{"id":5537,"date":"2021-09-07T17:45:33","date_gmt":"2021-09-07T17:45:33","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5537"},"modified":"2021-09-07T17:48:10","modified_gmt":"2021-09-07T17:48:10","slug":"project-security","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5537","title":{"rendered":"Project Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5537\" class=\"elementor elementor-5537\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc90c04 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc90c04\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-34bf54a7 ot-flex-column-vertical\" data-id=\"34bf54a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15db189a elementor-widget elementor-widget-iheading\" data-id=\"15db189a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/<\/span>\r\n\t        <h2 class=\"main-heading\">MANAGE YOUR IT PROJECTS SECURELY AND SAFELY<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f2472a elementor-widget elementor-widget-text-editor\" data-id=\"6f2472a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Successfully managing multiple IT projects is challenging without even considering the implications of cyber security threats to individual projects.<\/p><p>Whether it\u2019s new infrastructure being deployed, the launch of a new website or the creation of a new product line or service, we can help you appropriately secure projects according to your policy requirements and risk appetite. Since every project is different, we will analyze the potential threats that your unique project could face. These range from targeted and automated attacks or attacks from disgruntled employees. A security consultant will then analyze the likelihood of each attack and its potential consequences\u00a0to\u00a0determine\u00a0the overall risk to\u00a0your\u00a0system.<\/p><p>The result of our analysis will provide you with evidence-based insight so you can make sensible decisions on how to cost effectively manage the security of your project.<\/p><p>As well as enabling security controls, we can provide a Project Security guide for project managers, covering mandatory and recommended security controls, as well as timeframes and the information security budget requirements of the project. If you prefer a more personalized approach, DataSecure seminars can help your project managers understand your policy requirements and help them understand the benefits of security controls and strategies to ensure your project is a success.<\/p><h4><strong>Depending on the scope of your project, some of our security services include:<\/strong><\/h4><ul><li style=\"list-style-type: none;\"><ul><li>Project Security Guide<\/li><li>Project Security Workshops<\/li><li>Risk Assessment<\/li><li>Design Review<\/li><li>Penetration Testing<\/li><li>Configuration Review<\/li><li>Account Audit<\/li><li>Password Cracking<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1baeee42 ot-column-items-top ot-flex-column-vertical\" data-id=\"1baeee42\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41bc321a elementor-widget elementor-widget-image\" data-id=\"41bc321a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/4229593.png\" class=\"attachment-large size-large wp-image-2298\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/4229593.png 400w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/4229593-300x300.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/4229593-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ MANAGE YOUR IT PROJECTS SECURELY AND SAFELY Successfully managing multiple IT projects is challenging without even considering the implications of cyber security threats to individual projects. Whether it\u2019s new infrastructure being deployed, the launch of a new website or the creation of a new product line or service, we can help you appropriately secure [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5537","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5537"}],"version-history":[{"count":10,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5537\/revisions"}],"predecessor-version":[{"id":5547,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5537\/revisions\/5547"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}