{"id":3249,"date":"2021-02-03T13:49:20","date_gmt":"2021-02-03T18:49:20","guid":{"rendered":"https:\/\/new.b2b2c.ca\/b2bcybersecure\/a-propos-de-b2b-cyber-secure\/"},"modified":"2022-07-29T10:35:14","modified_gmt":"2022-07-29T14:35:14","slug":"about-b2b-cyber-secure","status":"publish","type":"page","link":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/","title":{"rendered":"About us"},"content":{"rendered":"\n  <div class=\"banner has-hover is-full-height\" id=\"banner-1490216559\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-1085996735\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n              <div data-parallax=\"1\" data-parallax-fade=\"true\">       <div data-animate=\"none\">           <div class=\"text dark text-shadow-5\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\t<div id=\"gap-1722198268\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1722198268 {\n  padding-top: 7px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><strong><span style=\"font-size: 200%;\">Builder\u00a0of<\/span><\/strong><\/h2>\n<h2><strong><span style=\"font-size: 200%;\">Secure IT\u00a0<\/span><\/strong><strong><span style=\"font-size: 200%;\">Architectures<\/span><\/strong><\/h2>\n\t<div id=\"gap-740651244\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-740651244 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"video-button-wrapper\" style=\"font-size:160%\"><a href=\"https:\/\/www.youtube.com\/watch?v=\/D2DYU3gRTto\" class=\"button open-video icon circle is-outline is-xlarge\"><i class=\"icon-play\" style=\"font-size:1.5em;\"><\/i><\/a><\/div>\n<h1><span style=\"font-size: 50%;\">B2B Cyber Secure helps local SMBs to strengthen their organization and their IT architecture against cyberthreats.<\/span><\/h1>\n<a href=\"#PretaDiscuter\" target=\"_self\" class=\"button white is-outline\"  >\n    <span>Secure your IT now<\/span>\n  <\/a>\n\n\t<div id=\"gap-591447301\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-591447301 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n              <\/div>\n           <\/div>\n       <\/div>       <\/div>              \n<style scope=\"scope\">\n\n#text-box-1085996735 {\n  width: 74%;\n}\n#text-box-1085996735 .text {\n  font-size: 100%;\n}\n\n\n@media (min-width:550px) {\n\n  #text-box-1085996735 {\n    width: 81%;\n  }\n\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-1490216559 {\n  padding-top: 100%;\n}\n#banner-1490216559 .bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_289287906b-1198x800.jpg);\n}\n#banner-1490216559 .overlay {\n  background-color: rgba(43, 138, 118, 0.71);\n}\n#banner-1490216559 .bg {\n  background-position: 35% 50%;\n}\n<\/style>\n  <\/div>\n\n\n\t<section class=\"section\" id=\"section_1492307288\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-1729872035\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1729872035 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-1662404453\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1031916522\">\n\t\t\t\t\t\t<div data-animate=\"fadeInUp\">\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/A-propos-image-1-1-980x800.jpeg\" class=\"attachment-large size-large\" alt=\"Les PME ont aussi besoin de cyber s\u00e9curit\u00e9\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/A-propos-image-1-1-980x800.jpeg 980w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/A-propos-image-1-1-490x400.jpeg 490w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/A-propos-image-1-1-768x627.jpeg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/A-propos-image-1-1-1536x1254.jpeg 1536w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/A-propos-image-1-1-2048x1672.jpeg 2048w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1031916522 {\n  width: 20%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-625710748\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-625710748 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2>Because small and medium sized business also needs cyber security<\/h2>\n<h5>A little story of our passion for cyber security<\/h5>\n<p class=\"lead\">After working as an IT integrator for several years, one thing has emerged. Without the addition of strong security measures, an SME risks its skin by operating on the Internet, but the measures offered to the small business were deficient.<\/p>\n<p class=\"lead\">From this observation was born B2B Cyber Secure, an IT integrator specializing in the protection of SMEs against cyber threats. Growing ever since, we have been pursuing our mission with passion with hundreds of small to medium-sized businesses and organizations.<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1492307288 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section\" id=\"section_1595611736\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row\"  id=\"row-1088694664\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1529937890\">\n\t\t\t\t\t\t<div data-animate=\"fadeInUp\">\t\t<div class=\"img-inner image-cover dark\" style=\"padding-top:100%;\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"831\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_95395411-831x800.jpeg\" class=\"attachment-large size-large\" alt=\"Vous avez la responsabilit\u00e9 de la cyber s\u00e9curit\u00e9 de votre entreprise\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_95395411-831x800.jpeg 831w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_95395411-416x400.jpeg 416w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_95395411-768x739.jpeg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_95395411-1536x1479.jpeg 1536w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/AdobeStock_95395411-2048x1972.jpeg 2048w\" sizes=\"auto, (max-width: 831px) 100vw, 831px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1529937890 {\n  width: 20%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-79647981\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-79647981 {\n  padding-top: 46px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2>The safety of your business is your responsibility, we help you achieve your goals.<\/h2>\n<p>Customers who use B2B Cyber Secure know that their IT security is not where it should be. With us, they make their vulnerabilities visible and implement concrete measures to reduce them to a level of risk with which they can continue their development.<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1595611736 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_356462418\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"slider-wrapper relative\" id=\"slider-695478538\" >\n    <div class=\"slider slider-type-fade slider-nav-dots-dashes slider-nav-circle slider-nav-large slider-nav-light slider-nav-outside slider-style-normal\"\n        data-flickity-options='{\n            \"cellAlign\": \"center\",\n            \"imagesLoaded\": true,\n            \"lazyLoad\": 1,\n            \"freeScroll\": false,\n            \"wrapAround\": true,\n            \"autoPlay\": 3000,\n            \"pauseAutoPlayOnHover\" : false,\n            \"prevNextButtons\": false,\n            \"contain\" : true,\n            \"adaptiveHeight\" : true,\n            \"dragThreshold\" : 10,\n            \"percentPosition\": true,\n            \"pageDots\": false,\n            \"rightToLeft\": false,\n            \"draggable\": false,\n            \"selectedAttraction\": 0.1,\n            \"parallax\" : 0,\n            \"friction\": 0.6        }'\n        >\n        \n\n  <div class=\"banner has-hover\" id=\"banner-397179832\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-2123708633\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text dark text-shadow-3\">\n              \n              <div class=\"text-inner text-center\">\n                  \n<p><span style=\"font-size:250%;\">IT SAAS Services<\/span><\/p>\n<h3><span style=\"font-size:80%;\">Cybersecurity technologies and expertise sold as a service<\/span><\/h3>\n              <\/div>\n           <\/div>\n                            \n<style scope=\"scope\">\n\n#text-box-2123708633 {\n  width: 60%;\n}\n#text-box-2123708633 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-397179832 {\n  padding-top: 177px;\n}\n#banner-397179832 .overlay {\n  background-color: rgba(0, 0, 0, 0.17);\n}\n<\/style>\n  <\/div>\n\n\n\n  <div class=\"banner has-hover\" id=\"banner-1691364426\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-970701909\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text dark text-shadow-3\">\n              \n              <div class=\"text-inner text-center\">\n                  \n<p><span style=\"font-size:250%;\">Expertise<\/span><\/p>\n<h3><span style=\"font-size:80%;\">Cybersecurity consulting and outsourcing services for SMEs<\/span><\/h3>\n              <\/div>\n           <\/div>\n                            \n<style scope=\"scope\">\n\n#text-box-970701909 {\n  width: 60%;\n}\n#text-box-970701909 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-1691364426 {\n  padding-top: 177px;\n}\n#banner-1691364426 .overlay {\n  background-color: rgba(0, 0, 0, 0.17);\n}\n<\/style>\n  <\/div>\n\n\n\n  <div class=\"banner has-hover\" id=\"banner-441750702\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-413903339\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text dark text-shadow-3\">\n              \n              <div class=\"text-inner text-center\">\n                  \n<p><span style=\"font-size:250%;\">Technologies<\/span><\/p>\n<h3><span style=\"font-size:80%;\">Sale of cybersecurity equipment and software<\/span><\/h3>\n              <\/div>\n           <\/div>\n                            \n<style scope=\"scope\">\n\n#text-box-413903339 {\n  width: 60%;\n}\n#text-box-413903339 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-441750702 {\n  padding-top: 177px;\n}\n#banner-441750702 .overlay {\n  background-color: rgba(0, 0, 0, 0.17);\n}\n<\/style>\n  <\/div>\n\n\n     <\/div>\n\n     <div class=\"loading-spin dark large centered\"><\/div>\n\n     <style scope=\"scope\">\n             <\/style>\n<\/div>\n\n\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_356462418 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n}\n<\/style>\n\t<\/section>\n\t\n\n\n\t<section class=\"section has-parallax\" id=\"section_1829047961\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded \" data-parallax-container=\".section\" data-parallax-background data-parallax=\"-3\">\n\n\t\t\t\n\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-1740597187\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1740597187 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n  <div class=\"banner-grid-wrapper\">\n  <div id=\"banner-grid-1700372963\" class=\"banner-grid row row-grid row-small\" data-packery-options=\"\">\n                      \n<div class=\"col grid-col small-13 large-7 grid-col-2-3\" ><div class=\"col-inner\">\n\n  <div class=\"banner has-hover\" id=\"banner-1870225578\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                                    \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-1870225578 {\n  padding-top: 500px;\n}\n#banner-1870225578 .bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.17.54.png);\n}\n<\/style>\n  <\/div>\n\n\n<\/div><\/div>\n<div class=\"col grid-col small-12 large-5 grid-col-1-3\" ><div class=\"col-inner\">\n\n  <div class=\"banner has-hover\" id=\"banner-380515913\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                                    \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-521726362\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                     <div data-animate=\"fadeInUp\">           <div class=\"text \">\n              \n              <div class=\"text-inner text-center\">\n                  \n<p><span style=\"font-size: 160%;\"><em>With our tools and our approach, our clients regain control of their choices in terms of IT security. We empower them to effectively protect their IT within their budget and risk tolerance level.<\/em><\/span><\/p>\n              <\/div>\n           <\/div>\n       <\/div>                     \n<style scope=\"scope\">\n\n#text-box-521726362 {\n  width: 82%;\n}\n#text-box-521726362 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-380515913 {\n  padding-top: 500px;\n  background-color: rgba(255, 255, 255, 0.81);\n}\n<\/style>\n  <\/div>\n\n\n<\/div><\/div>\n<div class=\"col grid-col small-12 large-5 grid-col-2-3\" ><div class=\"col-inner\">\n\n  <div class=\"banner has-hover\" id=\"banner-1324094996\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                                    \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-1324094996 {\n  padding-top: 500px;\n}\n#banner-1324094996 .bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.31.12.png);\n}\n#banner-1324094996 .bg {\n  background-position: 42% 64%;\n}\n<\/style>\n  <\/div>\n\n\n<\/div><\/div>\n<div class=\"col grid-col small-12 large-7 grid-col-1-3\" ><div class=\"col-inner\">\n\n  <div class=\"banner has-hover\" id=\"banner-560448662\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                                    \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-1832014202\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                     <div data-animate=\"bounceInUp\">           <div class=\"text \">\n              \n              <div class=\"text-inner text-center\">\n                  \n<p><span style=\"font-size: 120%;\"><em>Our clients had all accumulated significant technological debt and the majority were having difficulty maintaining their IT staff. The security of systems critical to the operation of their business was no longer assured.<\/em><\/span><\/p>\n<p><span style=\"font-size: 120%;\"><em>With us, they reduce their technology debt and replace their staffing problems with our IT sold as a service. They solidify and secure their IT better than ever before, and often do it at a cost.<\/em><\/span><\/p>\n              <\/div>\n           <\/div>\n       <\/div>                     \n<style scope=\"scope\">\n\n#text-box-1832014202 {\n  width: 77%;\n}\n#text-box-1832014202 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-560448662 {\n  padding-top: 500px;\n  background-color: rgba(255, 255, 255, 0.72);\n}\n<\/style>\n  <\/div>\n\n\n<\/div><\/div>\n            <\/div>\n    <style scope=\"scope\">\n    #banner-grid-1700372963 .grid-col-1{height: 600px}\n    #banner-grid-1700372963 .grid-col-1-2{height: 300px}\n    #banner-grid-1700372963 .grid-col-1-3{height:200px}\n    #banner-grid-1700372963 .grid-col-2-3{height: 400px}\n    #banner-grid-1700372963 .grid-col-1-4{height: 150px}\n    #banner-grid-1700372963 .grid-col-3-4{height: 450px}\n\n\n    \n    \n\n  <\/style>\n    <\/div>\n  \n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1829047961 {\n  padding-top: 40px;\n  padding-bottom: 40px;\n}\n#section_1829047961 .section-bg-overlay {\n  background-color: rgba(124, 171, 162, 0.78);\n}\n#section_1829047961 .section-bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_296075455-1.jpeg);\n}\n#section_1829047961 .section-bg {\n  background-position: 51% 57%;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_1206883449\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<section class=\"section\" id=\"section_1001412315\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t<div class=\"loading-spin centered\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"gap-989016076\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-989016076 {\n  padding-top: 60px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\"  id=\"row-595022153\">\n\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"bounceInRight\">\n\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\n\n<h4 ><span style=\"font-size:160%;\"><a href=\"\/en\/perimeter-the-blog-on-cyber-security-and-it-for-smes\/\">The latest articles from <b><span style=\"color: #ed1c24;\">P<\/span>ERI<span style=\"color: #ed1c24;\">M<\/span>ETE<span style=\"color: #ed1c24;\">R<\/span><\/b><\/a><br \/>\nour blog on CYBER SECURITY and IT for SMEs<\/h4>\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_227947473\">\n\t\t<a class=\"\" href=\"\/en\/perimeter-the-blog-on-cyber-security-and-it-for-smes\/\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"681\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-1199x800.jpeg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-1199x800.jpeg 1199w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-600x400.jpeg 600w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-768x512.jpeg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-1536x1025.jpeg 1536w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-2048x1366.jpeg 2048w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style scope=\"scope\">\n\n#image_227947473 {\n  width: 81%;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p>Knowledge transfer is integral to our approach. Learn about cybersecurity by reading our most recent articles from our blog.<\/p>\n<a href=\"\/en\/perimeter-the-blog-on-cyber-security-and-it-for-smes\/\" target=\"_self\" class=\"button primary is-outline\"  >\n    <span>Visit our blog<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-1 small-12 large-1\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-6 small-12 large-6\"  data-animate=\"bounceInLeft\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"wprss_ajax\" data-id=\"rss90d0db73f1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/plugins\/__wp-rss-retriever-pro\/inc\/imgs\/ajax-loader.gif\" alt=\"Loading RSS Feed\" width=\"16\" height=\"16\"><\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1001412315 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n}\n<\/style>\n\t<\/section>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1206883449 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #PretaDiscuter\" data-bullet=\"false\" data-link=\"#PretaDiscuter\" data-title=\"#PretaDiscuter\"><a name=\"PretaDiscuter\"><\/a><\/span>\n\t<section class=\"section\" id=\"section_372882759\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<section class=\"section\" id=\"section_355818916\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\r\n\r\n\t<div id=\"gap-1757621705\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1757621705 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<div class=\"row\"  id=\"row-850278626\">\r\n\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n<h5 class=\"uppercase\"><span style=\"font-size:160%;\">Ready to discuss your needs?<\/span><\/h5>\r\n<h2><span style=\"font-size:90%;\">Contact us today for a no-obligation consultation.<\/span><\/h2>\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\r\n<div class=\"row align-center\"  id=\"row-1541431446\">\r\n\r\n\n\t<div class=\"col medium-2 small-12 large-2\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1300030726\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"250\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/09\/Parlez-avec-SecureBIZ-2.png\" class=\"attachment-large size-large\" alt=\"Parlez avec SecureBIZ\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1300030726 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n<div class=\"row align-center\"  id=\"row-1054523837\">\r\n\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"tel:+15145095080\" target=\"_self\" class=\"button secondary is-shade is-xlarge box-shadow-4 box-shadow-5-hover\"  style=\"border-radius:10px;padding:0px 40px 0px 40px;\">\n  <i class=\"icon-phone\" ><\/i>  <span>514 509-5080<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"https:\/\/form.jotform.com\/211126360666047?language=en\" target=\"_self\" class=\"button success is-link box-shadow-4 box-shadow-5-hover\"  style=\"border-radius:10px;padding:0px 30px 0px 20px;\">\n  <i class=\"icon-clock\" ><\/i>  <span>Let's make an appointment<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n#row-1054523837 > .col > .col-inner {\n  padding: 40px 0px 0px 0px;\n}\n<\/style>\n<\/div>\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-2 small-12 large-2\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\r\n\r\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_355818916 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 0px;\n  background-color: rgb(255,255,255);\n}\n<\/style>\n\t<\/section>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_372882759 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":3739,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3249","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>About us - B2B Cyber Secure<\/title>\n<meta name=\"description\" content=\"B2B Cyber Secure is an IT integrator specializing in the protection of SMEs against cyber threats. Secure your IT now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About us - B2B Cyber Secure\" \/>\n<meta property=\"og:description\" content=\"B2B Cyber Secure is an IT integrator specializing in the protection of SMEs against cyber threats. Secure your IT now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"B2B Cyber Secure\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-29T14:35:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/about-b2b-cyber-secure\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/about-b2b-cyber-secure\\\/\",\"name\":\"About us - B2B Cyber Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/about-b2b-cyber-secure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/about-b2b-cyber-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\",\"datePublished\":\"2021-02-03T18:49:20+00:00\",\"dateModified\":\"2022-07-29T14:35:14+00:00\",\"description\":\"B2B Cyber Secure is an IT integrator specializing in the protection of SMEs against cyber threats. Secure your IT now.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/about-b2b-cyber-secure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/about-b2b-cyber-secure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\",\"width\":1200,\"height\":630,\"caption\":\"B2B Cyber Secure - TI S\u00e9curis\u00e9es - Secure IT\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"name\":\"B2B Cyber Secure\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\",\"name\":\"B2B Cyber Secure\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"width\":67,\"height\":67,\"caption\":\"B2B Cyber Secure\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2bcybersecure\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"About us - B2B Cyber Secure","description":"B2B Cyber Secure is an IT integrator specializing in the protection of SMEs against cyber threats. Secure your IT now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/","og_locale":"en_US","og_type":"article","og_title":"About us - B2B Cyber Secure","og_description":"B2B Cyber Secure is an IT integrator specializing in the protection of SMEs against cyber threats. Secure your IT now.","og_url":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/","og_site_name":"B2B Cyber Secure","article_modified_time":"2022-07-29T14:35:14+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/","url":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/","name":"About us - B2B Cyber Secure","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/#primaryimage"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","datePublished":"2021-02-03T18:49:20+00:00","dateModified":"2022-07-29T14:35:14+00:00","description":"B2B Cyber Secure is an IT integrator specializing in the protection of SMEs against cyber threats. Secure your IT now.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/about-b2b-cyber-secure\/#primaryimage","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","width":1200,"height":630,"caption":"B2B Cyber Secure - TI S\u00e9curis\u00e9es - Secure IT"},{"@type":"WebSite","@id":"https:\/\/b2bcybersecure.com\/en\/#website","url":"https:\/\/b2bcybersecure.com\/en\/","name":"B2B Cyber Secure","description":"","publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2bcybersecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/b2bcybersecure.com\/en\/#organization","name":"B2B Cyber Secure","url":"https:\/\/b2bcybersecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","width":67,"height":67,"caption":"B2B Cyber Secure"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/b2bcybersecure\/"]}]}},"_links":{"self":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/comments?post=3249"}],"version-history":[{"count":5,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3249\/revisions"}],"predecessor-version":[{"id":4259,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3249\/revisions\/4259"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media\/3739"}],"wp:attachment":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media?parent=3249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}