{"id":86,"date":"2021-11-04T11:58:00","date_gmt":"2021-11-04T11:58:00","guid":{"rendered":"https:\/\/csdev.rwts.com.au\/?page_id=86"},"modified":"2021-12-06T00:34:43","modified_gmt":"2021-12-06T00:34:43","slug":"templatesandguides","status":"publish","type":"page","link":"https:\/\/rwts.com.au\/cybersecurity\/templatesandguides\/","title":{"rendered":"Implementation Templates and Guides"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"86\" class=\"elementor elementor-86\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52fe6782 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"52fe6782\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2362eeba\" data-id=\"2362eeba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43dd3ed9 elementor-widget elementor-widget-text-editor\" data-id=\"43dd3ed9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/csdev.rwts.com.au\/\">Cyber Security Implementation<\/a>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59194556 elementor-widget elementor-widget-heading\" data-id=\"59194556\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">templates and guides<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25647994 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"25647994\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2f691fda\" data-id=\"2f691fda\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57b89384 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"57b89384\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resources you can use <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c89af0b elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5c89af0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Make your journey to better cyber security faster and easier. Use our templates and guides the way you want \u2013 customise and adapt them to your organisation\u2019s needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21f7bc78\" data-id=\"21f7bc78\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4fcb2556 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4fcb2556\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4257b0 elementor-invisible\" data-id=\"4257b0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:800}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ae4b0d1 elementor-widget elementor-widget-image\" data-id=\"7ae4b0d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"458\" height=\"219\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I2_V1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-399\" alt=\"Templates and guides\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I2_V1.jpg 458w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I2_V1-300x143.jpg 300w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-636d188 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"636d188\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3757ba19 elementor-invisible\" data-id=\"3757ba19\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:1200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6367261a elementor-widget elementor-widget-image\" data-id=\"6367261a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"458\" height=\"219\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I3_V1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-400\" alt=\"Whitelabel Resources\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I3_V1.jpg 458w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I3_V1-300x143.jpg 300w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3156ea26 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"3156ea26\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-48e0109a\" data-id=\"48e0109a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62df261a elementor-widget elementor-widget-image\" data-id=\"62df261a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I4_V1.png\" class=\"attachment-large size-large wp-image-401\" alt=\"Cyber Security\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I4_V1.png 600w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I4_V1-300x300.png 300w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I4_V1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2df7be90\" data-id=\"2df7be90\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a795bf0 elementor-widget elementor-widget-text-editor\" data-id=\"5a795bf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Read-to-use Resources<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-298fe312 elementor-widget elementor-widget-heading\" data-id=\"298fe312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Templates and Guides<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d79555c elementor-widget elementor-widget-text-editor\" data-id=\"2d79555c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing changes that improve cyber security can be daunting and challenging. To help overcome some of these obstacles Real World has created templates and guides. These documents are available to be customised and adapted for your use. Deliberately designed for Not-For-Profits and Small-Medium businesses, these documents cover many areas including:<\/p><ul><li>Policy templates<\/li><li>Response and Recovery Plan template<\/li><li>Cyber Security Awareness material<\/li><li>Checklists<\/li><li>Information records templates<\/li><li>Various Personnel related templates<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f7ee7ff elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"5f7ee7ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/helpdesk.realworld.net.au\/hc\/en-us\/categories\/4408904541593-Cyber-Security-Resources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View Templates<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8240b8 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e8240b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-27291eff\" data-id=\"27291eff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64ce1515 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"64ce1515\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Need more assistance?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47c2e608 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"47c2e608\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real World is here to help improve your Cyber Security and reduce your cyber security risk.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e94993b elementor-align-left elementor-mobile-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"2e94993b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/cybersecurity\/contactus\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7240e1c9 elementor-invisible\" data-id=\"7240e1c9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76ee7036 elementor-widget elementor-widget-image\" data-id=\"76ee7036\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I1_V1.png\" class=\"attachment-medium_large size-medium_large wp-image-397\" alt=\"Templates and Guides\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I1_V1.png 600w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I1_V1-300x300.png 300w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/Guides_I1_V1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Implementation\u00a0 templates and guides Resources you can use Make your journey to better cyber security faster and easier. Use our templates and guides the way you want \u2013 customise and adapt them to your organisation\u2019s needs. Read-to-use Resources Templates and Guides Implementing changes that improve cyber security can be daunting and challenging. To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-86","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/86","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":40,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/86\/revisions"}],"predecessor-version":[{"id":680,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/86\/revisions\/680"}],"wp:attachment":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/media?parent=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}