{"id":3035,"date":"2023-10-14T16:53:50","date_gmt":"2023-10-14T16:53:50","guid":{"rendered":"https:\/\/techcafeteria.com\/new\/?page_id=3035"},"modified":"2023-10-21T20:28:01","modified_gmt":"2023-10-21T20:28:01","slug":"how-secure-is-your-technology-infrastructure","status":"publish","type":"page","link":"https:\/\/techcafeteria.com\/?page_id=3035","title":{"rendered":"How Secure is your Technology Infrastructure?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3035\" class=\"elementor elementor-3035\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ac253d2 e-flex e-con-boxed e-con e-child\" data-id=\"4ac253d2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-70b01f0 e-flex e-con-boxed e-con e-child\" data-id=\"70b01f0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d86fd88 elementor-widget elementor-widget-text-editor\" data-id=\"5d86fd88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center;\">How Secure is your Technology Infrastructure?<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4eb6289 e-flex e-con-boxed e-con e-parent\" data-id=\"4eb6289\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be5281e elementor-widget elementor-widget-text-editor\" data-id=\"be5281e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the risk of data breaches, ransomware, and financial fraud lurking around every corner, there are a clear set of best practices that you can implement to dramatically reduce the chances that you will be the next cyber-victim. The handy chart below outlines five states of security readiness, ranging from fully secured at the top to completely insecure on row 5. Where do you land?<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8030244 e-flex e-con-boxed e-con e-parent\" data-id=\"8030244\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d23b1f3 elementor-widget elementor-widget-image\" data-id=\"d23b1f3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1539\" height=\"1041\" src=\"https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923.png\" class=\"attachment-full size-full wp-image-3619\" alt=\"\" srcset=\"https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923.png 1539w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923-300x203.png 300w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923-1024x693.png 1024w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923-768x519.png 768w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923-1536x1039.png 1536w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/How-Secure-Is-Your-Technology-Infrastructure_1-e1697920069923-400x270.png 400w\" sizes=\"(max-width: 1539px) 100vw, 1539px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>How Secure is your Technology Infrastructure? With the risk of data breaches, ransomware, and financial fraud lurking around every corner, there are a clear set of best practices that you can implement to dramatically reduce the chances that you will be the next cyber-victim. The handy chart below outlines five states of security readiness, ranging<br \/><a class=\"moretag\" href=\"https:\/\/techcafeteria.com\/?page_id=3035\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2804,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3035","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3035"}],"version-history":[{"count":13,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3035\/revisions"}],"predecessor-version":[{"id":3625,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3035\/revisions\/3625"}],"up":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/2804"}],"wp:attachment":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}