{"id":1403,"date":"2025-01-26T23:07:23","date_gmt":"2025-01-26T23:07:23","guid":{"rendered":"https:\/\/exigotech.co\/lp\/?page_id=1403"},"modified":"2025-06-09T00:44:08","modified_gmt":"2025-06-09T00:44:08","slug":"cybersecurity-proactive-solutions-exigo-tech","status":"publish","type":"page","link":"https:\/\/exigotech.co\/lp\/cybersecurity-proactive-solutions-exigo-tech\/","title":{"rendered":"Secure Your Business with Exigo Tech\u2019s Cybersecurity Solutions | Proactive Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1403\" class=\"elementor elementor-1403\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6d3c6e e-flex e-con-boxed e-con e-parent\" data-id=\"b6d3c6e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/youtu.be\\\/oJnmuCdBdw0&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-video-embed\"><\/div>\n\t\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-7a45231 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7a45231\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"74\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/Exigo-Tech-Logo-Dark-BG-300x74.webp\" class=\"attachment-medium size-medium wp-image-1549\" alt=\"\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/Exigo-Tech-Logo-Dark-BG-300x74.webp 300w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/Exigo-Tech-Logo-Dark-BG-1024x254.webp 1024w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/Exigo-Tech-Logo-Dark-BG-768x190.webp 768w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/Exigo-Tech-Logo-Dark-BG-1536x381.webp 1536w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/Exigo-Tech-Logo-Dark-BG-2048x508.webp 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cf37b4 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6cf37b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Secure Your Business with Exigo Tech\u2019s Cybersecurity Solutions<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c56c15a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c56c15a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber threats are real and growing\u2013 Protect your business today<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5840b56 e-grid e-con-full e-con e-child\" data-id=\"5840b56\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-491f55f elementor-widget elementor-widget-image\" data-id=\"491f55f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"263\" height=\"113\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/03\/arn-winner-sharepoint-2.webp\" class=\"attachment-full size-full wp-image-1678\" alt=\"exigo tech arn innovation awards 2024 winner on tech partner security\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69cadaf elementor-widget elementor-widget-image\" data-id=\"69cadaf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"263\" height=\"113\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/03\/sharepoint-aca-2025-finalist.webp\" class=\"attachment-full size-full wp-image-1679\" alt=\"exigo tech australian cyber awards 2025 finalist on cloud service provider and brendan fazel in ciso of the year\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89af095 elementor-widget elementor-widget-image\" data-id=\"89af095\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/06\/Security-19052025-e1749429553952.png\" title=\"Security-badges-19052025\" alt=\"Security-badges-19052025\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0f2409 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"e0f2409\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#register-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b9414f e-flex e-con-boxed e-con e-parent\" data-id=\"7b9414f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-745166e e-con-full e-flex e-con e-child\" data-id=\"745166e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9420e15 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9420e15\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let\u2019s Build a Secure Future Together<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02bab8f elementor-widget elementor-widget-text-editor\" data-id=\"02bab8f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every second, a cyberattack is taking place somewhere in the world. Cybercriminals are getting smarter, more sophisticated, and more relentless. Businesses, be it small, medium, or large, all are falling victim to ransomware, phishing, and data breaches.<\/p><p>But here\u2019s the good news, we are here to help! By partnering with us, you can confidently tackle these challenges with strong cybersecurity measures. <br \/>While you already understand the importance of cybersecurity, the question now is how to stay one step ahead of cybercriminals.<\/p><p>At Exigo Tech, we work in partnership with you and adopt a proactive approach to tackle these threats. Our mission is to provide comprehensive and proactive cybersecurity solutions to protect your business, your data, and your reputation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bbbc10 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3bbbc10\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Threats Are Rising Rapidly- Are You Ready?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d701b4 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8d701b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 16px; text-align: var(--text-align);\" data-contrast=\"auto\">Various cyberattacks are not only a reality\u2014they are a constant challenge and staying ahead of these attacks means continuously enhancing your defences. Consider this:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-791c686 elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-image-carousel\" data-id=\"791c686\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;lazyload&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-01.webp\" alt=\"Illustration of a ransomware attack represented by a computer monitor with a dollar symbol locked by chains, highlighting the growing risk of cybercrimes.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong>Ransomware attacks will strike every 2 seconds by 2031,<\/strong><\/br> costing businesses billions annually. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-02.webp\" alt=\"Graphic depicting global connectivity and financial impact, emphasizing the $10.5 trillion annual cost of cybercrime by 2025.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\">Cybercrime costs will hit <strong>$10.5 trillion annually by 2025, <\/strong><\/br> more than the GDP of most countries. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-03.webp\" alt=\"Visual of a laptop with a target reticle, symbolizing the 43% of cyberattacks targeting small to medium-sized businesses.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong>43% of attacks target small to medium-sized businesses- <\/strong><\/br> don\u2019t think you are too small to be noticed. <\/figcaption><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-007480b elementor-hidden-desktop elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"007480b\" data-element_type=\"widget\" data-settings=\"{&quot;speed&quot;:1000,&quot;lazyload&quot;:&quot;yes&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-01.webp\" alt=\"Illustration of a ransomware attack represented by a computer monitor with a dollar symbol locked by chains, highlighting the growing risk of cybercrimes.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong>Ransomware attacks will strike every 2 seconds by 2031,<\/strong><\/br> costing businesses billions annually. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-02.webp\" alt=\"Graphic depicting global connectivity and financial impact, emphasizing the $10.5 trillion annual cost of cybercrime by 2025.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\">Cybercrime costs will hit <strong>$10.5 trillion annually by 2025, <\/strong><\/br> more than the GDP of most countries. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-03.webp\" alt=\"Visual of a laptop with a target reticle, symbolizing the 43% of cyberattacks targeting small to medium-sized businesses.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong>43% of attacks target small to medium-sized businesses- <\/strong><\/br> don\u2019t think you are too small to be noticed. <\/figcaption><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3842d41 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3842d41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Have You Reviewed These Key Vulnerabilities?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f2e39 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"74f2e39\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While you are already committed to cybersecurity, it\u2019s essential to regularly reassess and address potential vulnerabilities. Ask yourself:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6ff532 elementor-hidden-mobile elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"c6ff532\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-01-1024x256.webp\" alt=\"Are all your systems and software up-to-date to close off common access points?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-03-1024x256.webp\" alt=\"Have you implemented strong password policies to protect against unauthorised access?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-05-1024x256.webp\" alt=\"Is your team equipped with the knowledge to spot and avoid phishing scams?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-07-1024x256.webp\" alt=\"Are your remote work environments secured to minimise exposure?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53369e9 elementor-hidden-desktop elementor-hidden-tablet elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"53369e9\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-02.webp\" alt=\"Are all your systems and software up-to-date to close off common access points?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-04.webp\" alt=\"Have you implemented strong password policies to protect against unauthorised access?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-06.webp\" alt=\"Is your team equipped with the knowledge to spot and avoid phishing scams?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 4\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/02\/common-gaps-img-UPDATED-08.webp\" alt=\"Are your remote work environments secured to minimise exposure?\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e4d632 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6e4d632\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our experts at Exigo Tech work with you to identify and make these areas stronger, ensuring that your organisation remains well prepared for cyberattacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-645afbb e-flex e-con-boxed e-con e-parent\" data-id=\"645afbb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5ca0c19 e-con-full e-flex e-con e-child\" data-id=\"5ca0c19\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfe620 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3bfe620\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exigo Tech: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a50c0 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c7a50c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Your Trusted Cybersecurity Partner and A Shield Against Cyber Threats<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d67fb2 elementor-widget elementor-widget-text-editor\" data-id=\"8d67fb2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our mission is simple: To protect your business, data, and reputation through a comprehensive suite of cybersecurity solutions based on your unique needs. Our offerings include:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f8c132 e-grid e-con-full e-con e-child\" data-id=\"6f8c132\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6878ae elementor-widget elementor-widget-text-editor\" data-id=\"d6878ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>24\/7 Threat Detection and Response<\/strong><br \/>Identify and neutralise threats in real time, minimising downtime and damage.<\/li><li><strong>Penetration Testing<\/strong><br \/>Know hidden vulnerabilities before attackers can exploit them.<\/li><li><strong>Advanced Endpoint Security <\/strong><br \/>Protect all devices from malware, ransomware, and other sophisticated threats.<\/li><li><strong>Cloud Security <\/strong><br \/>Ensure your cloud environments are fully secure and compliant.<\/li><li><strong>Employee Training &amp; Phishing Simulations <\/strong><br \/>Reduce human error with regular, realistic simulations and awareness programs.<\/li><li><strong>Data Breaches <\/strong><br \/>Ensure your critical business information stays safe with advanced encryption and access control.<\/li><li><strong>24\/7 Security Operations Centre (SOC) <\/strong><br \/>Around-the-clock surveillance of your systems by certified cybersecurity professionals.<\/li><li><strong>Compliance Adherence <\/strong><br \/>Meet industry standards and avoid penalties with our compliance-focused solutions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe7c001 elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"fe7c001\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"757\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/Asset-2cybersec-LP-2025-768x757.webp\" class=\"attachment-medium_large size-medium_large wp-image-1497\" alt=\"Woman standing in a server room, representing Exigo Tech&#039;s comprehensive cybersecurity solutions.\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/Asset-2cybersec-LP-2025-768x757.webp 768w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/Asset-2cybersec-LP-2025-300x296.webp 300w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/Asset-2cybersec-LP-2025-1024x1009.webp 1024w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/Asset-2cybersec-LP-2025.webp 1534w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-533507e e-flex e-con-boxed e-con e-parent\" data-id=\"533507e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-65e7064 e-con-full e-flex e-con e-child\" data-id=\"65e7064\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd92a5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1cd92a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bonus: Managed Security as a Service (MSaaS)- A Powerful Cybersecurity Solution by Exigo Tech<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c741d1f elementor-widget elementor-widget-text-editor\" data-id=\"c741d1f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Exigo Tech offers Managed Security as a Service (MSaaS) offering, powered by leading technologies from Microsoft and eSentire. It provides businesses with 24\/7 protection and peace of mind. This service is designed to ensure your organisation stays ahead of threats while allowing you to focus on what matters most\u2014your business growth.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb098a9 elementor-widget elementor-widget-text-editor\" data-id=\"bb098a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>How Exigo Tech\u2019s MSaaS Works<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a285e05 elementor-widget elementor-widget-text-editor\" data-id=\"a285e05\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the core of Exigo Tech\u2019s MSaaS is a seamless integration of Microsoft\u2019s advanced security tools and eSentire\u2019s Managed Detection and Response (MDR) capabilities. Together, they deliver real-time monitoring, threat detection, and rapid response to secure your organisation from every angle. Whether it\u2019s safeguarding endpoints, networks, or cloud environments, Exigo Tech\u2019s MSaaS is delivered to meet your business needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-744c87c e-flex e-con-boxed e-con e-parent\" data-id=\"744c87c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6432447 e-con-full e-flex e-con e-child\" data-id=\"6432447\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72a4f13 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"72a4f13\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose Exigo Tech for Your Cybersecurity?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b455938 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b455938\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We believe that cybersecurity isn\u2019t just a one-size-fits-all solution. At Exigo Tech, we work closely with you to build a strong cybersecurity framework by understanding your challenges first.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2aaf219 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"2aaf219\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d5b71fa e-flex e-con-boxed e-con e-child\" data-id=\"d5b71fa\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec32681 elementor-widget__width-initial elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"ec32681\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;autoplay_speed&quot;:3500,&quot;lazyload&quot;:&quot;yes&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-.webp\" alt=\"Cybersecurity professional presenting a security posture assessment to a team in a tech environment.\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-2.webp\" alt=\"Two cybersecurity professionals strategizing in a control room, emphasizing proactive defense measures.\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-3.webp\" alt=\"Team discussing a tailored cybersecurity plan, reflecting personalized protection strategies for businesses.\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-4.webp\" alt=\"Cybersecurity professionals reviewing data on a tablet, demonstrating 24\/7 monitoring and adaptive strategies.\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-5.webp\" alt=\"Certified cybersecurity professional providing consultation, showcasing expertise and trust in cybersecurity services.\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-left\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zM142.1 273l135.5 135.5c9.4 9.4 24.6 9.4 33.9 0l17-17c9.4-9.4 9.4-24.6 0-33.9L226.9 256l101.6-101.6c9.4-9.4 9.4-24.6 0-33.9l-17-17c-9.4-9.4-24.6-9.4-33.9 0L142.1 239c-9.4 9.4-9.4 24.6 0 34z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm113.9 231L234.4 103.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L285.1 256 183.5 357.6c-9.4 9.4-9.4 24.6 0 33.9l17 17c9.4 9.4 24.6 9.4 33.9 0L369.9 273c9.4-9.4 9.4-24.6 0-34z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8618793 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"8618793\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-60518bb e-flex e-con-boxed e-con e-child\" data-id=\"60518bb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8045e4c elementor-widget__width-initial elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"8045e4c\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;autoplay_speed&quot;:3500,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-6.webp\" alt=\"why-choose-carousel-cybersecurity2025-6\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-7.webp\" alt=\"why-choose-carousel-cybersecurity2025-7\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-8.webp\" alt=\"why-choose-carousel-cybersecurity2025-8\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-9.webp\" alt=\"why-choose-carousel-cybersecurity2025-9\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/why-choose-carousel-cybersecurity2025-10.webp\" alt=\"why-choose-carousel-cybersecurity2025-10\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-left\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zM142.1 273l135.5 135.5c9.4 9.4 24.6 9.4 33.9 0l17-17c9.4-9.4 9.4-24.6 0-33.9L226.9 256l101.6-101.6c9.4-9.4 9.4-24.6 0-33.9l-17-17c-9.4-9.4-24.6-9.4-33.9 0L142.1 239c-9.4 9.4-9.4 24.6 0 34z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm113.9 231L234.4 103.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L285.1 256 183.5 357.6c-9.4 9.4-9.4 24.6 0 33.9l17 17c9.4 9.4 24.6 9.4 33.9 0L369.9 273c9.4-9.4 9.4-24.6 0-34z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09e210b e-flex e-con-boxed e-con e-parent\" data-id=\"09e210b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-161e3b4 elementor-widget elementor-widget-heading\" data-id=\"161e3b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Cost of Doing Nothing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8286c0b elementor-widget elementor-widget-text-editor\" data-id=\"8286c0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ignoring cybersecurity risks can lead to:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd00abc elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-image-carousel\" data-id=\"cd00abc\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;lazyload&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-2-04.webp\" alt=\"Shield icon with a dollar symbol, representing the $4.88 million average cost of a data breach in 2024.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong>$4.88 million: <\/strong> <\/br>The average cost of a data breach in 2024. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-2-05.webp\" alt=\"Hand holding a warning card, symbolizing the risk of permanent reputational damage from cybersecurity failures.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong> Permanent reputational damage, <\/strong> <\/br>taking your customers and partners away. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-2-06.webp\" alt=\"Building with a lock icon and 60% text, illustrating the statistic that 60% of small businesses close within 6 months of a cyberattack.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong> 60% of small businesses <\/strong> <\/br>shut down within 6 months of an attack. <\/figcaption><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b50a0f7 elementor-hidden-desktop elementor-widget elementor-widget-image-carousel\" data-id=\"b50a0f7\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;lazyload&quot;:&quot;yes&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-2-04.webp\" alt=\"Shield icon with a dollar symbol, representing the $4.88 million average cost of a data breach in 2024.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong>$4.88 million: <\/strong> <\/br>The average cost of a data breach in 2024. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-2-05.webp\" alt=\"Hand holding a warning card, symbolizing the risk of permanent reputational damage from cybersecurity failures.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong> Permanent reputational damage, <\/strong> <\/br>taking your customers and partners away. <\/figcaption><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/01\/cyber-sec-icons-2025-2-06.webp\" alt=\"Building with a lock icon and 60% text, illustrating the statistic that 60% of small businesses close within 6 months of a cyberattack.\" \/><div class=\"swiper-lazy-preloader\"><\/div><figcaption class=\"elementor-image-carousel-caption\"><strong> 60% of small businesses <\/strong> <\/br>shut down within 6 months of an attack. <\/figcaption><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2572055 elementor-widget elementor-widget-text-editor\" data-id=\"2572055\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b style=\"color: #000080; font-style: inherit; text-align: var(--text-align);\">Can your business afford to take this risk? Obviously NO!<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f40236 e-flex e-con-boxed e-con e-parent\" data-id=\"7f40236\" data-element_type=\"container\" id=\"register-form\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e2e56c elementor-widget elementor-widget-heading\" data-id=\"6e2e56c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let\u2019s Work Together for a Secure Tomorrow<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca09f9 elementor-widget elementor-widget-text-editor\" data-id=\"1ca09f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With Exigo Tech by your side, you can focus on innovation and growth, knowing that your business is protected by a strong cybersecurity framework. We are here to help you move confidently into the future, tackling cybersecurity challenges effectively.<\/p><p>Partner with Exigo Tech today and take the next step toward building a resilient cybersecurity framework.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54b271e elementor-widget elementor-widget-heading\" data-id=\"54b271e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Stay One Step Ahead of Cyber Threats<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd4bcea elementor-widget elementor-widget-text-editor\" data-id=\"bd4bcea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<iframe frameBorder=\"0\" id=a904b3ba-06cc-4e7a-b484-0130e4502791 scrolling=\"no\"><\/iframe><script>var sandboxSrc = \"https:\/\/c70f24be186b4e939b89419f4aee913d.svc.dynamics.com\/t\/formsandbox\/YUURKjfXy5TgbeVzwwenpw6zdPTLIxYKcemyqxjtkVg\/91447c8c-2ddd-ef11-8eea-00224812e606?ad=\" + encodeURIComponent(document.location.toString()); document.getElementById('a904b3ba-06cc-4e7a-b484-0130e4502791').setAttribute('src', sandboxSrc); <\/script>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33e673d e-flex e-con-boxed e-con e-parent\" data-id=\"33e673d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63fd626 e-con-full e-flex e-con e-child\" data-id=\"63fd626\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c428bbe elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c428bbe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-495bcf8 elementor-widget elementor-widget-text-editor\" data-id=\"495bcf8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><a href=\"https:\/\/exigotech.co\/au\/services\/artificial-intelligence\">AI<\/a><\/b>\u00a0 |\u00a0 <b><a href=\"https:\/\/exigotech.co\/au\/services\/delivery-model\">Managed Services<\/a>\u00a0<\/b> |\u00a0 <a href=\"https:\/\/exigotech.co\/au\/services\/infrastructure\"><b>Infrastructure<\/b>\u00a0 <\/a>|\u00a0 <a href=\"https:\/\/exigotech.co\/au\/services\/networks\"><b>Networks<\/b>\u00a0 <\/a>|\u00a0 <a href=\"https:\/\/exigotech.co\/au\/services\/cloud\"><b>Cloud<\/b>\u00a0 <\/a>|\u00a0 <a href=\"https:\/\/exigotech.co\/au\/services\/business-applications\"><b>Application<\/b>\u00a0 <\/a>|\u00a0 <b><a href=\"https:\/\/exigotech.co\/au\/services\/security\">Security<\/a><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90502f3 e-flex e-con-boxed e-con e-parent\" data-id=\"90502f3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d777915 e-con-full e-flex e-con e-child\" data-id=\"d777915\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65aa599 elementor-widget elementor-widget-image\" data-id=\"65aa599\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/company\/exigotech\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/ICON-LINKEDIN-WEBP-qvms56a5o1x4hsbc1fcrihgktx8u6gm7e5z03k2ykw.webp\" title=\"ICON-LINKEDIN&#8211;WEBP\" alt=\"linkedin\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a349e75 e-con-full e-flex e-con e-child\" data-id=\"a349e75\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6bcb1d elementor-widget elementor-widget-image\" data-id=\"e6bcb1d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/exigotech\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/ICON-FACEBOOK-WEBP-qvms54ehadujuke2cejidhxnn5i3r2eqpwo1505qxc.webp\" title=\"ICON-FACEBOOK&#8211;WEBP\" alt=\"facebook\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b20cc6c e-con-full e-flex e-con e-child\" data-id=\"b20cc6c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba7eee7 elementor-widget elementor-widget-image\" data-id=\"ba7eee7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/ExigoTechPtyLtd\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/TWITTER-X-copy-WEBP-qvms577zuvyete9yvxre2z81fb47e5pxqamhku1keo.webp\" title=\"TWITTER-X copy-WEBP\" alt=\"x\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc0a8ce e-con-full e-flex e-con e-child\" data-id=\"cc0a8ce\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-565828f elementor-widget elementor-widget-text-editor\" data-id=\"565828f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"color: #4e4e4e; font-family: 'Be Vietnam Pro', sans-serif; font-size: 14px; text-align: center;\">\u00a9 Copyright 2025 Exigo Tech. All Rights Reserved<\/span><br style=\"font-family: 'Be Vietnam Pro', sans-serif; color: #4e4e4e; font-size: 14px; text-align: center;\" \/><a style=\"margin: 0px; padding: 0px; border: 0px; outline: 0px; font-size: 14px; text-size-adjust: 100%; vertical-align: baseline; background: #f3f3fd; color: #4e4e4e; font-family: &#039;Be Vietnam Pro&#039;, sans-serif; transition-duration: 0.4s; transition-timing-function: ease-in-out; transition-property: all; font-weight: bold;\" href=\"https:\/\/exigotech.co\/privacy-policy\" data-wpel-link=\"internal\">Privacy Policy |<\/a><span style=\"color: #4e4e4e; font-family: 'Be Vietnam Pro', sans-serif; font-size: 14px;\">\u00a0<\/span><a style=\"margin: 0px; padding: 0px; border: 0px; outline: 0px; font-size: 14px; text-size-adjust: 100%; vertical-align: baseline; background: #f3f3fd; color: #4e4e4e; font-family: &#039;Be Vietnam Pro&#039;, sans-serif; transition-duration: 0.4s; transition-timing-function: ease-in-out; transition-property: all; font-weight: bold;\" href=\"https:\/\/exigotech.co\/terms-conditions\" data-wpel-link=\"internal\">Terms &amp; Conditions |<\/a><span style=\"color: #4e4e4e; font-family: 'Be Vietnam Pro', sans-serif; font-size: 14px;\">\u00a0<\/span><a style=\"margin: 0px; padding: 0px; border: 0px; outline: 0px; font-size: 14px; text-size-adjust: 100%; vertical-align: baseline; background: #f3f3fd; color: #4e4e4e; font-family: &#039;Be Vietnam Pro&#039;, sans-serif; transition-duration: 0.4s; transition-timing-function: ease-in-out; transition-property: all; font-weight: bold;\" href=\"https:\/\/exigotech.co\/service-agreement\" data-wpel-link=\"internal\">Master Service Agreement<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secure Your Business with Exigo Tech\u2019s Cybersecurity Solutions Cyber threats are real and growing\u2013 Protect your business today Register Now [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1492,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"disabled","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"disabled","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"disabled","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1403","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/1403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/comments?post=1403"}],"version-history":[{"count":86,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/1403\/revisions"}],"predecessor-version":[{"id":2234,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/1403\/revisions\/2234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/media\/1492"}],"wp:attachment":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/media?parent=1403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}