{"id":99,"date":"2021-11-04T12:16:23","date_gmt":"2021-11-04T12:16:23","guid":{"rendered":"https:\/\/csdev.rwts.com.au\/?page_id=99"},"modified":"2022-05-10T03:51:06","modified_gmt":"2022-05-10T03:51:06","slug":"home","status":"publish","type":"page","link":"https:\/\/rwts.com.au\/cybersecurity\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"99\" class=\"elementor elementor-99\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31818f3c elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31818f3c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3a143dce\" data-id=\"3a143dce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1514a1f7 elementor-widget elementor-widget-text-editor\" data-id=\"1514a1f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Security<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35cf405b elementor-widget elementor-widget-heading\" data-id=\"35cf405b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security <br>Today<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ff13982 elementor-widget elementor-widget-text-editor\" data-id=\"5ff13982\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Technology alone is not sufficient to address cyber security risks today. Well-trained people, well-established policies and processes, and smart technology systems are all essential for a robust cyber security program.<\/p><p>Begin you cyber security journey by completing our free Cyber Security Health Check.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16f721cf elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"16f721cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/assess.rwts.com.au\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1bb87880\" data-id=\"1bb87880\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a452856 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"4a452856\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"759\" height=\"1024\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/shield-1-01-1-1-759x1024.png\" class=\"elementor-animation-wobble-vertical attachment-large size-large wp-image-217\" alt=\"Cyber Security Shield\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/shield-1-01-1-1-759x1024.png 759w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/shield-1-01-1-1-222x300.png 222w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/shield-1-01-1-1-768x1036.png 768w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/shield-1-01-1-1-1139x1536.png 1139w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/shield-1-01-1-1.png 1456w\" sizes=\"(max-width: 759px) 100vw, 759px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dbdee43 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"dbdee43\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6aec45\" data-id=\"d6aec45\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e8e36b elementor-widget elementor-widget-text-editor\" data-id=\"3e8e36b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space: pre-wrap;\">Our Approach<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f3efd6 elementor-widget elementor-widget-heading\" data-id=\"9f3efd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The key components<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-07d2781 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07d2781\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5919291 elementor-invisible\" data-id=\"5919291\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72d8344 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"72d8344\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 94 73\" style=\"enable-background:new 0 0 94 73;\" xml:space=\"preserve\"><style type=\"text\/css\">\t.st0{fill:#DB1437;}\t.st1{fill:none;stroke:#DB1437;stroke-width:3.9815;stroke-linecap:round;stroke-miterlimit:10;}<\/style><path class=\"st0\" d=\"M46.6,33.8c-9.3,0-16.9-7.6-16.9-16.9S37.3,0,46.6,0c9.3,0,16.9,7.6,16.9,16.9S55.9,33.8,46.6,33.8z M46.6,4  c-7.1,0-12.9,5.8-12.9,12.9s5.8,12.9,12.9,12.9c7.1,0,12.9-5.8,12.9-12.9S53.7,4,46.6,4z\"><\/path><path class=\"st1\" d=\"M31.8,70.7V39.6c0-4.3,3.5-7.8,7.8-7.8h14.1c4.3,0,7.8,3.5,7.8,7.8v31.1\"><\/path><path class=\"st0\" d=\"M16.9,43.6C7.6,43.6,0,36,0,26.7C0,17.4,7.6,9.8,16.9,9.8s16.9,7.6,16.9,16.9C33.8,36,26.2,43.6,16.9,43.6z   M16.9,13.8C9.8,13.8,4,19.6,4,26.7c0,7.1,5.8,12.9,12.9,12.9s12.9-5.8,12.9-12.9C29.8,19.6,24,13.8,16.9,13.8z\"><\/path><path class=\"st1\" d=\"M31.8,70.7V49.5c0-4.3-3.5-7.8-7.8-7.8H9.9c-4.3,0-7.8,3.5-7.8,7.8v21.2h89.1V49.5c0-4.3-3.5-7.8-7.8-7.8H69.3  c-4.3,0-7.8,3.5-7.8,7.8v21.2\"><\/path><path class=\"st0\" d=\"M76.4,43.6c-9.3,0-16.9-7.6-16.9-16.9c0-9.3,7.6-16.9,16.9-16.9s16.9,7.6,16.9,16.9  C93.3,36,85.7,43.6,76.4,43.6z M76.4,13.8c-7.1,0-12.9,5.8-12.9,12.9c0,7.1,5.8,12.9,12.9,12.9s12.9-5.8,12.9-12.9  C89.3,19.6,83.5,13.8,76.4,13.8z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPeople \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPeople are often the origin of the greatest risks to cyber security, usually through inadvertent action or inaction, but also sometimes through deliberate malicious intent. Cyber security training and awareness are key to reducing people-related cyber security incidents.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b27025d elementor-invisible\" data-id=\"b27025d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:800}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03a78bd elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"03a78bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 67 73\" style=\"enable-background:new 0 0 67 73;\" xml:space=\"preserve\"><style type=\"text\/css\">\t.st0{fill:#DB1437;}<\/style><path class=\"st0\" d=\"M22.6,36.5l4.2,1.4l-0.6,3.1c1.7,1,3.3,2.3,4.5,3.8l2.9-1.1l2,3.9l-2.6,1.8c0.5,1.9,0.8,3.8,0.5,5.8l2.9,1.4  l-1.4,4.2L32,60c-1,1.8-2.3,3.3-3.8,4.4l1.1,2.9l-3.9,2l-1.8-2.6c-1.3,0.4-2.7,0.6-4.1,0.6c-0.6,0-1.1,0-1.7-0.1l-1.3,2.9l-4.2-1.4  l0.6-3.1c-1.8-1-3.3-2.3-4.5-3.8l-2.9,1.1l-2-3.9l2.6-1.8c-0.5-1.9-0.8-3.8-0.5-5.8l-2.9-1.3l1.4-4.2l3.1,0.6c1-1.8,2.3-3.3,3.8-4.4  l-1.1-2.9l3.9-2l1.8,2.6c1.3-0.4,2.7-0.6,4.1-0.6c0.6,0,1.1,0,1.7,0.1L22.6,36.5z M22.6,33.9c-1,0-1.9,0.5-2.3,1.5l-0.6,1.3  c-0.1,0-0.1,0-0.2,0c-1,0-2,0.1-2.9,0.3l-0.8-1.1c-0.5-0.7-1.3-1.1-2.1-1.1c-0.4,0-0.8,0.1-1.2,0.3l-3.9,2c-1.1,0.6-1.7,2-1.2,3.2  l0.5,1.3c-0.8,0.8-1.4,1.5-2,2.4l-1.4-0.2c-0.2,0-0.3-0.1-0.5-0.1c-1.1,0-2.1,0.7-2.4,1.8l-1.4,4.2c-0.4,1.2,0.2,2.6,1.4,3.1  l1.3,0.6c0,1.1,0.1,2.1,0.3,3.1l-1.1,0.8c-1.1,0.8-1.4,2.2-0.8,3.3l2,3.9c0.5,0.9,1.4,1.4,2.3,1.4c0.3,0,0.6-0.1,0.9-0.2l1.3-0.5  c0.8,0.8,1.5,1.4,2.4,2l-0.2,1.4c-0.2,1.3,0.5,2.6,1.7,2.9l4.2,1.4c0.2,0.1,0.5,0.2,0.8,0.2c1,0,1.9-0.6,2.3-1.5l0.6-1.3  c0.1,0,0.1,0,0.2,0c1,0,2-0.1,2.9-0.3l0.8,1.1c0.5,0.8,1.3,1.1,2.1,1.1c0.4,0,0.8-0.1,1.2-0.3l3.9-2c1.1-0.6,1.7-2,1.2-3.2l-0.5-1.3  c0.8-0.8,1.4-1.5,2-2.4l1.4,0.2c0.2,0,0.3,0.1,0.5,0.1c1.1,0,2.1-0.7,2.4-1.8l1.4-4.2c0.4-1.2-0.2-2.6-1.4-3.1l-1.3-0.6  c0-1.1-0.1-2.1-0.3-3.1l1.1-0.8c1.1-0.8,1.4-2.2,0.8-3.3l-2-3.9c-0.5-0.9-1.4-1.4-2.3-1.4c-0.3,0-0.6,0.1-0.9,0.2l-1.3,0.5  c-0.8-0.8-1.5-1.4-2.4-2l0.2-1.4c0.2-1.3-0.5-2.5-1.7-2.9L23.3,34C23.1,34,22.8,33.9,22.6,33.9z\"><\/path><path class=\"st0\" d=\"M52.4,38l0.5,2.2c1.4,0.2,2.8,0.5,4,1.2l1.7-1.6l2.4,2l-1.2,1.9c0.9,1.1,1.6,2.3,2,3.7l2.3,0.1l0.3,3.2  l-2.2,0.5c-0.2,1.4-0.5,2.8-1.2,4l1.6,1.7l-2,2.4l-1.9-1.2c-1.1,0.9-2.3,1.6-3.7,2l-0.1,2.3l-3.2,0.3l-0.5-2.2  c-1.4-0.2-2.8-0.5-4-1.2l-1.7,1.6l-2.4-2l1.2-1.9c-0.9-1.1-1.6-2.3-2-3.7L40,53.1l-0.3-3.2l2.2-0.5c0.2-1.4,0.5-2.8,1.2-4l-1.6-1.7  l2-2.4l1.9,1.2c1.1-0.9,2.3-1.6,3.7-2l0.1-2.3L52.4,38z M52.4,35.5c-0.1,0-0.2,0-0.2,0L49,35.8c-1.3,0.2-2.3,1.2-2.3,2.5v0.5  c-0.5,0.2-0.8,0.5-1.3,0.7l-0.5-0.3c-0.5-0.2-0.9-0.4-1.4-0.4c-0.8,0-1.5,0.3-2,1l-2,2.4c-0.8,1-0.8,2.5,0.2,3.4l0.4,0.4  c-0.2,0.5-0.3,0.9-0.4,1.4l-0.5,0.2c-1.3,0.3-2.1,1.5-2,2.8l0.3,3.2c0.2,1.3,1.2,2.3,2.5,2.3h0.5c0.2,0.5,0.5,0.8,0.7,1.3l-0.3,0.5  c-0.7,1.1-0.5,2.6,0.5,3.4l2.4,2c0.5,0.4,1.1,0.6,1.7,0.6c0.7,0,1.3-0.2,1.8-0.7l0.4-0.4c0.5,0.2,0.9,0.3,1.4,0.4l0.2,0.5  c0.3,1.2,1.3,2,2.5,2c0.1,0,0.2,0,0.2,0l3.2-0.3c1.3-0.2,2.3-1.2,2.3-2.5v-0.5c0.5-0.2,0.8-0.5,1.3-0.7l0.5,0.3  c0.5,0.3,0.9,0.4,1.4,0.4c0.8,0,1.5-0.3,2-1l2-2.4c0.8-1,0.8-2.5-0.2-3.4l-0.4-0.4c0.2-0.5,0.3-0.9,0.4-1.4l0.5-0.2  c1.3-0.3,2.1-1.5,2-2.8l-0.3-3.2c-0.2-1.3-1.2-2.3-2.5-2.3h-0.5c-0.2-0.5-0.5-0.8-0.7-1.3l0.3-0.5c0.7-1.1,0.5-2.6-0.5-3.3l-2.4-2  c-0.5-0.4-1.1-0.6-1.7-0.6c-0.7,0-1.3,0.2-1.8,0.7l-0.4,0.4c-0.5-0.2-0.9-0.3-1.4-0.4l-0.2-0.5C54.6,36.3,53.6,35.5,52.4,35.5z\"><\/path><path class=\"st0\" d=\"M19.5,46.7c0.7,0,1.4,0.1,2,0.3c1.7,0.5,3.1,1.7,3.9,3.3c0.8,1.6,1,3.4,0.5,5.1c-0.9,2.8-3.5,4.7-6.4,4.7  c-0.7,0-1.4-0.1-2-0.3c-3.6-1.1-5.5-4.9-4.4-8.4C14,48.5,16.6,46.7,19.5,46.7z M19.5,44.8c-3.6,0-7,2.3-8.2,6  c-1.4,4.5,1.1,9.3,5.6,10.7c0.8,0.3,1.7,0.4,2.6,0.4c3.6,0,7-2.3,8.2-6c1.4-4.5-1.1-9.3-5.6-10.7C21.2,45,20.4,44.8,19.5,44.8z\"><\/path><path class=\"st0\" d=\"M52,46.1c2.2,0,4.1,1.7,4.2,3.8c0.2,2.3-1.5,4.4-3.9,4.7c-0.2,0-0.3,0-0.5,0c-2.2,0-4.1-1.7-4.2-3.8  c-0.2-1.1,0.2-2.3,1-3.2c0.8-0.9,1.7-1.4,2.9-1.6C51.7,46.1,51.9,46.1,52,46.1z M52,44.2c-0.2,0-0.4,0-0.6,0  c-3.4,0.3-5.8,3.3-5.5,6.7c0.3,3.2,3,5.5,6.1,5.5c0.2,0,0.4,0,0.6,0c3.4-0.3,5.8-3.3,5.5-6.7C57.9,46.6,55.1,44.2,52,44.2z\"><\/path><path class=\"st0\" d=\"M36.6,2.7L41,3.4l-0.1,3.2c1.9,0.7,3.6,1.7,5,3.1l2.8-1.5l2.6,3.5l-2.3,2.2c0.8,1.7,1.3,3.7,1.4,5.7l3,0.9  l-0.7,4.4l-3.2-0.1c-0.7,1.9-1.7,3.5-3.1,5l1.5,2.8L44.3,35l-2.2-2.3c-1.7,0.8-3.7,1.3-5.7,1.4l-0.9,3l-4.4-0.7l0.2-3.2  c-1.9-0.7-3.6-1.7-5-3.1l-2.8,1.5l-2.6-3.5l2.3-2.2c-0.8-1.7-1.3-3.7-1.4-5.7l-3-0.9l0.7-4.4l3.2,0.2c0.7-1.9,1.7-3.5,3.1-5  l-1.5-2.8l3.6-2.6l2.2,2.3c1.7-0.8,3.7-1.3,5.7-1.4L36.6,2.7z M36.6,0.2c-1.1,0-2.1,0.8-2.5,1.9l-0.4,1.4c-1.1,0.2-2,0.4-3,0.7  l-1-1.1c-0.5-0.5-1.2-0.8-1.9-0.8c-0.5,0-1.1,0.2-1.5,0.5l-3.6,2.6c-1.1,0.8-1.4,2.2-0.8,3.3l0.7,1.2c-0.6,0.8-1.2,1.7-1.7,2.6  l-1.4-0.1h-0.1c-1.3,0-2.3,0.9-2.6,2.2l-0.7,4.4c-0.2,1.3,0.6,2.5,1.8,2.9l1.4,0.4c0.2,1.1,0.4,2,0.8,3l-1.1,1  c-1,0.9-1.1,2.3-0.3,3.4l2.6,3.5c0.5,0.7,1.3,1.1,2.1,1.1c0.5,0,0.8-0.1,1.2-0.3l1.2-0.7c0.8,0.6,1.7,1.2,2.6,1.7l-0.1,1.4  c-0.1,1.3,0.9,2.4,2.2,2.6l4.4,0.7c0.2,0,0.3,0,0.5,0c1.1,0,2.1-0.8,2.5-1.9l0.4-1.4c1.1-0.2,2-0.4,3-0.8l1,1.1  c0.5,0.5,1.2,0.8,1.9,0.8c0.5,0,1.1-0.2,1.5-0.5l3.6-2.6c1.1-0.8,1.4-2.2,0.8-3.3l-0.7-1.2c0.6-0.8,1.2-1.7,1.7-2.6l1.4,0.1h0.1  c1.3,0,2.3-0.9,2.6-2.2l0.7-4.4c0.2-1.3-0.6-2.5-1.8-2.9l-1.4-0.4c-0.2-1.1-0.4-2-0.7-3l1.1-1c1-0.9,1.1-2.3,0.3-3.4l-2.6-3.5  c-0.5-0.7-1.3-1.1-2.1-1.1c-0.5,0-0.8,0.1-1.2,0.3l-1.2,0.7c-0.8-0.6-1.7-1.2-2.6-1.7l0.1-1.4c0.1-1.3-0.9-2.4-2.2-2.6L37.2,0  C36.9,0.2,36.8,0.2,36.6,0.2z\"><\/path><path class=\"st0\" d=\"M36,13.2c0.4,0,0.8,0,1.1,0.1c3.6,0.6,6.1,4.1,5.5,7.7c-0.5,3.2-3.3,5.7-6.6,5.7c-0.4,0-0.8,0-1.1-0.1  c-3.6-0.6-6.1-4.1-5.5-7.7C30,15.6,32.7,13.2,36,13.2z M36,11.4c-4.2,0-7.8,3-8.5,7.2c-0.8,4.7,2.4,9,7.1,9.8  c0.5,0.1,0.9,0.1,1.4,0.1c4.2,0,7.8-3,8.5-7.2c0.8-4.7-2.4-9-7.1-9.8C36.9,11.4,36.5,11.4,36,11.4z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tProcess\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProcesses provide a structured, tested, repeatable and reliable way to perform tasks. They help to reduce mistakes that people may make and increase the consistency of actions performed. This increased reliability of activities is central to a well-managed IT environment and crucial for good cyber security.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a5ae483 elementor-invisible\" data-id=\"a5ae483\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:1200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eea733a elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"eea733a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 64 72\" style=\"enable-background:new 0 0 64 72;\" xml:space=\"preserve\"><style type=\"text\/css\">\t.st0{fill:#DB1437;}<\/style><path class=\"st0\" d=\"M56.6,35.9h-4.7V46H11.4V21.5H42v-4.7H10c-1.8,0-3.3,1.5-3.3,3.3v30.5h49.9V35.9z\"><\/path><path class=\"st0\" d=\"M63,67l-6.4-14H6.7L0.3,67c-1,2.2,0.6,4.7,3,4.7h56.6C62.4,71.7,63.9,69.2,63,67z M38.8,66.5H24.5  c-0.5,0-0.8-0.4-0.7-0.8l0.8-3.2c0.1-0.3,0.4-0.5,0.7-0.5H38c0.3,0,0.6,0.2,0.7,0.5l0.8,3.2C39.5,66.2,39.2,66.5,38.8,66.5z\"><\/path><path class=\"st0\" d=\"M59.6,0H44.8c-1.6,0-2.9,1.3-2.9,2.9v30.9c0,1.6,1.3,2.9,2.9,2.9h14.8c1.6,0,2.9-1.3,2.9-2.9V2.9  C62.5,1.3,61.2,0,59.6,0z M49.8,2.2h4.7c0.4,0,0.7,0.3,0.7,0.7c0,0.4-0.3,0.7-0.7,0.7h-4.7c-0.4,0-0.7-0.3-0.7-0.7  C49.2,2.5,49.5,2.2,49.8,2.2z M52.2,34.6c-1.1,0-1.9-0.8-1.9-1.9c0-1.1,0.8-1.9,1.9-1.9c1.1,0,1.9,0.8,1.9,1.9  C54.1,33.8,53.2,34.6,52.2,34.6z M59.4,28.8H45V5.6h14.4V28.8z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTechnology\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTechnology can monitor and detect many cyber security events. It can make responding to cyber security incidents much faster and a full recovery much easier. Appropriate technology enhances an organisation\u2019s defences and protection against cyber attacks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a27f49c elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"2a27f49c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6d3a66e0\" data-id=\"6d3a66e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e0c4647 elementor-widget elementor-widget-image\" data-id=\"7e0c4647\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/CTA5_export_v1-.png\" class=\"attachment-large size-large wp-image-247\" alt=\"Cyber Security Resources\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/CTA5_export_v1-.png 600w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/CTA5_export_v1--300x300.png 300w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2021\/11\/CTA5_export_v1--150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4f2c31ca\" data-id=\"4f2c31ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dbe74d3 elementor-widget elementor-widget-text-editor\" data-id=\"7dbe74d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space: pre-wrap;\">HOW WE Help<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c403df0 elementor-widget elementor-widget-heading\" data-id=\"1c403df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d456b61 elementor-widget elementor-widget-text-editor\" data-id=\"d456b61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the challenges for any business, charity or organisation that is small or has limited people is that many existing resources are complex or difficult to use. Smaller organisations need resources that are designed for their scale.<\/p><p>Real World understands this challenge and has a portfolio of resources to help these types of organisations improve their cyber security maturity in ways that suit their scale and ways of operating. These resources include<\/p><ul><li><a href=\"https:\/\/rwts.com.au\/cybersecurity\/healthcheck\/\">Cyber Security Maturity Health Check<\/a><\/li><li><a href=\"https:\/\/rwts.com.au\/cybersecurity\/trainingwebinars\/\">Cyber Security Training and Awareness Webinars<\/a><\/li><li><a href=\"https:\/\/rwts.com.au\/cybersecurity\/templatesandguides\/\">Cyber Security Implementation Templates and Guides<\/a><\/li><li><a href=\"https:\/\/rwts.com.au\/cybersecurity\/technology-consulting\/\">Cyber Security Technology Consulting<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3b0b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"24c3b0b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f00398f\" data-id=\"f00398f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99841dc elementor-widget elementor-widget-text-editor\" data-id=\"99841dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space: pre-wrap;\">HOW WE Help<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b729b91 elementor-widget elementor-widget-heading\" data-id=\"b729b91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Don't Miss our Comprehensive <br>Cyber Security Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d70ad5b\" data-id=\"d70ad5b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b831188 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"b831188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/rwts.com.au\/cybersecurity\/contactus\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46f6044 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"46f6044\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fb39716\" data-id=\"fb39716\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b2695f elementor-widget elementor-widget-text-editor\" data-id=\"6b2695f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space: pre-wrap;\">Our Services<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43b10c8 elementor-widget elementor-widget-heading\" data-id=\"43b10c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Improve your Cyber Security readiness<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a6360c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6360c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9c8df58 elementor-invisible\" data-id=\"9c8df58\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-308c4f5 elementor-widget elementor-widget-icon-box\" data-id=\"308c4f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCyber Security <br>Maturity Health <br>Check\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d20eb64 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"d20eb64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/rwts.com.au\/cybersecurity\/healthcheck\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-97fda3f elementor-invisible\" data-id=\"97fda3f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67bca2a elementor-widget elementor-widget-icon-box\" data-id=\"67bca2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCyber Security <br>Training and Awareness Webinars\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dace485 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"dace485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/rwts.com.au\/cybersecurity\/trainingwebinars\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-44d9a95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44d9a95\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-daeed3e elementor-invisible\" data-id=\"daeed3e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;animation_delay&quot;:800}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e97080e elementor-widget elementor-widget-icon-box\" data-id=\"e97080e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCyber Security Implementation Templates and Guides\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83cbad6 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"83cbad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/rwts.com.au\/cybersecurity\/templatesandguides\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-df26c36 elementor-invisible\" data-id=\"df26c36\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:800}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1559369 elementor-widget elementor-widget-icon-box\" data-id=\"1559369\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCyber Security <br>Technology <br>Consulting\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b792be elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"3b792be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/rwts.com.au\/cybersecurity\/technology-consulting\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Cyber Security Today Technology alone is not sufficient to address cyber security risks today. Well-trained people, well-established policies and processes, and smart technology systems are all essential for a robust cyber security program. Begin you cyber security journey by completing our free Cyber Security Health Check. Get Started Our Approach The key components [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-99","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/99","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":178,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/99\/revisions"}],"predecessor-version":[{"id":770,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/99\/revisions\/770"}],"wp:attachment":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/media?parent=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}