{"id":2200,"date":"2024-04-09T05:59:47","date_gmt":"2024-04-09T05:59:47","guid":{"rendered":"https:\/\/visiblysecure.co.uk\/?page_id=2200"},"modified":"2024-06-02T11:23:07","modified_gmt":"2024-06-02T10:23:07","slug":"what-we-do","status":"publish","type":"page","link":"https:\/\/visiblysecure.co.uk\/index.php\/what-we-do\/","title":{"rendered":"What we do"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2200\" class=\"elementor elementor-2200\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c6f049 e-flex e-con-boxed e-con e-parent\" data-id=\"0c6f049\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f5b0 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"df8f5b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data is the most valuable asset in any business \u2013 large or small. It is at the heart of every interaction and every decision that is made. Information is essential for businesses to thrive and is often frustratingly invisible, inaccessible or irrelevant.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13febd7 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"13febd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MinerEye DataTracker\u2122<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-356148e elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"356148e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How can you ensure that your information and critical business assets are consistently secure?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c40176c elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-video\" data-id=\"c40176c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/vGXvuhhuSYA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e75249e e-flex e-con-boxed e-con e-child\" data-id=\"e75249e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-094cec5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"094cec5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"350\" height=\"222\" src=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg\" class=\"attachment-full size-full wp-image-2487\" alt=\"\" srcset=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg 350w, https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9-300x190.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Multi-dimentional<\/h3><p class=\"elementor-image-box-description\">Apply multiple file labels that reflect multiple policies of privacy, security and operational concerns for secure classification according to user, context and content.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60a93a5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"60a93a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"350\" height=\"222\" src=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-10.jpg\" class=\"attachment-full size-full wp-image-2486\" alt=\"\" srcset=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-10.jpg 350w, https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-10-300x190.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Speed<\/h3><p class=\"elementor-image-box-description\">Identifies, maps, categorises, and indexes unstructured data within files in seconds. Make breach disclosure of the compromised data a fast, seamless process.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5974a0c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"5974a0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"350\" height=\"222\" src=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-11.jpg\" class=\"attachment-full size-full wp-image-2485\" alt=\"\" srcset=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-11.jpg 350w, https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-11-300x190.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Privacy Compliance<\/h3><p class=\"elementor-image-box-description\">Apply multiple file labels that reflect multiple policies of privacy, security and operational concerns for secure classification according to user, context and content.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9db779 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"c9db779\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">We believe that information security must be taught. Educating and guiding users is the most effective way, to ensure that they understand the context and sensitivity of information.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-823ae47 e-flex e-con-boxed e-con e-child\" data-id=\"823ae47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27028eb elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"27028eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"222\" src=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg\" class=\"attachment-large size-large wp-image-2487\" alt=\"\" srcset=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg 350w, https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9-300x190.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-368a61b e-flex e-con-boxed e-con e-child\" data-id=\"368a61b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c14860 elementor-widget elementor-widget-heading\" data-id=\"3c14860\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Guidance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-574a861 elementor-widget elementor-widget-text-editor\" data-id=\"574a861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Information security for small to medium size businesses is a challenge. We are\u00a0 security creative thinkers with best of breed solutions to help businesses equip themselves against cyber risk and protect their data and critical assets.<\/p><p>In today\u2019s digital world, the traditional perimeter-based security strategies often struggle to defend against the increasingly complex and at times very sophisticated\u00a0 cyberthreats of today and tomorrow. A Zero Trust Approach is designed with the continually evolving threat landscape in mind. This approach rightly assumes that businesses will not be able to detect and block every threat, and therefore takes a \u201cverify everything, trust nothing\u201d approach to monitoring the security posture, granting permissions and controlling access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c816a34 e-flex e-con-boxed e-con e-child\" data-id=\"c816a34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4ff2a85 e-flex e-con-boxed e-con e-child\" data-id=\"4ff2a85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd5c1e5 elementor-widget elementor-widget-heading\" data-id=\"cd5c1e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security Guidance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-686251d elementor-widget elementor-widget-text-editor\" data-id=\"686251d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security is the means by which individuals and organisations reduce the risk of becoming victims of a cyber-attack.<\/p><p>Cyber security\u2019s core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access \u2013 both online and at work \u2013 from theft or damage. It is also about preventing unauthorised access to the vast amounts of personal information we store on these devices, and online.<\/p><p>Cyber security is important because smartphones, computers and the internet are now such a fundamental part of modern life, it\u2019s difficult to imagine how we\u2019d function without them. From online banking and shopping, to email and social media, it\u2019s more important than ever to consistently take steps that can prevent cyber criminals compromising our accounts, data, and devices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a93617b elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"a93617b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"222\" src=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg\" class=\"attachment-large size-large wp-image-2487\" alt=\"\" srcset=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg 350w, https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9-300x190.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8387ea elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"a8387ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How we can help<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d2ba elementor-widget elementor-widget-text-editor\" data-id=\"2e3d2ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protecting yourself and your business from cyber security risks can be challenging but there are some fundamental steps that can be taken to ensure that the basics principles are in place.<br \/>We can help you significantly increase your protection from the most common types of cyber-crime guiding you how to protect your organisation\u2019s data, assets, and reputation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-653c36b e-flex e-con-boxed e-con e-child\" data-id=\"653c36b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83189da elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-image\" data-id=\"83189da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"222\" src=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg\" class=\"attachment-large size-large wp-image-2487\" alt=\"\" srcset=\"https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9.jpg 350w, https:\/\/visiblysecure.co.uk\/wp-content\/uploads\/2024\/04\/image-9-300x190.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-edb17c1 e-flex e-con-boxed e-con e-child\" data-id=\"edb17c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5937f86 elementor-widget elementor-widget-heading\" data-id=\"5937f86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ways to protect your business assets<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c51020e elementor-widget elementor-widget-text-editor\" data-id=\"c51020e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are many ways that you can protect your business and improve your approach to cyber security \u2013 Secure Passwords, Continuous Software Patching and the right security tools for your business environment. It is important to understand what data you hold in order to best protect it.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data is the most valuable asset in any business \u2013 large or small. It is at the heart of every interaction and every decision that is made. Information is essential for businesses to thrive and is often frustratingly invisible, inaccessible or irrelevant. MinerEye DataTracker\u2122 How can you ensure that your information and critical business assets [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2200","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/2200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2200"}],"version-history":[{"count":94,"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/2200\/revisions"}],"predecessor-version":[{"id":2669,"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/2200\/revisions\/2669"}],"wp:attachment":[{"href":"https:\/\/visiblysecure.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}