-8-8h-65.715c-4.418 0-8 3.582-8 8v177.242h-40.307v-111.19c0-4.418-3.582-8-8-8h-65.714c-4.418 0-8 3.582-8 8v111.19h-24.113c-4.418 0-8 3.582-8 8v24.813c0 4.418 3.582 8 8 8h496c4.418 0 8-3.582 8-8v-24.813c0-4.419-3.582-8-8-8zm-89.828-300.26h49.715v300.26h-49.715zm-122.017 62.046h49.714v238.214h-49.714zm-122.021 68.972h49.715v169.242h-49.715zm-122.021 66.052h49.714v103.19h-49.714zm447.887 128.003h-480v-8.813h480zm-365.085-226.663c.5.096 1.007.145 1.514.145s1.014-.048 1.514-.145c65.381-12.603 112.836-70.068 112.836-136.64v-88.893c0-3.435-2.192-6.486-5.448-7.582l-106.349-35.804c-1.656-.557-3.449-.557-5.105 0l-106.35 35.804c-3.255 1.096-5.448 4.147-5.448 7.582v88.894c0 66.571 47.455 124.036 112.836 136.639zm-96.836-219.785 98.35-33.111 98.35 33.111v83.146c0 58.403-41.266 108.886-98.35 120.627-57.083-11.741-98.35-62.224-98.35-120.627zm59.111 149.331 13.117-9.497c1.94.929 3.927 1.753 5.954 2.469l2.559 15.986c.621 3.881 3.969 6.735 7.899 6.735h19.42c3.93 0 7.278-2.855 7.899-6.736l2.559-15.987c2.026-.716 4.013-1.54 5.953-2.468l13.117 9.497c3.183 2.304 7.569 1.956 10.348-.823l13.732-13.732c2.779-2.779 3.128-7.165.823-10.348l-9.497-13.117c.929-1.94 1.753-3.927 2.469-5.953l15.986-2.559c3.881-.621 6.736-3.969 6.736-7.899v-19.42c0-3.93-2.855-7.278-6.736-7.899l-15.987-2.559c-.716-2.026-1.54-4.013-2.469-5.953l9.497-13.117c2.305-3.183 1.956-7.569-.823-10.348l-13.732-13.732c-2.779-2.779-7.165-3.128-10.348-.823l-13.117 9.497c-1.94-.929-3.927-1.753-5.953-2.469l-2.559-15.986c-.621-3.881-3.969-6.736-7.899-6.736h-19.42c-3.93 0-7.278 2.854-7.899 6.735l-2.559 15.986c-2.027.716-4.014 1.54-5.954 2.469l-13.116-9.497c-3.184-2.305-7.57-1.957-10.348.823l-13.732 13.732c-2.779 2.779-3.128 7.165-.823 10.349l9.498 13.117c-.929 1.94-1.753 3.927-2.468 5.953l-15.988 2.559c-3.88.621-6.735 3.969-6.735 7.899v19.42c0 3.93 2.855 7.278 6.735 7.899l15.988 2.56c.716 2.026 1.54 4.012 2.468 5.952l-9.498 13.117c-2.305 3.183-1.956 7.569.823 10.348l13.732 13.732c2.78 2.78 7.165 3.128 10.348.824zm-24.598-61.253v-5.778l14.181-2.27c3.148-.504 5.696-2.829 6.486-5.917 1.042-4.074 2.662-7.98 4.815-11.611 1.626-2.743 1.468-6.189-.401-8.772l-8.426-11.637 4.086-4.086 11.636 8.425c2.583 1.871 6.031 2.027 8.773.4 3.63-2.153 7.536-3.773 11.611-4.815 3.089-.79 5.414-3.338 5.918-6.486l2.27-14.179h5.778l2.27 14.179c.504 3.148 2.829 5.696 5.918 6.486 4.072 1.041 7.979 2.661 11.61 4.815 2.742 1.628 6.189 1.469 8.772-.4l11.637-8.426 4.085 4.086-8.425 11.637c-1.87 2.583-2.027 6.029-.401 8.772 2.153 3.63 3.773 7.538 4.815 11.612.79 3.088 3.338 5.413 6.486 5.917l14.18 2.27v5.778l-14.179 2.27c-3.148.504-5.696 2.829-6.486 5.918-1.042 4.073-2.662 7.979-4.815 11.611-1.627 2.743-1.47 6.189.4 8.772l8.425 11.637-4.085 4.086-11.637-8.426c-2.583-1.871-6.031-2.027-8.772-.4-3.628 2.152-7.535 3.772-11.611 4.814-3.088.79-5.413 3.338-5.917 6.486l-2.27 14.18h-5.778l-2.27-14.179c-.504-3.148-2.829-5.696-5.918-6.486-4.072-1.042-7.979-2.662-11.611-4.816-2.743-1.626-6.189-1.469-8.772.401l-11.637 8.425-4.086-4.086 8.426-11.636c1.87-2.583 2.027-6.03.401-8.772-2.152-3.629-3.772-7.537-4.816-11.613-.79-3.088-3.338-5.412-6.485-5.916zm63.837 33.806c20.233 0 36.695-16.461 36.695-36.695 0-20.233-16.461-36.694-36.695-36.694s-36.695 16.461-36.695 36.694c0 20.234 16.462 36.695 36.695 36.695zm0-57.39c11.411 0 20.695 9.283 20.695 20.694 0 11.412-9.284 20.695-20.695 20.695s-20.695-9.284-20.695-20.695c0-11.41 9.284-20.694 20.695-20.694z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRisk Mitigation and Remediation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCompromise assessment provides organizations with actionable insights and recommendations for mitigating security risks and remediating compromised systems. By addressing security vulnerabilities and implementing security controls, organizations can strengthen their security posture and reduce the risk of future compromises.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-fcb8b6d\" data-id=\"fcb8b6d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-940c56b elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"940c56b\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 64 64\" width=\"512\" height=\"512\"><path d=\"M41,28a2,2,0,0,0-2-2H38V24H36v2H34V24H32v2H31a2,2,0,0,0-2,2v1H27v2h2v2H27v2h2v1a2,2,0,0,0,2,2h1v2h2V38h2v2h2V38h1a2,2,0,0,0,2-2V35h2V33H41V31h2V29H41ZM31,36V28h8v8Z\"><\/path><path d=\"M35,19A13,13,0,1,0,48,32,13.015,13.015,0,0,0,35,19Zm0,24A11,11,0,1,1,46,32,11.013,11.013,0,0,1,35,43Z\"><\/path><path d=\"M4.5,8A3.5,3.5,0,1,0,1,4.5,3.5,3.5,0,0,0,4.5,8Zm0-5A1.5,1.5,0,1,1,3,4.5,1.5,1.5,0,0,1,4.5,3Z\"><\/path><path d=\"M4.5,35.5A3.5,3.5,0,1,0,1,32,3.5,3.5,0,0,0,4.5,35.5Zm0-5A1.5,1.5,0,1,1,3,32,1.5,1.5,0,0,1,4.5,30.5Z\"><\/path><path d=\"M4.5,63A3.5,3.5,0,1,0,1,59.5,3.5,3.5,0,0,0,4.5,63Zm0-5A1.5,1.5,0,1,1,3,59.5,1.5,1.5,0,0,1,4.5,58Z\"><\/path><path d=\"M4.5,49A3.5,3.5,0,1,0,1,45.5,3.5,3.5,0,0,0,4.5,49Zm0-5A1.5,1.5,0,1,1,3,45.5,1.5,1.5,0,0,1,4.5,44Z\"><\/path><path d=\"M4.5,22A3.5,3.5,0,1,0,1,18.5,3.5,3.5,0,0,0,4.5,22Zm0-5A1.5,1.5,0,1,1,3,18.5,1.5,1.5,0,0,1,4.5,17Z\"><\/path><path d=\"M62.515,31.143l-5-3A1,1,0,0,0,56,29v2H50v2h6v2a1,1,0,0,0,1.515.857l5-3a1,1,0,0,0,0-1.714ZM58,33.234V30.766L60.056,32Z\"><\/path><rect x=\"10\" y=\"31\" width=\"10\" height=\"2\"><\/rect><path d=\"M10,19.5h2.267l2.779,8.8A1,1,0,0,0,16,29h4V27H16.733l-2.779-8.8A1,1,0,0,0,13,17.5H10Z\"><\/path><path d=\"M19,25h3V23H19.739L13.956,4.206A1,1,0,0,0,13,3.5H10v2h2.261l5.783,18.794A1,1,0,0,0,19,25Z\"><\/path><path d=\"M10,46.5h3a1,1,0,0,0,.954-.7L16.733,37H20V35H16a1,1,0,0,0-.954.7l-2.779,8.8H10Z\"><\/path><path d=\"M10,60.5h3a1,1,0,0,0,.956-.706L19.739,41H22V39H19a1,1,0,0,0-.956.706L12.261,58.5H10Z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRegulatory Compliance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMany industries are subject to regulatory requirements regarding incident response, breach notification, and data protection. Compromise assessment helps organizations demonstrate compliance with regulations such as GDPR, HIPAA, PCI DSS, and others by identifying and responding to security breaches in a timely and effective manner.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-807c507 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"807c507\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2765bd1 elementor-invisible\" data-id=\"2765bd1\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c63ef7 elementor-widget elementor-widget-heading\" data-id=\"1c63ef7\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Your Digital Assets with Nexa Cyber Security\n\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeed7d2 elementor-widget elementor-widget-text-editor\" data-id=\"aeed7d2\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>With Nexa Cyber Security&#8217;s Compromise Assessment Service, you can trust that your organization is equipped with the knowledge and tools needed to detect and respond to security breaches effectively. Contact us today to learn more about how we can help safeguard your digital assets against security compromises.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6effcbb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6effcbb\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-532f623 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"532f623\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-09c350f\" data-id=\"09c350f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1443de9 elementor-widget elementor-widget-heading\" data-id=\"1443de9\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ - Compromise Assessment Service by Nexa Cyber Security\n\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd69e7a elementor-widget elementor-widget-accordion\" data-id=\"cd69e7a\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-accordion{text-align:start}.elementor-accordion .elementor-accordion-item{border:1px solid #d5d8dc}.elementor-accordion .elementor-accordion-item+.elementor-accordion-item{border-top:none}.elementor-accordion .elementor-tab-title{margin:0;padding:15px 20px;font-weight:700;line-height:1;cursor:pointer;outline:none}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{display:inline-block;width:1.5em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon svg{width:1em;height:1em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-right{float:right;text-align:right}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-left{float:left;text-align:left}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-closed{display:block}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-opened,.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-closed{display:none}.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-opened{display:block}.elementor-accordion .elementor-tab-content{display:none;padding:15px 20px;border-top:1px solid #d5d8dc}@media (max-width:767px){.elementor-accordion .elementor-tab-title{padding:12px 15px}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{width:1.2em}.elementor-accordion .elementor-tab-content{padding:7px 15px}}.e-con-inner>.elementor-widget-accordion,.e-con>.elementor-widget-accordion{width:var(--container-widget-width);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2151\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2151\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why is compromise assessment important for my organization?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2151\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2151\"><p>Compromise assessment is essential for organizations to proactively identify and mitigate potential security compromises to their digital assets. By detecting signs of compromise early, organizations can take immediate action to contain the threat, minimize the impact on their digital assets, and reduce the risk of future compromises.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2152\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2152\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What are the benefits of compromise assessment?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2152\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2152\"><p>Some of the key benefits of compromise assessment include:<\/p><ul><li>Early detection of security breaches and unauthorized access<\/li><li>Proactive threat hunting and investigation to identify indicators of compromise (IOCs)<\/li><li>Risk mitigation and remediation to strengthen the organization&#8217;s security posture<\/li><li>Regulatory compliance with incident response and breach notification requirements<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2153\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2153\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How does Nexa Cyber Security conduct compromise assessment?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2153\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2153\"><p>At Nexa Cyber Security, we utilize a comprehensive approach to compromise assessment, which includes:<\/p><ul><li>Analysis of security logs, network traffic, and system activity to detect signs of compromise<\/li><li>Identification of indicators of compromise (IOCs) and assessment of the extent of a potential security compromise<\/li><li>Provision of actionable insights and recommendations for mitigating security risks and remediating compromised systems<\/li><li>Collaboration with organizations to develop proactive strategies for enhancing their security posture and resilience against cyber threats<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2154\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2154\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How often should I conduct compromise assessment for my organization?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2154\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2154\"><p>The frequency of compromise assessment depends on various factors, including the size and complexity of your organization, the nature of your digital assets, and the level of risk exposure. In general, it&#8217;s recommended to conduct compromise assessment regularly, ideally as part of a proactive cybersecurity strategy, to ensure ongoing protection against security compromises.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2155\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2155\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How can I get started with Nexa Cyber Security's Compromise Assessment Service?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2155\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2155\"><p>Getting started with Nexa Cyber Security&#8217;s Compromise Assessment Service is simple. Contact us to schedule a consultation with one of our cybersecurity experts. We will work with you to understand your specific needs and requirements and develop a customized assessment plan tailored to your organization. Don&#8217;t wait until it&#8217;s too late \u2013 take proactive steps to safeguard your digital assets against security compromises today.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-24bca9f\" data-id=\"24bca9f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5679ab elementor-widget elementor-widget-image\" data-id=\"b5679ab\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"727\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-1024x931.jpg\" class=\"attachment-large size-large wp-image-568\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-1024x931.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-300x273.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-768x698.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-1536x1396.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We provide innovative solutions for your security needs. Our Services What is Compromise assessment Compromise assessment is the process of systematically examining systems, networks, and digital assets to identify signs of unauthorized access, malicious activity, or security breaches. It involves analyzing security logs, network traffic, and system configurations to detect indicators of compromise (IOCs) and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-635","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=635"}],"version-history":[{"count":58,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/635\/revisions"}],"predecessor-version":[{"id":888,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/635\/revisions\/888"}],"wp:attachment":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}