{"id":5858,"date":"2023-01-19T05:04:32","date_gmt":"2023-01-19T05:04:32","guid":{"rendered":"https:\/\/www.indosplash.com\/cyber-security-solution\/"},"modified":"2023-01-26T17:48:09","modified_gmt":"2023-01-26T10:48:09","slug":"cyber-security-solution","status":"publish","type":"page","link":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/","title":{"rendered":"Cyber Security Solutions"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; box_shadow_style=&#8221;preset3&#8243; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][revslider_divi revslider_divi=&#8221;%91rev_slider alias=%22cyber-security-solution%22 slidertitle=%22Cyber Security Solution%22%93%91\/rev_slider%93&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/revslider_divi][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#343434&#8243; header_2_text_color=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Safe Is Important<\/h2>\n<p>Cybersecurity is the process of protecting systems, networks, and data from cyberattacks. This includes identifying and preventing cyberattacks, as well as addressing the impact if such attacks occur. It also includes managing cyber risks and developing appropriate security policies and practices to protect organizations from cyber threats. Some examples of cyberattacks include phishing, malware, and DDoS attacks.<\/p>\n<p>If your business is experiencing a cyberattack, the impact can be devastating and varies depending on the type and scale of the attack. Some of the possible impacts include:<\/p>\n<ul>\n<li>Data loss: Cyberattacks can cause damage or loss of important data, such as customer information, business documents, or trade secrets.<\/li>\n<li>System downtime: Attacks can cause damage to the system or network causing downtime and reducing business productivity.<\/li>\n<li>Financial loss: An attack can cause immediate financial loss, such as losses from lost sales or system recovery costs, or indirect losses, such as reputational damage or fees charged by authorities.<\/li>\n<li>Legal risk: Businesses that can&#8217;t guarantee the security of customer data may have to face lawsuits.<\/li>\n<li>Risk Reputation: reputational losses incurred from cyberattacks can be detrimental to the business in the long run, due to lost consumer trust.<\/li>\n<li>Compliance risk: Businesses that cannot guarantee the security of customer data may have to face the risk of non-compliance with applicable regulations and industry standards.<\/li>\n<li>Difficult data recovery: cyberattacks that spread over a long period of time can cause permanent and irreversible data corruption.<\/li>\n<\/ul>\n<p>In general, cyberattacks can cause significant harm to businesses, both financially and reputationally. It is therefore important to have a strong cybersecurity strategy and solution in place to prevent and deal with attacks in the event of an attack.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#343434&#8243; header_2_text_color=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Cyber Security Products and Services<\/h2>\n<p>We provide products, services, and solutions for your cyber security needs<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#343434&#8243; border_style_bottom=&#8221;groove&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Network-Security-Icon.png&#8221; title_text=&#8221;Keamanan Jaringan&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;20%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Network-Security-Icon.png&#8221; title_text=&#8221;Keamanan Jaringan&#8221; align=&#8221;center&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#343434&#8243; header_4_text_color=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Network Security<\/h4>\n<p>Network security is an attempt to protect a computer network from attacks or unauthorized access. This includes protection against malware, hacking, and phishing attacks, as well as managing access to networks and user authentication. Some of the techniques used in network security include firewalls, encryption, and Virtual Private Networks (VPNs). By implementing good network security, organizations can protect sensitive information and prevent possible financial losses from network attacks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#343434&#8243; border_style_bottom=&#8221;ridge&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Internet-Security-Database-Hosting-Network-Browser.png&#8221; title_text=&#8221;Keamanan Data&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;20%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Internet-Security-Database-Hosting-Network-Browser.png&#8221; title_text=&#8221;Keamanan Data&#8221; align=&#8221;center&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#343434&#8243; header_4_text_color=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Data Security<\/h4>\n<p>Data security is an effort to protect information stored in computer systems and networks from unauthorized access or damage. This includes protection against malware, hacking, and phishing attacks, as well as managing access to user data and authentication. Data security also includes processes to secure, store, and manage data to keep it private and undamaged. Some of the techniques used in data security are encryption, password management, and network activity monitoring.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Security-Malware-Shield-Computer-Laptop.png&#8221; title_text=&#8221;Keamanan Perangkat Individu&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;20%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Security-Malware-Shield-Computer-Laptop.png&#8221; title_text=&#8221;Keamanan Perangkat Individu&#8221; align=&#8221;center&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#343434&#8243; header_4_text_color=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Endpoint Device Security<\/h4>\n<p>Individual device security is an attempt to protect individual devices connected to a network from attacks or unauthorized access. This includes desktop computers, laptops, servers, mobile phones, and Internet of Things (IoT) devices. Individual device security includes protection against malware, hacking, and phishing attacks, as well as managing access to devices and user authentication.<\/p>\n<p>Some of the solutions used in the security of individual devices are firewalls, anti-virus\/anti-malware software, and threat detection systems. Some individual device security solutions also provide device activity monitoring, automatic updates, and device management features that allow network administrators to control access to devices and manage device configuration.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;RGBA(0,0,0,0)&#8221; border_style_all=&#8221;none&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Data-Security-Shield-Cloud-Network-Protection.png&#8221; title_text=&#8221;Cloud&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;20%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Data-Security-Shield-Cloud-Network-Protection.png&#8221; title_text=&#8221;Cloud&#8221; align=&#8221;center&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#343434&#8243; header_4_text_color=&#8221;#343434&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Cloud Security<\/h4>\n<p>Cloud security is an effort to protect data, applications, and infrastructure hosted in the cloud from attacks or unauthorized access. This includes protection against malware, hacking, and phishing attacks, as well as managing access to the cloud and user authentication.<\/p>\n<p>Cloud security covers various aspects, ranging from encryption of data stored in the cloud, identity and access management, and protection from attacks originating from the internet. Cloud security also includes the physical aspects of the data center cloud provider and also cloud activity monitoring.<\/p>\n<p>Some of the solutions used in cloud Security are Virtual Private Cloud (VPC), multi-factor authentication, and firewalls. Some cloud security solutions also provide cloud activity monitoring, automatic updates, and cloud management features that allow network administrators to control access to the cloud and manage cloud configuration.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module revslider_divi revslider_divi_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t\n\t\t\t<!-- START Cyber Security Solution REVOLUTION SLIDER 6.4.6 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_9_1_wrapper\" data-source=\"gallery\" style=\"background:transparent;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_9_1\" style=\"\" data-version=\"6.4.6\">\n\t\t\t\t\t<rs-slides>\n\t\t\t\t\t\t<rs-slide data-key=\"rs-9\" data-title=\"Slide\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.indosplash.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/transparent.png\" alt=\"Slide\" class=\"rev-slidebg tp-rs-img\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-9-slide-9-layer-0\" \n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:100%;h:100%;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"y:500px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power3.out;sp:2000;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;\"\n\t\t\t\t\t\t\t><img loading=\"lazy\" decoding=\"async\" src=\"\/\/www.indosplash.com\/wp-content\/uploads\/2023\/01\/Security-Solution-Hero.jpg\" class=\"tp-rs-img\" width=\"900\" height=\"600\" data-c=\"cover-proportional\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-9-slide-9-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-color=\"#ffcc00\"\n\t\t\t\t\t\t\t\tdata-tsh=\"c:#000000;h:3px;v:3px;b:5px;\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;y:c;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:50;l:55;ls:3px;fw:700;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"o:1;\"\n\t\t\t\t\t\t\t\tdata-frame_0_chars=\"d:5;y:500px;\"\n\t\t\t\t\t\t\t\tdata-frame_0_mask=\"u:t;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power3.out;st:2000;sp:1500;\"\n\t\t\t\t\t\t\t\tdata-frame_1_chars=\"d:5;\"\n\t\t\t\t\t\t\t\tdata-frame_1_mask=\"u:t;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;font-family:Roboto;text-transform:uppercase;\"\n\t\t\t\t\t\t\t>Cyber Security Solution \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script type=\"text\/javascript\">\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_9_1',rl:[1240,1024,778,480],el:[607.986],gw:[1080],gh:[608],type:'hero',justify:'',layout:'fullwidth',mh:\"0\"});\n\t\t\t\t\tvar\trevapi9,\n\t\t\t\t\t\ttpj;\n\t\t\t\t\tfunction revinit_revslider91() {\n\t\t\t\t\tjQuery(function() {\n\t\t\t\t\t\ttpj = jQuery;\n\t\t\t\t\t\trevapi9 = tpj(\"#rev_slider_9_1\");\n\t\t\t\t\t\tif(revapi9==undefined || revapi9.revolution == undefined){\n\t\t\t\t\t\t\trevslider_showDoubleJqueryError(\"rev_slider_9_1\");\n\t\t\t\t\t\t}else{\n\t\t\t\t\t\t\trevapi9.revolution({\n\t\t\t\t\t\t\t\tsliderType:\"hero\",\n\t\t\t\t\t\t\t\tDPR:\"dpr\",\n\t\t\t\t\t\t\t\tvisibilityLevels:\"1240,1024,778,480\",\n\t\t\t\t\t\t\t\tgridwidth:1080,\n\t\t\t\t\t\t\t\tgridheight:608,\n\t\t\t\t\t\t\t\tperspective:600,\n\t\t\t\t\t\t\t\tperspectiveType:\"global\",\n\t\t\t\t\t\t\t\teditorheight:\"607.986,768,960,720\",\n\t\t\t\t\t\t\t\tresponsiveLevels:\"1240,1024,778,480\",\n\t\t\t\t\t\t\t\tprogressBar:{disableProgressBar:true},\n\t\t\t\t\t\t\t\tnavigation: {\n\t\t\t\t\t\t\t\t\tonHoverStop:false\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\tfallbacks: {\n\t\t\t\t\t\t\t\t\tallowHTML5AutoPlayOnAndroid:true\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t});\n\t\t\t\t\t\t}\n\t\t\t\t\t\t\n\t\t\t\t\t});\n\t\t\t\t\t} \/\/ End of RevInitScript\n\t\t\t\tvar once_revslider91 = false;\n\t\t\t\tif (document.readyState === \"loading\") {document.addEventListener('readystatechange',function() { if((document.readyState === \"interactive\" || document.readyState === \"complete\") && !once_revslider91 ) { once_revslider91 = true; revinit_revslider91();}});} else {once_revslider91 = true; revinit_revslider91();}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>Safe Is Important Cybersecurity is the process of protecting systems, networks, and data from cyberattacks. This includes identifying and preventing cyberattacks, as well as addressing the impact if such attacks occur. It also includes managing cyber risks and developing appropriate security policies and practices to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-5858","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Solutions | Indosplash Technology Provider<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Solutions | Indosplash Technology Provider\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"Indosplash Technology Provider\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-26T10:48:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/en\\\/cyber-security-solution\\\/\",\"url\":\"https:\\\/\\\/www.indosplash.com\\\/en\\\/cyber-security-solution\\\/\",\"name\":\"Cyber Security Solutions | Indosplash Technology Provider\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/#website\"},\"datePublished\":\"2023-01-19T05:04:32+00:00\",\"dateModified\":\"2023-01-26T10:48:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/en\\\/cyber-security-solution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.indosplash.com\\\/en\\\/cyber-security-solution\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/en\\\/cyber-security-solution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.indosplash.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/#website\",\"url\":\"https:\\\/\\\/www.indosplash.com\\\/\",\"name\":\"Indosplash Technology Provider\",\"description\":\"Informative | Innovatife | Inspiring\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.indosplash.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/#organization\",\"name\":\"Indosplash\",\"url\":\"https:\\\/\\\/www.indosplash.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Indosplash\"},\"image\":{\"@id\":\"https:\\\/\\\/www.indosplash.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Solutions | Indosplash Technology Provider","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Solutions | Indosplash Technology Provider","og_url":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/","og_site_name":"Indosplash Technology Provider","article_modified_time":"2023-01-26T10:48:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/","url":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/","name":"Cyber Security Solutions | Indosplash Technology Provider","isPartOf":{"@id":"https:\/\/www.indosplash.com\/#website"},"datePublished":"2023-01-19T05:04:32+00:00","dateModified":"2023-01-26T10:48:09+00:00","breadcrumb":{"@id":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.indosplash.com\/en\/cyber-security-solution\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.indosplash.com\/en\/cyber-security-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.indosplash.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.indosplash.com\/#website","url":"https:\/\/www.indosplash.com\/","name":"Indosplash Technology Provider","description":"Informative | Innovatife | Inspiring","publisher":{"@id":"https:\/\/www.indosplash.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.indosplash.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.indosplash.com\/#organization","name":"Indosplash","url":"https:\/\/www.indosplash.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.indosplash.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Indosplash"},"image":{"@id":"https:\/\/www.indosplash.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/pages\/5858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/comments?post=5858"}],"version-history":[{"count":9,"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/pages\/5858\/revisions"}],"predecessor-version":[{"id":6042,"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/pages\/5858\/revisions\/6042"}],"wp:attachment":[{"href":"https:\/\/www.indosplash.com\/en\/wp-json\/wp\/v2\/media?parent=5858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}