{"id":18,"date":"2024-08-17T00:00:30","date_gmt":"2024-08-17T00:00:30","guid":{"rendered":"https:\/\/greyalientech.com\/?page_id=18"},"modified":"2024-08-30T18:59:23","modified_gmt":"2024-08-30T18:59:23","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/greyalientech.com\/?page_id=18","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;gcid-primary-color 0%|rgba(255,255,255,0) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/greyalientech.com\/wp-content\/uploads\/2024\/08\/data-room.png&#8221; custom_padding=&#8221;||8vw||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22background_color_gradient_stops%22%93}&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; background_color=&#8221;gcid-primary-color&#8221; custom_padding=&#8221;60px|60px|60px|60px|true|true&#8221; custom_padding_tablet=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22background_color%22%93}&#8221;][et_pb_heading title=&#8221;Unparalleled Cybersecurity Solutions for the Digital Age&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;ddeb8c09-9078-4424-bc15-2efb6572e28e&#8221; title_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Protect your digital assets with Grey Alien Technologies&#8217; cutting-edge cybersecurity services. From digital forensics to penetration testing, we ensure your business remains secure in an ever-evolving threat landscape.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Learn More&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;ab15fb74-61a3-43aa-96b3-41e09aeef654&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Services&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/greyalientech.com\/wp-content\/uploads\/2024\/08\/0-2dd2fe1e-3820-4849-a370-481f2249e90e-800&#215;1080.jpg&#8221; title_text=&#8221;800&#215;1080&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Our Cybersecurity Services&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_blurb title=&#8221;Digital Forensics&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0f6;||divi||400&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Investigate and analyze cyber incidents to uncover the root cause and prevent future breaches. Our digital forensics service provides detailed reports and actionable insights.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Penetration Testing&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf235;||fa||900&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Identify and address vulnerabilities in your systems before malicious actors can exploit them. Our penetration testing services simulate real-world attacks to strengthen your defenses.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Security Strategies&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf085;||fa||900&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Develop comprehensive security strategies tailored to your business needs. Our experts design and implement robust security frameworks to protect your digital infrastructure.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Security Design&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf085;||fa||900&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22,%22icon_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Security design involves systematically integrating protective measures into the architecture of systems and applications, focusing on identifying potential threats and vulnerabilities from the outset. It ensures that security controls are embedded within every layer, from network and data security to user authentication and access management, to safeguard against unauthorized access and breaches. We work directly with our clients design the whole technology ecosystem.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Why Choose Our Cybersecurity Services?&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Proactive Threat Detection&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1fb;||fa||900&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;212b201d-2c34-41bd-936c-851b7357d08b&#8221; global_colors_info=&#8221;{%22gcid-body-color%22:%91%22body_text_color%22,%22body_text_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22,%22header_text_color%22%93}&#8221;]<\/p>\n<p>Stay ahead of potential threats with our proactive monitoring and threat detection services. We use advanced tools and techniques to identify risks before they become issues.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Expert Team&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf509;||fa||900&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;212b201d-2c34-41bd-936c-851b7357d08b&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-body-color%22:%91%22body_text_color%22,%22body_text_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22,%22header_text_color%22,%22header_text_color%22,%22header_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Our team of cybersecurity experts brings years of experience and specialized knowledge to protect your business. Trust Grey Alien Technologies to safeguard your digital assets.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Customized Solutions&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf46d;||fa||900&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;212b201d-2c34-41bd-936c-851b7357d08b&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-body-color%22:%91%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22,%22header_text_color%22,%22header_text_color%22,%22header_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>We understand that every business is unique. Our cybersecurity solutions are tailored to meet your specific needs, ensuring maximum protection and peace of mind.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Statistics&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Cybersecurity by the Numbers&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_circle_counter title=&#8221;Increase in Cyber Attacks&#8221; number=&#8221;67%&#8221; bar_bg_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;a7af523d-6b24-472c-84cc-c92908843c7c&#8221; number_text_color=&#8221;gcid-secondary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93,%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22circle_color%22,%22circle_color%22,%22circle_color%22,%22circle_color%22%93,%22gcid-primary-color%22:%91%22bar_bg_color%22%93,%22gcid-heading-color%22:%91%22title_text_color%22,%22title_text_color%22%93,%22gcid-7cadd8b3-5228-48e4-90c4-212d09232f7b%22:%91%22title_text_color%22,%22title_text_color%22%93,%22gcid-secondary-color%22:%91%22bar_bg_color%22,%22number_text_color%22%93}&#8221;][\/et_pb_circle_counter][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_circle_counter title=&#8221;Average Cost of Data Breach&#8221; number=&#8221;$4.45M&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;a7af523d-6b24-472c-84cc-c92908843c7c&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22%93,%22gcid-7cadd8b3-5228-48e4-90c4-212d09232f7b%22:%91%22title_text_color%22,%22title_text_color%22%93,%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22circle_color%22,%22circle_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_circle_counter][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_circle_counter title=&#8221;Businesses Unprepared for Cyber Threats&#8221; number=&#8221;60%&#8221; bar_bg_color=&#8221;#000000&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;a7af523d-6b24-472c-84cc-c92908843c7c&#8221; number_text_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22%93,%22gcid-7cadd8b3-5228-48e4-90c4-212d09232f7b%22:%91%22title_text_color%22,%22title_text_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22bar_bg_color%22,%22bar_bg_color%22%93,%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22circle_color%22,%22circle_color%22%93}&#8221;][\/et_pb_circle_counter][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Call to Action&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; background_color=&#8221;gcid-secondary-color&#8221; custom_padding=&#8221;6vw|8%|6vw|8%|true|true&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22background_color%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Secure Your Digital Future Today&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;ba4a6336-701f-47b8-bf5c-09da0ce28016&#8243; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_button button_text=&#8221;Schedule a Consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;ab15fb74-61a3-43aa-96b3-41e09aeef654&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_url=&#8221;mailto:greyalientech@protonmail.com&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protect your digital assets with Grey Alien Technologies&#8217; cutting-edge cybersecurity services. From digital forensics to penetration testing, we ensure your business remains secure in an ever-evolving threat landscape.Investigate and analyze cyber incidents to uncover the root cause and prevent future breaches. Our digital forensics service provides detailed reports and actionable insights.Identify and address vulnerabilities in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-18","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/greyalientech.com\/index.php?rest_route=\/wp\/v2\/pages\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greyalientech.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greyalientech.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greyalientech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greyalientech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":9,"href":"https:\/\/greyalientech.com\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/greyalientech.com\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/greyalientech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}