{"id":3273,"date":"2021-02-03T13:48:13","date_gmt":"2021-02-03T18:48:13","guid":{"rendered":"https:\/\/new.b2b2c.ca\/b2bcybersecure\/expertise\/"},"modified":"2021-05-04T16:22:36","modified_gmt":"2021-05-04T20:22:36","slug":"experts-in-it-security","status":"publish","type":"page","link":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/","title":{"rendered":"Expertise"},"content":{"rendered":"\n  <div class=\"banner has-hover is-full-height has-parallax\" id=\"banner-689075218\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" data-parallax=\"-6\" data-parallax-container=\".banner\" data-parallax-background>\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-2093578888\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n              <div data-parallax=\"1\" data-parallax-fade=\"true\">                  <div class=\"text dark text-shadow-5\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\t<div id=\"gap-537002621\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-537002621 {\n  padding-top: 7px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 140%;\"><strong>EXPERTISE<\/strong><\/span><\/h2>\n\t<div id=\"gap-874195061\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-874195061 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<h3><span style=\"font-size: 160%;\"><strong>Complete your crew<\/strong><\/span><\/h3>\n<h1><span style=\"font-size:40%;\">Complete the skills of your team with our IT security specialists and technicians.<\/span><\/h1>\n<a href=\"#PretaDiscuter\" target=\"_self\" class=\"button white is-outline\"  >\n    <span>book your free consultation<\/span>\n  <\/a>\n\n\t<div id=\"gap-854429948\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-854429948 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n              <\/div>\n           <\/div>\n              <\/div>              \n<style scope=\"scope\">\n\n#text-box-2093578888 {\n  width: 74%;\n}\n#text-box-2093578888 .text {\n  font-size: 100%;\n}\n\n\n@media (min-width:550px) {\n\n  #text-box-2093578888 {\n    width: 56%;\n  }\n\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-689075218 {\n  padding-top: 100%;\n}\n#banner-689075218 .bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Expertise-B2B-Cyber-Secure-1200x800.jpeg);\n}\n#banner-689075218 .overlay {\n  background-color: rgba(60, 133, 136, 0.32);\n}\n#banner-689075218 .bg {\n  background-position: 62% 68%;\n}\n<\/style>\n  <\/div>\n\n\n\t<section class=\"section\" id=\"section_430965912\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-418703404\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-418703404 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-1717488433\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n<h4><span style=\"font-size: 200%;\">Choose the experienced pilot<\/span><br \/>\n<\/h4>\n<h2><span style=\"font-size: 70%;\">Your business is unique and so are the cyber dangers that face it. Hire our experts to achieve the specific objectives of your SME.<\/span><\/h2>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t<div id=\"gap-1964898946\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1964898946 {\n  padding-top: 15px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_430965912 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_1544858660\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row align-middle align-center\"  id=\"row-532177268\">\n\n\t<div class=\"col medium-5 small-12 large-5 col-divided\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-right text-shadow-2\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"box has-hover   has-hover box-bounce box-text-bottom\" >\n\n\t\t<div class=\"box-image\" >\n\t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:50%;\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.31.12.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.31.12.png 1024w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.31.12-687x400.png 687w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.31.12-768x447.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"box-text text-center dark\" style=\"background-color:rgb(105, 135, 181);\">\n\t\t\t<div class=\"box-text-inner\">\n\t\t\t\t\n\n\t\t<div class=\"icon-box featured-box hide-for-small icon-box-left text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 60px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" >\n\t\t\t\t\t\t<?xml version=\"1.0\" encoding=\"iso-8859-1\"?>\r\n<!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0)  -->\r\n<svg version=\"1.1\" id=\"Capa_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t viewBox=\"0 0 58 58\" style=\"enable-background:new 0 0 58 58;\" xml:space=\"preserve\">\r\n<g>\r\n\t<path d=\"M54.319,37.839C54.762,35.918,55,33.96,55,32c0-9.095-4.631-17.377-12.389-22.153c-0.473-0.29-1.087-0.143-1.376,0.327\r\n\t\tc-0.29,0.471-0.143,1.086,0.327,1.376C48.724,15.96,53,23.604,53,32c0,1.726-0.2,3.451-0.573,5.147C51.966,37.051,51.489,37,51,37\r\n\t\tc-3.86,0-7,3.141-7,7s3.14,7,7,7s7-3.141,7-7C58,41.341,56.509,39.024,54.319,37.839z\"\/>\r\n\t<path d=\"M38.171,54.182C35.256,55.388,32.171,56,29,56c-6.385,0-12.527-2.575-17.017-7.092C13.229,47.643,14,45.911,14,44\r\n\t\tc0-3.859-3.14-7-7-7s-7,3.141-7,7s3.14,7,7,7c1.226,0,2.378-0.319,3.381-0.875C15.26,55.136,21.994,58,29,58\r\n\t\tc3.435,0,6.778-0.663,9.936-1.971c0.51-0.211,0.753-0.796,0.542-1.307C39.267,54.213,38.681,53.971,38.171,54.182z\"\/>\r\n\t<path d=\"M4,31.213c0.024,0.002,0.048,0.003,0.071,0.003c0.521,0,0.959-0.402,0.997-0.93c0.712-10.089,7.586-18.52,17.22-21.314\r\n\t\tC23.142,11.874,25.825,14,29,14c3.86,0,7-3.141,7-7s-3.14-7-7-7c-3.851,0-6.985,3.127-6.999,6.975\r\n\t\tC11.42,9.922,3.851,19.12,3.073,30.146C3.034,30.696,3.449,31.175,4,31.213z\"\/>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<g>\r\n<\/g>\r\n<\/svg>\r\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t<h5 class=\"uppercase\">Staffing difficulties<\/h5>\t\t\t<h6>Staffing your IT team is becoming increasingly difficult and expensive.<\/h6>\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n<h2 class=\"uppercase\">Specific mandates,<\/br>support contract or<\/br>outsourcing<\/h2>\n<p>Advance your IT projects despite a difficult job market.<\/p>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n<ul>\n<li>Professional services to defin the plan and for project management<\/li>\n<li>Definition of required equipment and services and procurement<\/li>\n<li>Implementation of new equipment and services<\/li>\n<li>Platform migration<\/li>\n<li>Platform update<\/li>\n<li>Training<\/li>\n<li>Knowledge transfer<\/li>\n<li>Maintenance<\/li>\n<li>Monitoring<\/li>\n<li>Service contract and service calls<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-465695732\">\n\n\t<div class=\"col medium-5 small-12 large-5 col-divided\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n<h2 class=\"uppercase\">Inventory, external audit or annual review<\/h2>\n<p>Confidently establish your cybersecurity plan or report to your board of directors, partners or external bodies with an analysis of your relative vulnerability.<\/p>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n<ul>\n<li>Inventory :\n<ul>\n<li>Equipment<\/li>\n<li>Operating Systems (OS)<\/li>\n<li>Applications and their update level<\/li>\n<li>Security measures in place<\/li>\n<li>Investigation report<\/li>\n<\/ul>\n<\/li>\n<li>Audit :\n<ul>\n<li>Presence on the dark web<\/li>\n<li>Active Directories (AD)<\/li>\n<li>Rights distributed to users<\/li>\n<li>Update process of hardware, OS, network and applications<\/li>\n<li>Inventory of known vulnerabilities<\/li>\n<li>Report with recommendations<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-left text-shadow-2\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"box has-hover   has-hover box-bounce box-text-bottom\" >\n\n\t\t<div class=\"box-image\" >\n\t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:50%;\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1274\" height=\"772\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-16.09.13.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-16.09.13.png 1274w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-16.09.13-660x400.png 660w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-16.09.13-768x465.png 768w\" sizes=\"auto, (max-width: 1274px) 100vw, 1274px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"box-text text-center dark\" style=\"background-color:rgb(105, 135, 181);\">\n\t\t\t<div class=\"box-text-inner\">\n\t\t\t\t\n\n\t\t<div class=\"icon-box featured-box hide-for-small icon-box-left text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 60px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" >\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"150\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/map-icon-wite.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t<h5 class=\"uppercase\">Uncertain level of cybersecurity<\/h5>\t\t\t<h6>You are concerned about not having a clear understanding of the security of your network, data, and systems.<\/h6>\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-985492939\">\n\n\t<div class=\"col medium-5 small-12 large-5 col-divided\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-right text-shadow-2\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"box has-hover   has-hover box-bounce box-text-bottom\" >\n\n\t\t<div class=\"box-image\" >\n\t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:50%;\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"868\" height=\"574\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.17.54.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.17.54.png 868w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.17.54-605x400.png 605w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.17.54-768x508.png 768w\" sizes=\"auto, (max-width: 868px) 100vw, 868px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"box-text text-center dark\" style=\"background-color:rgb(105, 135, 181);\">\n\t\t\t<div class=\"box-text-inner\">\n\t\t\t\t\n\n\t\t<div class=\"icon-box featured-box hide-for-small icon-box-left text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 60px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" >\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"150\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/implementation-icon-wite.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t<h5 class=\"uppercase\">Delayed upgrades<\/h5>\t\t\t<h6>New technologies could reduce your growing vulnerability. You need it now, but you lack the skills or the time.<\/h6>\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n<h2 class=\"uppercase\">Turnkey technologies <br \/>Implementation<br \/>mandates<\/h2>\n<p>Upgrade your technical infrastructure with confidence.<\/p>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n<ul>\n<li>Procurement<\/li>\n<li>Installation<\/li>\n<li>Configuration<\/li>\n<li>Training and<\/li>\n<li>Knowledge transfer<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-133059825\">\n\n\t<div class=\"col medium-5 small-12 large-5 col-divided\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n<h2 class=\"uppercase\">Service contract<br \/>with surveillance and<br \/>FAST interventions<\/h2>\n<p>Amplify your team&#8217;s cybersecurity capabilities without increasing your administrative burden.<\/p>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n<ul>\n<li>Transfer or sharing of oversight responsibility<\/li>\n<li>Maintenance and regular\u00a0inspection of activity logs<\/li>\n<li>Periodic penetration tests<\/li>\n<li>Key systems update contract<\/li>\n<li>Outsourcing of IT management responsibilities<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-left text-shadow-2\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"box has-hover   has-hover box-bounce box-text-bottom\" >\n\n\t\t<div class=\"box-image\" >\n\t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:50%;\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"990\" height=\"550\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.25.21.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.25.21.png 990w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.25.21-720x400.png 720w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.25.21-768x427.png 768w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"box-text text-center dark\" style=\"background-color:rgb(105, 135, 181);\">\n\t\t\t<div class=\"box-text-inner\">\n\t\t\t\t\n\n\t\t<div class=\"icon-box featured-box hide-for-small icon-box-left text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 60px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" >\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"150\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/vision-icon-wite.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t<h5 class=\"uppercase\">Difficult sustained vigilance<\/h5>\t\t\t<h6>Your systems have suffered a cyber attack and you must also restore services and rebuild your defenses.<\/h6>\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row align-middle align-center\"  id=\"row-604538584\">\n\n\t<div class=\"col medium-5 small-12 large-5 col-divided\"  data-animate=\"fadeInRight\">\n\t\t<div class=\"col-inner text-right text-shadow-2\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"box has-hover   has-hover box-bounce box-text-bottom\" >\n\n\t\t<div class=\"box-image\" >\n\t\t\t\t\t\t<div class=\"\" >\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1148\" height=\"726\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.26.49.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.26.49.png 1148w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.26.49-633x400.png 633w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Capture-decran-le-2021-02-24-a-15.26.49-768x486.png 768w\" sizes=\"auto, (max-width: 1148px) 100vw, 1148px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"box-text text-center dark\" style=\"background-color:rgb(105, 135, 181);\">\n\t\t\t<div class=\"box-text-inner\">\n\t\t\t\t\n\n\t\t<div class=\"icon-box featured-box hide-for-small icon-box-left text-left\"  >\n\t\t\t\t\t<div class=\"icon-box-img\" style=\"width: 60px\">\n\t\t\t\t<div class=\"icon\">\n\t\t\t\t\t<div class=\"icon-inner\" >\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"150\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/human-computer-icon-wite.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<div class=\"icon-box-text last-reset\">\n\t\t\t<h5 class=\"uppercase\">Deficient training of staff<\/h5>\t\t\t<h6>Your staff and the systems they use change so often that their knowledge of cyber security practices is always lacking.<\/h6>\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t\n\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"fadeInLeft\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n<h2 class=\"uppercase\">Implementation of an LMS<br \/>on cyber security<\/h2>\n<p>Equip your human resources team with the content and management system (LMS) they need. With these, you will be able to document for your board of directors and your external partners the real level of training of your staff.<\/p>\n<div class=\"accordion\" rel=\"\">\n<div class=\"accordion-item\"><a href=\"#\" class=\"accordion-title plain\"><button class=\"toggle\"><i class=\"icon-angle-down\"><\/i><\/button><span>More<\/span><\/a><div class=\"accordion-inner\">\n<ul>\n<li>Incremental learning with skill-based courses.<\/li>\n<li>Employees stay motivated because they learn a new skill every day.<\/li>\n<li>Automated learning management saves hundreds of hours of platform management every year.<\/li>\n<li>All lessons are related to the daily working life of employees<\/li>\n<li>Supports GDPR and data compliance.<\/li>\n<li>The configuration of the program is for each employee or by role.<\/li>\n<li>Program management can easily monitor the progress of an employee or group.<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1544858660 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 200px;\n}\n\n\n@media (min-width:550px) {\n\n  #section_1544858660 {\n    padding-top: 0px;\n    padding-bottom: 0px;\n    min-height: 300px;\n  }\n\n}\n<\/style>\n\t<\/section>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #PretaDiscuter\" data-bullet=\"false\" data-link=\"#PretaDiscuter\" data-title=\"#PretaDiscuter\"><a name=\"PretaDiscuter\"><\/a><\/span>\n\t<section class=\"section\" id=\"section_505554999\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<section class=\"section\" id=\"section_769142006\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\r\n\r\n\t<div id=\"gap-1506107050\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1506107050 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<div class=\"row\"  id=\"row-546568394\">\r\n\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n<h5 class=\"uppercase\"><span style=\"font-size:160%;\">Ready to discuss your needs?<\/span><\/h5>\r\n<h2><span style=\"font-size:90%;\">Contact us today for a no-obligation consultation.<\/span><\/h2>\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\r\n<div class=\"row align-center\"  id=\"row-1081623196\">\r\n\r\n\n\t<div class=\"col medium-2 small-12 large-2\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1967970252\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"250\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/09\/Parlez-avec-SecureBIZ-2.png\" class=\"attachment-large size-large\" alt=\"Parlez avec SecureBIZ\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_1967970252 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n<div class=\"row align-center\"  id=\"row-1048720575\">\r\n\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"tel:+15145095080\" target=\"_self\" class=\"button secondary is-shade is-xlarge box-shadow-4 box-shadow-5-hover\"  style=\"border-radius:10px;padding:0px 40px 0px 40px;\">\n  <i class=\"icon-phone\" ><\/i>  <span>514 509-5080<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"https:\/\/form.jotform.com\/211126360666047?language=en\" target=\"_self\" class=\"button success is-link box-shadow-4 box-shadow-5-hover\"  style=\"border-radius:10px;padding:0px 30px 0px 20px;\">\n  <i class=\"icon-clock\" ><\/i>  <span>Let's make an appointment<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n#row-1048720575 > .col > .col-inner {\n  padding: 40px 0px 0px 0px;\n}\n<\/style>\n<\/div>\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\n\t<div class=\"col medium-2 small-12 large-2\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\r\n\r\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_769142006 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 0px;\n  background-color: rgb(255,255,255);\n}\n<\/style>\n\t<\/section>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_505554999 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":3739,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3273","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Experts In IT Security - B2B Cyber Secure<\/title>\n<meta name=\"description\" content=\"Complete the skills of your team with our IT security specialists and technicians: AUDITS, INSTALLATION, TRAINING\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Experts In IT Security - B2B Cyber Secure\" \/>\n<meta property=\"og:description\" content=\"Complete the skills of your team with our IT security specialists and technicians: AUDITS, INSTALLATION, TRAINING\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"B2B Cyber Secure\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-04T20:22:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/experts-in-it-security\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/experts-in-it-security\\\/\",\"name\":\"Experts In IT Security - B2B Cyber Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/experts-in-it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/experts-in-it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\",\"datePublished\":\"2021-02-03T18:48:13+00:00\",\"dateModified\":\"2021-05-04T20:22:36+00:00\",\"description\":\"Complete the skills of your team with our IT security specialists and technicians: AUDITS, INSTALLATION, TRAINING\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/experts-in-it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/experts-in-it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\",\"width\":1200,\"height\":630,\"caption\":\"B2B Cyber Secure - TI S\u00e9curis\u00e9es - Secure IT\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"name\":\"B2B Cyber Secure\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\",\"name\":\"B2B Cyber Secure\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"width\":67,\"height\":67,\"caption\":\"B2B Cyber Secure\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2bcybersecure\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Experts In IT Security - B2B Cyber Secure","description":"Complete the skills of your team with our IT security specialists and technicians: AUDITS, INSTALLATION, TRAINING","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Experts In IT Security - B2B Cyber Secure","og_description":"Complete the skills of your team with our IT security specialists and technicians: AUDITS, INSTALLATION, TRAINING","og_url":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/","og_site_name":"B2B Cyber Secure","article_modified_time":"2021-05-04T20:22:36+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/","url":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/","name":"Experts In IT Security - B2B Cyber Secure","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/#primaryimage"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","datePublished":"2021-02-03T18:48:13+00:00","dateModified":"2021-05-04T20:22:36+00:00","description":"Complete the skills of your team with our IT security specialists and technicians: AUDITS, INSTALLATION, TRAINING","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/experts-in-it-security\/#primaryimage","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","width":1200,"height":630,"caption":"B2B Cyber Secure - TI S\u00e9curis\u00e9es - Secure IT"},{"@type":"WebSite","@id":"https:\/\/b2bcybersecure.com\/en\/#website","url":"https:\/\/b2bcybersecure.com\/en\/","name":"B2B Cyber Secure","description":"","publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2bcybersecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/b2bcybersecure.com\/en\/#organization","name":"B2B Cyber Secure","url":"https:\/\/b2bcybersecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","width":67,"height":67,"caption":"B2B Cyber Secure"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/b2bcybersecure\/"]}]}},"_links":{"self":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/comments?post=3273"}],"version-history":[{"count":5,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3273\/revisions"}],"predecessor-version":[{"id":3776,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3273\/revisions\/3776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media\/3739"}],"wp:attachment":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media?parent=3273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}