{"id":21,"date":"2021-01-10T11:10:20","date_gmt":"2021-01-10T11:10:20","guid":{"rendered":"https:\/\/www.cyberpactsolutions.com\/?page_id=21"},"modified":"2021-02-10T18:16:59","modified_gmt":"2021-02-10T18:16:59","slug":"faq","status":"publish","type":"page","link":"https:\/\/www.cyberpactsolutions.com\/index.php\/faq\/","title":{"rendered":"FAQ"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.7.7&#8243; background_image=&#8221;https:\/\/www.cyberpactsolutions.com\/wp-content\/uploads\/2021\/01\/banner-4833105_640.jpg&#8221; parallax=&#8221;on&#8221; height_tablet=&#8221;&#8221; height_phone=&#8221;auto&#8221; height_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0px|0|0px|0px|false|false&#8221;][et_pb_fullwidth_header title=&#8221;Frequently Asked Questions&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; title_text_align=&#8221;center&#8221; title_font_size=&#8221;70px&#8221; title_line_height=&#8221;1.2em&#8221; content_font=&#8221;Open Sans||||||||&#8221; content_text_align=&#8221;center&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,72,114,0.9)&#8221; background_color_gradient_end=&#8221;rgba(41,17,96,0.8)&#8221; background_color_gradient_direction=&#8221;140deg&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;on&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;15px&#8221; button_one_bg_color=&#8221;#ffa727&#8243; button_one_border_width=&#8221;15px&#8221; button_one_border_color=&#8221;#ffa727&#8243; button_one_border_radius=&#8221;100px&#8221; button_one_letter_spacing=&#8221;5px&#8221; button_one_font=&#8221;Open Sans|700||on|||||&#8221; height_tablet=&#8221;&#8221; height_phone=&#8221;auto&#8221; height_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;10vw||10vw||true&#8221; custom_padding_tablet=&#8221;100px||100px||true&#8221; custom_padding_phone=&#8221;|||&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; title_font_size_tablet=&#8221;60px&#8221; title_font_size_phone=&#8221;36px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;16px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; button_one_text_size_tablet=&#8221;&#8221; button_one_text_size_phone=&#8221;&#8221; button_one_text_size_last_edited=&#8221;on|desktop&#8221; button_one_border_color_hover=&#8221;#ff8a3d&#8221; button_one_border_radius_hover=&#8221;100px&#8221; button_one_letter_spacing_hover=&#8221;5px&#8221; button_one_bg_color_hover=&#8221;#ff8a3d&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;on&#8221; button_one_border_color__hover=&#8221;#ff8a3d&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;on&#8221; button_one_border_radius__hover=&#8221;100px&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;5px&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;on&#8221; button_one_bg_color__hover=&#8221;#ff8a3d&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;FAQ&#8221; _builder_version=&#8221;3.22&#8243; custom_padding=&#8221;0px|0px|54px|0px|false|false&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;Share Tech||||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.02)&#8221; text_font_size=&#8221;100px&#8221; text_line_height=&#8221;0.2em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Share Tech|700|||||||&#8221; header_2_font_size=&#8221;45px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||30px||false&#8221; custom_margin_tablet=&#8221;||0px|&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; text_font_size_tablet=&#8221;80px&#8221; text_font_size_phone=&#8221;60px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;36px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>FAQ<\/p>\n<h2>FAQ<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;FAQ Row&#8221; _builder_version=&#8221;4.7.7&#8243; custom_margin=&#8221;-49px|auto||auto||&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_toggle title=&#8221;Q1. What is Vulnerability Assessment and Penetration Testing (VAPT)?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>Both are security services that focus on identifying vulnerabilities in the network, server, and system infrastructure; Vulnerability Assessment focuses on internal organizational security, while Penetration Testing focuses on external real-world risk.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q3. What is Penetration Testing?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>It&#8217;s an in-depth expert-driven activity focused on identifying various possible routes an attacker could use to break into a specific network; it identifies the extent of damage and further internal compromise in case of a cyber intrusion.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q5. How to define the scope for VAPT?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\">Any and all devices with an IP address can be considered for a VAPT activity. Penetration Testing should focus on the organization&#8217;s external parameters (IP Addresses, Offices, People, etc) and Vulnerability Assessment should focus on internal infrastructure (servers, databases, switches, routers, desktops, firewalls, laptops, etc).<\/p>\n<p style=\"text-align: justify;\">If you would like help with identifying the scope for your VAPT activity, please<span>\u00a0<\/span><u><a href=\"https:\/\/www.cyberpactsolutions.com\/index.php\/contact-us\/\">get in touch with one of our VAPT Experts.<\/a><\/u><span>\u00a0<\/span>and they would be happy to guide you through the process.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q7. What are the major sectors impacted by cyber security issues?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>Banking, academics, healthcare, realty, manufacturing, e-commerce, and government departments.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q9. What happens if firms do not opt for IT security checks?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>It results in data theft, information mismanagement, and bug infestation in case of sensitive Application.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q11. What are the benefits of Cyber Insurance?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.8.2&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Cyber liability insurance policies are tailored to meet your company\u2019s specific needs and can offer a number of important benefits, including the following:<\/p>\n<ul>\n<li>Data breach Coverage<\/li>\n<li>Business Interruption Loss Reimbursement<\/li>\n<li>Cyber Extortion Defense<\/li>\n<li>Forensic Support<\/li>\n<li>Legal Support<\/li>\n<li>Came across your profile on here.<\/li>\n<\/ul>\n<p>For more information on Cyber Insurance, please connect with us.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q13. What does Cyber Risk Insurance Cover?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.8.2&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li><strong>Data Breach Coverage<\/strong>: Data breach is dependent on the kind of business a company is operating into.<\/li>\n<li><strong>Business Interruption Loss\/Reimbursement<\/strong>: Business interruption or loss of revenue resulting due to a cyber-attack.<\/li>\n<li><strong>Cyber Extortion<\/strong>: Coverage including the cost of a professional negotiator and any payment made or any fund or property surrender intended as an extortion payment.<\/li>\n<li><strong>Forensic Support<\/strong>: Expenses related to the management of an incident &#8211; Legal and forensic services to determine whether a breach occurred and assist with regulatory compliance if a breach is verified.<\/li>\n<li><strong>E-Theft Loss: <\/strong>Loss as a consequence of having transferred funds or property or given any value due to the fraudulent input of data into a computer system or through a network into a computer system.<\/li>\n<li><strong>E-communication Loss: <\/strong>Loss occurring due to a customer having transferred funds or property or given any value on the faith of any fraudulent communication for which loss you are held legally liable.<\/li>\n<li><strong>Defense Costs<\/strong> : This cover available for costs incurred in defending any claim brought by a government agency or licensing or regulatory organization.<\/li>\n<\/ul>\n<p>For more information on Cyber Insurance, please connect with us.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q15. What is the difference between first-party vs. third-party cyber insurance?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.8.2&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\"><strong>First-party coverage<\/strong> is designed to lessen the financial impact on the company that bought the insurance (the insured). It covers data breaches and cyberattacks at your own business.<\/p>\n<p style=\"text-align: justify;\"><strong>Third-party<\/strong> <strong>coverage<\/strong> provides liability protection in case the insured company makes a mistake that results in a client suffering a data breach or cyberattack. It&#8217;s a key policy for tech companies and IT consultants that could be blamed for errors that led to a breach.<\/p>\n<p>[\/et_pb_toggle][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_toggle title=&#8221;Q2. What is Vulnerability Assessment?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>It&#8217;s a rapid automated review of network devices, servers, and systems to identify key vulnerabilities and configuration issues; it is generally conducted within the network on internal devices and its low cost enables firms to carry it out as often as every day.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q4. What are Vulnerability Assessment &#038; Penetration Testing (VAPT) deliverables?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\">Executive Report comprising a high-level overview of the activity conducted, a summary of issues identified, risk ratings, and action items. Technical Report containing a detailed report explaining each issue identified, step-by-step POCs for each issue, code, and configuration examples to fix the issue, and reference links for further details.<\/p>\n<p style=\"text-align: justify;\">Real-Time Online Dashboard with an online portal that allows internal teams to monitor the audit progress in real-time, take immediate actions for high-risk issues, track fixes and closure status, etc.<\/p>\n<p style=\"text-align: justify;\"><span>If you would like some sample Vulnerability Assessment &amp; Penetration Testing (VAPT) reports, please\u00a0<\/span><u><a href=\"https:\/\/www.cyberpactsolutions.com\/index.php\/contact-us\/\">get in touch with one of our VAPT Experts.<\/a><\/u><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q6. Why conduct VAPT?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>Customer needs wherein clients mandate it as non-negotiable, compliance needs where statutory obligations play a major role, security validation as a pre-emptive measure, and as a critical best practice for organizational immunity from data theft.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q8. What is the right time for security testing?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>Ideally right before the release of an Application and once in a quarter for periodic rectifications if any.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q10. What are the most reputed standards\/certifications in VAPT?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\"><span>Vulnerability Assessment &amp; Penetration Testing (VAPT) are largely mandated across various industries and sectors. There is a wide range of compliance standards that require such audits to be carried out periodically.<\/span><\/p>\n<p style=\"text-align: justify;\"><span>Some of the well-known standards are:<\/span><\/p>\n<p style=\"text-align: justify;\"><span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>ISO 27002 \/ ISO 27001<\/li>\n<li>PCI DSS \u2013 Payment Card Industry Data Security Standard<\/li>\n<li>HIPAA \u2013 Health Insurance Portability and Accountability Act<\/li>\n<li>TRAI \u2013 Telecom Regulatory Authority of India<\/li>\n<li>DOT \u2013 Department of Telecommunication<\/li>\n<li>CERT-In \u2013 Cyber Emergency Response Team of India<\/li>\n<li>FISMA \u2013 The Federal Information Security Management Act<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">f you would like more information on Vulnerability Assessment or Penetration Testing,<span>\u00a0<\/span><u><a href=\"https:\/\/www.cyberpactsolutions.com\/index.php\/contact-us\/\">get in touch with one of our VAPT Experts.<\/a><\/u><\/p>\n<p style=\"text-align: justify;\">In case you still have any doubts or clarifications,<span>\u00a0<\/span><u><a href=\"https:\/\/www.cyberpactsolutions.com\/index.php\/contact-us\/\">please email us your query<\/a><\/u><span>\u00a0<\/span>and we would be happy to clarify.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q12. How can a Virtual CISO assist your organization?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.8.2&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">The vCISO serves your organization in all assurance activities related to information security, data security, and compliance. vCISO provides strategic oversight of IT Security, including strategic vision, scoping of requirements, design, development, implementation of IT Security and compliance solutions within your organisation. Assured deliverables where appliable includes\u201d<\/p>\n<ul>\n<li>Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program<\/li>\n<li>Work directly with the business units to facilitate risk assessment and risk management processes<\/li>\n<li>Develop and enhance an information security and compliance management framework addressing:<\/li>\n<\/ul>\n<ol>\n<li>A human resources Security program<\/li>\n<li>Vulnerability Monitoring and Management<\/li>\n<li>Data Classification, DLP practices<\/li>\n<li>Security Standards and Compliance Initiatives (ISO 27001, NIST, FISMA, PCI, SOX, SOC etc)<\/li>\n<li>Vendor Risk Management program<\/li>\n<li>Identity and Access Management<\/li>\n<\/ol>\n<p>Audit and Assessments Management program<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Q14.What is first-party cyber liability insurance?&#8221; open_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; closed_toggle_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;4.8.2&#8243; title_font=&#8221;Share Tech||||||||&#8221; background_color=&#8221;#f1f1f1&#8243; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>First-party cyber liability insurance provides financial assistance to mitigate the impact of data breaches and cyberattacks at your small business. It covers the costs of:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Communicating with affected customers<\/li>\n<li>Providing credit monitoring<\/li>\n<li>Executing PR and reputation management campaigns<\/li>\n<li>Other recovery activities<\/li>\n<li>This policy is crucial for businesses that store sensitive client or customer information online, such as credit card numbers or Social Security numbers.<\/li>\n<\/ul>\n<p>For more information on Cyber Insurance, please connect with us.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;4.7.7&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004872&#8243; background_color_gradient_end=&#8221;rgba(41,17,96,0.8)&#8221; background_color_gradient_direction=&#8221;140deg&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/www.cyberpactsolutions.com\/wp-content\/uploads\/2021\/01\/tech-5090539_1280.jpg&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;19px|0px|19px|0px|true|false&#8221; custom_padding_tablet=&#8221;10vw||10vw||true&#8221; custom_padding_phone=&#8221;5vw||5vw||true&#8221; global_module=&#8221;267&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; use_custom_width=&#8221;on&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221;Info@cyberpact.in&#8221; title=&#8221;We&#8217;re Here To Help!&#8221; custom_message=&#8221;%%Name%%||et_pb_line_break_holder||%%Phone%%||et_pb_line_break_holder||%%State\/Country%%||et_pb_line_break_holder||%%Subject%%||et_pb_line_break_holder||%%Message%%&#8221; success_message=&#8221;Thank you for filling out your information!&#8221; submit_button_text=&#8221;send messages&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;4.7.7&#8243; form_field_background_color=&#8221;#ffffff&#8221; form_field_text_color=&#8221;#474747&#8243; title_level=&#8221;h2&#8243; title_font=&#8221;Share Tech||||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;50px&#8221; title_line_height=&#8221;1.2em&#8221; form_field_font=&#8221;Open Sans|700|||||||&#8221; form_field_letter_spacing=&#8221;2px&#8221; form_field_line_height=&#8221;1.8em&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;15px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#ffa727&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#ffa727&#8243; button_border_radius=&#8221;100px&#8221; button_letter_spacing=&#8221;5px&#8221; button_font=&#8221;Open Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; button_text_size_last_edited=&#8221;off|desktop&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#ffffff&#8221; form_background_color=&#8221;rgba(0,0,0,0)&#8221; button_bg_color_hover=&#8221;#ff8a3d&#8221; button_border_color_hover=&#8221;#ff8a3d&#8221; button_border_radius_hover=&#8221;100px&#8221; button_letter_spacing_hover=&#8221;5px&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name&#8221; allowed_symbols=&#8221;letters&#8221; _builder_version=&#8221;4.7.7&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Phone&#8221; field_title=&#8221;Phone&#8221; allowed_symbols=&#8221;numbers&#8221; _builder_version=&#8221;4.7.7&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;State\/Country&#8221; field_title=&#8221;State\/Country&#8221; allowed_symbols=&#8221;letters&#8221; _builder_version=&#8221;4.7.7&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Subject&#8221; field_title=&#8221;Subject&#8221; _builder_version=&#8221;4.7.7&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;3.16&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;120px|||&#8221; custom_padding_tablet=&#8221;0px|||&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; padding_tablet=&#8221;0px|||&#8221; padding_last_edited=&#8221;on|tablet&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Connect with us&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; _builder_version=&#8221;4.7.7&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;64px|||109px|false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;24px|||44px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||||false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Email: <a href=\"mailto:info@cyberpact.in\"><span>info@cyberpact.in<\/span><\/a><\/p>\n<p><span><\/span><\/p>\n<p><span>Mobile: +91-959-138-2059<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.7.7&#8243; background_image=&#8221;https:\/\/www.cyberpactsolutions.com\/wp-content\/uploads\/2021\/01\/banner-4833105_640.jpg&#8221; parallax=&#8221;on&#8221; height_tablet=&#8221;&#8221; height_phone=&#8221;auto&#8221; height_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0px|0|0px|0px|false|false&#8221;][et_pb_fullwidth_header title=&#8221;Frequently Asked Questions&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.7.7&#8243; title_font=&#8221;Share Tech||||||||&#8221; title_text_align=&#8221;center&#8221; title_font_size=&#8221;70px&#8221; title_line_height=&#8221;1.2em&#8221; content_font=&#8221;Open Sans||||||||&#8221; content_text_align=&#8221;center&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,72,114,0.9)&#8221; background_color_gradient_end=&#8221;rgba(41,17,96,0.8)&#8221; background_color_gradient_direction=&#8221;140deg&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;on&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;15px&#8221; button_one_bg_color=&#8221;#ffa727&#8243; button_one_border_width=&#8221;15px&#8221; button_one_border_color=&#8221;#ffa727&#8243; button_one_border_radius=&#8221;100px&#8221; button_one_letter_spacing=&#8221;5px&#8221; button_one_font=&#8221;Open Sans|700||on|||||&#8221; height_tablet=&#8221;&#8221; height_phone=&#8221;auto&#8221; height_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;10vw||10vw||true&#8221; custom_padding_tablet=&#8221;100px||100px||true&#8221; custom_padding_phone=&#8221;|||&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; title_font_size_tablet=&#8221;60px&#8221; title_font_size_phone=&#8221;36px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/21"}],"collection":[{"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":15,"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/21\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/www.cyberpactsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}