{"id":258,"date":"2020-10-20T06:58:47","date_gmt":"2020-10-20T10:58:47","guid":{"rendered":"https:\/\/positive.tech\/?page_id=258"},"modified":"2021-01-03T23:41:52","modified_gmt":"2021-01-04T04:41:52","slug":"cyber-risk-assessment","status":"publish","type":"page","link":"https:\/\/positive.tech\/cyber-risk-assessment\/","title":{"rendered":"Cyber Risk Assessment"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_row _builder_version=”4.6.6″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_contact_form use_spam_service=”on” recaptcha_list=”Positive Tech|Positive Tech-0″ recaptcha_min_score=”0.9″ _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ custom_message=”Company: %%company%%||et_pb_line_break_holder||Name: %%name%%||et_pb_line_break_holder||Title: %%title%%||et_pb_line_break_holder||Email: %%email%%||et_pb_line_break_holder||Desktops: %%desktops%%||et_pb_line_break_holder||Locations: %%locations%%||et_pb_line_break_holder||Servers: %%servers%%||et_pb_line_break_holder||Line: %%line%%||et_pb_line_break_holder||Breached: %%breached_2%%||et_pb_line_break_holder||Data: %%data%%||et_pb_line_break_holder||Message: %%message%%||et_pb_line_break_holder||” title=”Risk Assessment Form” email=”info@federmediagroup.com,info@positive.tech” sticky_enabled=”0″][et_pb_contact_field field_id=”company” field_title=”Company Name” required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”Name” field_title=”Name” _builder_version=”4.6.6″ hover_enabled=”0″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off” sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”title” field_title=”Title” required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”Email” field_title=”Email Address*” field_type=”email” _builder_version=”4.6.6″ hover_enabled=”0″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off” sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”desktops” field_title=”Amount of Desktops” required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”locations” field_title=”Number of Locations” required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”servers” field_title=”Amount of Servers” required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”line” field_title=”What is your operating system?” required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”breached_2″ field_title=”Have you or do you suspect of having been breached within the past 12 months” field_type=”radio” radio_options=”%91{%22value%22:%22Yes%22,%22checked%22:0,%22dragID%22:-1},{%22value%22:%22No%22,%22checked%22:0,%22dragID%22:0}%93″ required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][\/et_pb_contact_field][et_pb_contact_field field_id=”data” field_title=”Our data resides in” field_type=”radio” radio_options=”%91{%22value%22:%22Local%22,%22checked%22:0,%22dragID%22:-1},{%22value%22:%22Cloud%22,%22checked%22:0,%22dragID%22:0},{%22value%22:%22Hybrid%22,%22checked%22:0,%22dragID%22:1}%93″ required_mark=”off” _builder_version=”4.6.6″ _module_preset=”default”][\/et_pb_contact_field][et_pb_contact_field field_id=”Message” field_title=”Message” field_type=”text” fullwidth_field=”on” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yoast_head":"\nCyber Risk Assessment | Positive Tech Solutions<\/title>\n<meta name=\"description\" content=\"Don't wait until it's too late. Protect your organization your data by implementing Positive Tech Solution's cybergressive solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/positive.tech\/cyber-risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Assessment | Positive Tech Solutions\" \/>\n<meta property=\"og:description\" content=\"Don't wait until it's too late. Protect your organization your data by implementing Positive Tech Solution's cybergressive solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/positive.tech\/cyber-risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Positive Tech Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-04T04:41:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/positive.tech\/cyber-risk-assessment\/\",\"url\":\"https:\/\/positive.tech\/cyber-risk-assessment\/\",\"name\":\"Cyber Risk Assessment | Positive Tech Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/positive.tech\/#website\"},\"datePublished\":\"2020-10-20T10:58:47+00:00\",\"dateModified\":\"2021-01-04T04:41:52+00:00\",\"description\":\"Don't wait until it's too late. Protect your organization your data by implementing Positive Tech Solution's cybergressive solution.\",\"breadcrumb\":{\"@id\":\"https:\/\/positive.tech\/cyber-risk-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/positive.tech\/cyber-risk-assessment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/positive.tech\/cyber-risk-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/positive.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/positive.tech\/#website\",\"url\":\"https:\/\/positive.tech\/\",\"name\":\"Positive Tech Solutions\",\"description\":\"Your Technology, Our Hassle.\",\"publisher\":{\"@id\":\"https:\/\/positive.tech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/positive.tech\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/positive.tech\/#organization\",\"name\":\"Positive Tech Solutions\",\"url\":\"https:\/\/positive.tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/positive.tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/positive.tech\/wp-content\/uploads\/2020\/10\/positive-tech-solutions-thumbnail.jpg\",\"contentUrl\":\"https:\/\/positive.tech\/wp-content\/uploads\/2020\/10\/positive-tech-solutions-thumbnail.jpg\",\"width\":900,\"height\":900,\"caption\":\"Positive Tech Solutions\"},\"image\":{\"@id\":\"https:\/\/positive.tech\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Risk Assessment | Positive Tech Solutions","description":"Don't wait until it's too late. Protect your organization your data by implementing Positive Tech Solution's cybergressive solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/positive.tech\/cyber-risk-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk Assessment | Positive Tech Solutions","og_description":"Don't wait until it's too late. Protect your organization your data by implementing Positive Tech Solution's cybergressive solution.","og_url":"https:\/\/positive.tech\/cyber-risk-assessment\/","og_site_name":"Positive Tech Solutions","article_modified_time":"2021-01-04T04:41:52+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/positive.tech\/cyber-risk-assessment\/","url":"https:\/\/positive.tech\/cyber-risk-assessment\/","name":"Cyber Risk Assessment | Positive Tech Solutions","isPartOf":{"@id":"https:\/\/positive.tech\/#website"},"datePublished":"2020-10-20T10:58:47+00:00","dateModified":"2021-01-04T04:41:52+00:00","description":"Don't wait until it's too late. Protect your organization your data by implementing Positive Tech Solution's cybergressive solution.","breadcrumb":{"@id":"https:\/\/positive.tech\/cyber-risk-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/positive.tech\/cyber-risk-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/positive.tech\/cyber-risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/positive.tech\/"},{"@type":"ListItem","position":2,"name":"Cyber Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/positive.tech\/#website","url":"https:\/\/positive.tech\/","name":"Positive Tech Solutions","description":"Your Technology, Our Hassle.","publisher":{"@id":"https:\/\/positive.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/positive.tech\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/positive.tech\/#organization","name":"Positive Tech Solutions","url":"https:\/\/positive.tech\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/positive.tech\/#\/schema\/logo\/image\/","url":"https:\/\/positive.tech\/wp-content\/uploads\/2020\/10\/positive-tech-solutions-thumbnail.jpg","contentUrl":"https:\/\/positive.tech\/wp-content\/uploads\/2020\/10\/positive-tech-solutions-thumbnail.jpg","width":900,"height":900,"caption":"Positive Tech Solutions"},"image":{"@id":"https:\/\/positive.tech\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/pages\/258"}],"collection":[{"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/comments?post=258"}],"version-history":[{"count":0,"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/pages\/258\/revisions"}],"wp:attachment":[{"href":"https:\/\/positive.tech\/wp-json\/wp\/v2\/media?parent=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}