{"id":2601,"date":"2025-11-26T06:35:13","date_gmt":"2025-11-26T06:35:13","guid":{"rendered":"https:\/\/exigotech.co\/lp\/?page_id=2601"},"modified":"2025-11-26T07:14:43","modified_gmt":"2025-11-26T07:14:43","slug":"msaas-2","status":"publish","type":"page","link":"https:\/\/exigotech.co\/lp\/msaas-2\/","title":{"rendered":"MSaas -2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2601\" class=\"elementor elementor-2601\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d712d5 e-con-full e-flex e-con e-parent\" data-id=\"9d712d5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8ba8bb0 e-grid e-con-full e-con e-child\" data-id=\"8ba8bb0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ecefcc elementor-widget__width-inherit elementor-widget elementor-widget-html\" data-id=\"0ecefcc\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<html data-template-id=\"39e767da-a428-42e4-adbe-01382d5da2ee\"><head>\r\n    <meta name=\"type\" value=\"marketing-designer-content-editor-document\" type=\"xrm\/designer\/setting\">\r\n    <meta type=\"xrm\/designer\/setting\" name=\"layout-editable\" value=\"marketing-designer-layout-editable\">\r\n    <meta type=\"xrm\/designer\/setting\" name=\"layout-max-width\" value=\"1024px\" datatype=\"text\" label=\"Layout max width\">\r\n    <meta type=\"xrm\/designer\/setting\" name=\"font-family\" value=\"Segoe UI\" datatype=\"font\" label=\"Font Family\">\r\n    <meta type=\"xrm\/designer\/setting\" name=\"body-text-size\" value=\"14px\" datatype=\"text\" label=\"Body Font Size\">\r\n    <meta type=\"xrm\/designer\/setting\" name=\"body-text-color\" value=\"#33435C\" datatype=\"color\" label=\"Body Text Color\">\r\n    <title>\r\n        Exigo Tech's: Managed Security as a Service\r\n    <\/title>\r\n    <style>\r\n    body {\r\n        font-family: Segoe UI;\r\n        font-size: 14px;\r\n        color: #001433;\r\n        background-color:#f4f4f4;\r\n    }\r\n    \r\n ol li {\r\n        margin: 0;\r\n        padding: 0;\r\n        text-indent: -1em; \/* Negative value to align text with bullet *\/\r\n        margin-left: 1em; \/* Adjust as needed *\/\r\n    }\r\n\r\n.box {\r\n  display: flex!important;\r\n  align-items: center!important;\r\n  justify-content: center!important;\r\n}\r\n\r\n    p.compact {\r\n        margin: 0;\r\n        padding: 0\r\n    }\r\n    \r\n    [data-layout=true] {\r\n        margin: 0 auto;\r\n        max-width: \/* @layout-max-width *\/ 1024px \/* @layout-max-width *\/;\r\n    }\r\n    \r\n    @media only screen and (max-width:768px) {\r\n        .columnContainer {\r\n            width: 100%!important;\r\n            padding: 10px 0!important\r\n        }\r\n\r\n        img#optionalstuff {\r\n    display: none!important;}\r\n    }\r\n    \r\n    .hide-mobile\r\n{\r\n    display: none!important;\r\n}\r\n\r\n\r\n\r\n\r\n\r\n@media only screen and (min-width: 700px) {\r\n    .hide-mobile\r\n    {\r\n        display: block!important;\r\n        height:0%!important;\r\n    }\r\n\r\n\r\n}\r\n\r\n\r\n    .linksSection {\r\n        display: flex;\r\n        justify-content: center;\r\n        flex-wrap: wrap\r\n    }\r\n\r\n\r\n.forceVertCenter {\r\n  display: flex;\r\n  align-items: center!important;\r\n  justify-content: center;\r\n}\r\n\r\n.boxarea {\r\n    border: 0px solid #4c48e3;\r\n    box-shadow: 0px 0px 20px #999;\r\n}\r\n\r\n    <\/style>\r\n<\/head>\r\n\r\n<body><div data-layout=\"true\" class=\"boxarea\">\r\n        <header>\r\n            \r\n            \r\n            <div data-section=\"true\" style=\"padding: 20px 5%; background-color: rgb(250, 249, 248); background-image: url('https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/09\/msaas-bg.jpg'); background-repeat: no-repeat; background-size: cover; background-position: center center;\" class=\"\">\r\n                <div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\">\r\n                    <div style=\"clear:both\"><\/div>\r\n                   \r\n                    \r\n                    \r\n              <div data-container=\"true\" class=\"box columnContainer\" data-container-width=\"50\" style=\"display: block; min-height: 70px; min-width: 15px; width: calc(50% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px;           word-wrap: break-word; word-break: break-word;          word-wrap: break-word; word-break: break-word; border-radius: 0px;\">\r\n  \r\n  <div data-editorblocktype=\"Text\" style=\"padding-bottom: 15px; text-align: left;\">\r\n    <p class=\"compact\" style=\"text-align: left;\"><span style=\"color:#ffffff;\"><span style=\"font-size:36px;\"><b>Cybersecurity Threats Are Closer Than You Think: Be Aware, Be Safe, Be Secure<\/b><\/span><\/span><\/p>\r\n\r\n<p class=\"compact\" style=\"text-align: left;\"><span style=\"color:#ffffff;\"><span style=\"font-size: 22px;\">Protect Your Small or Medium-Sized Business from Hidden Dangers<\/span> <\/span><\/p>\r\n\r\n    \r\n    \r\n  <\/div><div data-editorblocktype=\"Image\" style=\"margin-top: 20px;\"><div align=\"Left\" class=\"imageWrapper\" display=\"inline-block\" style=\"display: inline-block;\" width=\"100%\"><a href=\"https:\/\/exigotech.powerappsportals.com\/Managed%20Security\/\" title=\"https:\/\/exigotech.powerappsportals.com\/Managed%20Security\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"Get Our MSaaS Solution\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/09\/get-our-solution-btn.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px auto 0px 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px; float: left;\"><\/a><\/div>\r\n\r\n\r\n\r\n<\/div>\r\n  \r\n  \r\n  \r\n  \r\n  \r\n<\/div>\r\n\r\n <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"50\" style=\"display: block; min-height: 70px; min-width: 15px; width: calc(50% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;                   word-wrap: break-word; word-break: break-word;                  word-wrap: break-word; word-break: break-word; margin-top: 20px; ;\">\r\n                        \r\n                        \r\n\r\n \r\n                                                \r\n                        \r\n                        \u200b\u200b\u200b\u200b\u200b\u200b\u200b\r\n                    \r\n                        \r\n                    <grammarly-extension data-grammarly-shadow-root=\"true\" class=\"dnXmp\" style=\"position: absolute; top: 0px; left: 0px; pointer-events: none;\"><\/grammarly-extension><grammarly-extension data-grammarly-shadow-root=\"true\" class=\"dnXmp\" style=\"position: absolute; top: 0px; left: 0px; pointer-events: none;\"><\/grammarly-extension><\/div>\r\n<div style=\"clear:both\"><\/div><\/div>\r\n            <\/div>\r\n            <div data-section=\"true\" style=\"padding: 10px; background-color: rgb(255, 255, 255);\" class=\"\">\r\n                <div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\">\r\n                    <div style=\"clear:both\"><\/div>\r\n                    <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"100\" style=\"display: block; min-height: 70px; min-width: 17.5px; width: calc(100% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; margin: 0px;\">\r\n                        \r\n                        \r\n                        \r\n                    <div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: left;\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family: Aptos, sans-serif; line-height: 107%;\"><span style=\"font-family: Calibri, sans-serif; line-height: 107%;\"><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; line-height: 107%;\"><span style=\"font-size: 18px; line-height: 150%;\">When you hear about data breaches, the news often highlights large companies with massive amounts of customer data or financial records. But what about the countless small and medium-sized businesses (SMBs) that face similar threats every day? You might think that your business is less likely to be targeted by cybercriminals, but the reality is quite different. SMBs are often seen as easy targets due to limited resources and smaller security teams.&nbsp;<\/span><\/span><\/span><\/span><\/span><\/span><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"font-size:16px;\"><span style=\"text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"text-align: center; line-height: 107%;\"><span lang=\"EN-IN\" style=\"text-align: center; line-height: 107%;\"> <\/span><\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\">\r\n<div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n<table role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div><div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" style=\"\">\r\n    <img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/08\/Did-you-know-MSaaS-updated2.gif\" style=\"max-height: 100%; max-width: 100%;width:100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px;\"><\/div>\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\">\r\n    <div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n\r\n\r\n\r\n\r\n<table role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td>\r\n\t\t\t<p><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: left;\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family: Aptos, sans-serif; line-height: 107%;\"><span style=\"font-family: Calibri, sans-serif; line-height: 107%;\"><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; line-height: 107%;\"><span style=\"font-size: 18px; line-height: 150%;\"><br>These statistics highlight the urgent need for SMBs to prioritise cybersecurity. Ignoring these threats could mean devastating consequences for your business. Despite this, many smaller businesses can be just as secure as larger ones by understanding the risks and taking proactive measures.<\/span><\/span><\/span><\/span><\/span><\/span><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"font-size:16px;\"><span style=\"text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"text-align: center; line-height: 107%;\"><span lang=\"EN-IN\" style=\"text-align: center; line-height: 107%;\"> <\/span><\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                    \r\n                <div style=\"clear:both\"><\/div><\/div>\r\n            <\/div>\r\n        <\/header>\r\n        <div data-section=\"true\" style=\"padding: 20px 10px 10px; background-color: rgb(244, 244, 254);\" class=\"\"><div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"containerWrapper\">\r\n                        <div style=\"clear:both;\"><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"100\" style=\"display: block; min-height: 70px; min-width: 20px; width: calc(100% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;                             word-wrap: break-word; word-break: break-word;                            word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Text\" style=\"padding-bottom: 10px;\">\r\n                            <p class=\"compact\"><span style=\"font-size:28px;\"><span style=\"text-align: center;\"><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; text-align: center;\"><span style=\"text-align: center;\"><span class=\"NormalTextRun SCXW241888226 BCX8\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 700; letter-spacing: normal; orphans: 2; text-align: center; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: pre-wrap; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\">What Are Cybercriminals After?&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Text\" style=\"\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"font-size:18px;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">It's not just payment data that attackers are after anymore. Cybercriminals are expanding their reach, targeting a range of data types that can disrupt your operations, harm your reputation, and result in significant financial losses. Consider the following:<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><\/div>\r\n                        <div style=\"clear:both;\"><\/div>\r\n                    <\/div><\/div><main>\r\n            \r\n            \r\n            <div data-section=\"true\" style=\"padding: 10px; background-color: rgb(244, 244, 254);\" class=\"\"><div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"containerWrapper\">\r\n                        <div style=\"clear:both;\"><\/div>\r\n                        \u200b\u200b\u200b\u200b\u200b\u200b\u200b<div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33.33\" style=\"display: block; min-height: 70px; min-width: 13.3333px; width: calc(33.33% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px 20px; float: left;  word-wrap: break-word; word-break: break-word; word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/001.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px; width: 200px;\" width=\"200\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:20px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><strong>Personal Data:&nbsp;<\/strong><\/span><\/span><\/p>\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Information like names, addresses, and social security numbers are prime targets for identity theft.&nbsp;<\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33.33\" style=\"display: block; min-height: 70px; min-width: 13.3333px; width: calc(33.33% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px 20px; float: left;  word-wrap: break-word; word-break: break-word; word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/002.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px; width: 200px;\" width=\"200\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:20px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><strong>Corporate Data:<\/strong><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Proprietary business information, strategic plans, and intellectual property are lucrative targets for competitors and state-sponsored actors.&nbsp;<\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33.33\" style=\"display: block; min-height: 70px; min-width: 13.3333px; width: calc(33.33% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px 20px; float: left;  word-wrap: break-word; word-break: break-word; word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/03.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px; width: 200px;\" width=\"200\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:20px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><strong>Medical Records:<\/strong><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Health data is extremely sensitive that can be sold on the black market and can be used for insurance fraud.&nbsp;<\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div style=\"clear:both;\"><\/div>\r\n                    <\/div><\/div><div data-section=\"true\" style=\"padding: 10px 200px 20px; background-color: rgb(244, 244, 254);\" class=\"emptyContainer\"><div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"containerWrapper\">\r\n                        <div style=\"clear:both;\"><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"50\" style=\"display: block; min-height: 70px; min-width: 15px; width: calc(50% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px 20px; float: left;  word-wrap: break-word; word-break: break-word; word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/004.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px; width: 200px;\" width=\"200\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><strong><span style=\"font-size:20px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Confidential Data:&nbsp;<\/span><\/span><\/strong><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Information about your business operations that can be leveraged in ransomware attacks and used to disrupt business processes.&nbsp;<\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"50\" style=\"display: block; min-height: 70px; min-width: 15px; width: calc(50% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px 10px 10px 20px; float: left;  word-wrap: break-word; word-break: break-word; word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/005.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px; width: 200px;\" width=\"200\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><strong><span style=\"font-size:20px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Private Communications:<\/span><\/span><\/strong><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"text-align: center;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\">Hackers can exploit confidential communications for blackmail or public exposure.&nbsp;<\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div style=\"clear:both;\"><\/div>\r\n                    <\/div><\/div><div data-section=\"true\" style=\"padding: 20px 10px; background-color: rgb(255, 255, 255);\" class=\"\"><div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"containerWrapper\">\r\n                        <div style=\"clear:both;\"><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"50\" style=\"display: block; min-height: 70px; min-width: 15px; width: calc(50% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;       word-wrap: break-word; word-break: break-word;      word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\">\r\n                            <div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n<table role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td style=\"margin: 0px; padding: 0px; vertical-align: top; border-bottom: 3px solid rgb(255, 255, 255);\">\r\n\t\t\t<p style=\"margin: 0px; padding: 0px; line-height: 0px; width: 100%;\"><span><!--[if gte mso 9]><br\/><![endif]-->&nbsp;<\/span><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"padding-bottom: 10px;\">\r\n                            <p class=\"compact\"><span style=\"font-size:28px;\"><span style=\"text-align: center;\"><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; text-align: center;\"><span style=\"text-align: center;\"><span class=\"NormalTextRun SCXW241888226 BCX8\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 700; letter-spacing: normal; orphans: 2; text-align: center; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: pre-wrap; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\">Why SMBs Are Prime Targets<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Text\" style=\"\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">Unfortunately, many SMBs believe they are too small to be targeted. This mindset can lead to inadequate security measures, leaving businesses exposed. And this is the perfect invitation for cybercriminals to cause havoc. They know that smaller businesses often lack the robust defences of larger enterprises, making them easier to breach and the rise of Ransomware-as-a-Service (RaaS) is a testament to this.&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n<p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><br><\/p>\r\n\r\n<p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">The truth is that cybercriminals are getting more sophisticated, and the tools they use to exploit vulnerabilities are becoming more accessible. No business is too small or large to escape their threat.&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"50\" style=\"display: block; min-height: 70px; min-width: 15px; width: calc(50% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;       word-wrap: break-word; word-break: break-word;      word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/09\/msass-box.gif\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px;\"><\/div>\r\n\r\n\r\n<\/div><\/div>\r\n                        <div style=\"clear:both;\"><\/div>\r\n                    <\/div><\/div><div data-section=\"true\" style=\"padding: 20px 10px; background-color: rgb(244, 244, 254);\" class=\"\"><div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"containerWrapper\">\r\n                        <div style=\"clear:both;\"><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"100\" style=\"display: block; min-height: 70px; min-width: 20px; width: calc(100% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;      word-wrap: break-word; word-break: break-word;     word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Text\" style=\"padding-bottom: 10px;\">\r\n                            <p class=\"compact\"><span style=\"font-size:28px;\"><span style=\"text-align: center;\"><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; text-align: center;\"><span style=\"text-align: center;\"><span class=\"NormalTextRun SCXW241888226 BCX8\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; font-style: normal; font-variant-ligatures: none; font-variant-caps: normal; font-weight: 700; letter-spacing: normal; orphans: 2; text-align: center; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: pre-wrap; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\">What\u2019s Next? Take Proactive Actions to Secure Your Business&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Text\" style=\"\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">It\u2019s time to take control of your business\u2019s future. Understanding the risks is only the first step towards better cybersecurity; the next is taking action. Comprehensive cybersecurity measures are no longer a luxury; they are crucial if you don\u2019t want your business to become another statistic.&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\"><div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 15px; padding-bottom: 5px;\">\r\n<table role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td style=\"margin: 0px; padding: 0px; vertical-align: top; border-bottom: 3px solid rgb(244, 244, 254);\">\r\n\t\t\t<p style=\"margin: 0px; padding: 0px; line-height: 0px; width: 100%;\"><span><!--[if gte mso 9]><br\/><![endif]-->&nbsp;<\/span><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px;padding-top:15px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-size:22px;\"><strong><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">The Bright Side &nbsp;<\/span><\/span><\/span><\/span><\/strong><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Divider\" style=\"margin: 0px 0px 5px;\"><div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n<table role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td style=\"margin: 0px; padding: 0px; vertical-align: top; border-bottom: 3px solid rgb(244, 244, 254);\">\r\n\t\t\t<p style=\"margin: 0px; padding: 0px; line-height: 0px; width: 100%;\"><span><!--[if gte mso 9]><br\/><![endif]-->&nbsp;<\/span><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">The good news is that top-tier security is not out of reach. Exigo Tech has partnered with Microsoft and eSentire to bring you an enterprise-level security solution with zero upfront cost. &nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n<p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><br><\/p>\r\n\r\n<p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;                          word-wrap: break-word; word-break: break-word;                         word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px;\"><span style=\"font-size:16px;\"><span style=\"font-family:Segoe UI,Frutiger,Helvetica Neue,Arial,sans-serif;\"><span style=\"line-height:107%\"><span style=\"line-height: 107%;\"><span style=\"line-height: 107%;\">Our Managed Security as a Service (MSaaS) offering combines innovative technology with expert support, ensuring that your business is protected from evolving threats without the complexity and cost of managing it on your own.&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\"><div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<table class=\"\" role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td style=\"margin: 0px; padding: 0px; vertical-align: top; border-bottom: 3px solid rgb(244, 244, 254);\">\r\n\t\t\t<p style=\"margin: 0px; padding: 0px; line-height: 0px; width: 100%;\"><span><!--[if gte mso 9]><br\/><![endif]-->&nbsp;<\/span><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\">\r\n<a href=\"https:\/\/exigotech.powerappsportals.com\/Managed%20Security\/\" title=\"https:\/\/exigotech.powerappsportals.com\/Managed%20Security\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"Get Our MSaaS Solution\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/09\/get-our-solution-btn.png\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px;align: center;margin-left: auto;margin-right: auto;float: none;\"><\/a>\r\n<div class=\"clear\" style=\"clear: both;\r\n                     height: 0px;\r\n                     width: 0px;\"><\/div>\r\n\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div style=\"clear:both;\"><\/div>\r\n                    <\/div><\/div>\r\n            \r\n                    \r\n                    \r\n                    \r\n                    \r\n                    \r\n                    \r\n                    \r\n                    \r\n                    <div data-section=\"true\" style=\"padding: 0px 10px; background-color: rgb(35, 34, 34); background-image: url(&quot;https:\/\/exigotech.co\/wp-content\/uploads\/2024\/09\/black-light-bg.webp&quot;); background-repeat: no-repeat; background-size: cover; background-position: center center;\" class=\"\">\r\n                <div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\">\r\n                    <div style=\"clear:both\"><\/div>\r\n                    <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33\" style=\"display: block; min-height: 70px; min-width: 12.5px; width: calc(33% + 0px); box-sizing: border-box; flex-direction: column; padding: 0px 10px; float: left;    word-wrap: break-word; word-break: break-word;   word-wrap: break-word; word-break: break-word;\">\r\n                        \r\n                    <div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" height=\"210.89100000000002\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/09\/security-accent-image-fixed.webp\" style=\"max-height: 100%; max-width: 100%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; height: 210.891px; width: 246.781px; top: 0px; left: 0px;\" width=\"246\"><\/div>\r\n\r\n\r\n<\/div><\/div>\r\n                    \r\n                <div data-container=\"true\" class=\"columnContainer\" style=\"display: block; min-height: 70px; min-width: 17.5px; width: calc(67% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px 50px 10px 10px; float: left;   word-wrap: break-word; word-break: break-word;  word-wrap: break-word; word-break: break-word;\" data-container-width=\"67\"><div data-editorblocktype=\"Text\" style=\"text-align: center;\"><p style=\"margin-bottom: 11px; text-align: right;\"><br><\/p>\r\n\r\n<p style=\"margin-bottom: 11px; text-align: right;\"><span style=\"font-size:20px;\"><span style=\"text-align: center;\"><span style=\"color: rgb(255, 255, 255); text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"font-family: Aptos, sans-serif; line-height: 107%; text-align: center;\">At Exigo Tech, we understand the unique challenges SMBs face in cybersecurity. Our Managed Security as a Service (MSaaS) offering is the perfect solution to provide the protection you need without the overhead of an in-house team.&nbsp;<\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div><div style=\"clear:both\"><\/div><\/div>\r\n            <\/div>\r\n\r\n\r\n<div data-section=\"true\" style=\"padding: 10px; background-color: rgb(255, 255, 255);\" class=\"emptyContainer\"><div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"containerWrapper\">\r\n                        <div style=\"clear:both;\"><\/div>\r\n                        <div data-container=\"true\" class=\"columnContainer\" data-container-width=\"100\" style=\"display: block; min-height: 70px; min-width: 20px; width: calc(100% + 0px); box-sizing: border-box; flex-direction: column; padding: 10px; float: left;   word-wrap: break-word; word-break: break-word;  word-wrap: break-word; word-break: break-word;\">\r\n                        <div data-editorblocktype=\"Text\" style=\"text-align: center;\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;   word-wrap: break-word; word-break: break-word;  word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px; text-align: center;\"><span style=\"font-size:26px;\"><span style=\"text-align: center;\"><strong><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"line-height: 107%; text-align: center;\">Our Services<\/span><\/span><\/span><\/span><\/strong><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\"><div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n<table role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td style=\"margin: 0px; padding: 0px; vertical-align: top; border-bottom: 3px solid rgb(255, 255, 255);\">\r\n\t\t\t<p style=\"margin: 0px; padding: 0px; line-height: 0px; width: 100%;\"><span><!--[if gte mso 9]><br\/><![endif]-->&nbsp;<\/span><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n<\/div><div data-editorblocktype=\"Text\" style=\"text-align: center;\">\r\n                            <p class=\"Paragraph SCXW62685842 BCX8\" paraeid=\"{fb793ddc-2dfe-4695-96a3-2bbe418deb23}{207}\" paraid=\"442500917\" style=\"margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent;   word-wrap: break-word; word-break: break-word;  word-wrap: break-word; word-break: break-word; white-space: pre-wrap; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-indent: 0px; text-align: center;\"><span style=\"font-size:20px;\"><span style=\"text-align: center;\"><span style=\"font-family: &quot;Segoe UI&quot;, Frutiger, &quot;Helvetica Neue&quot;, Arial, sans-serif; text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><span style=\"line-height: 107%; text-align: center;\"><a href=\"https:\/\/exigotech.co\/au\/services\/artificial-intelligence\" style=\"line-height: 107%;\">AI<\/a> &nbsp;| &nbsp;<a href=\"https:\/\/exigotech.co\/au\/services\/delivery-model\" style=\"line-height: 107%;\">Managed Services<\/a> &nbsp;| &nbsp;<a href=\"https:\/\/exigotech.co\/au\/services\/infrastructure\" style=\"line-height: 107%;\">Infrastructure &nbsp;<\/a>| &nbsp;<a href=\"https:\/\/exigotech.co\/au\/services\/networks\">Networks<\/a> &nbsp;| &nbsp;<a href=\"https:\/\/exigotech.co\/au\/services\/cloud\">Cloud<\/a> &nbsp;| &nbsp;<a href=\"https:\/\/exigotech.co\/au\/services\/business-applications\">Application<\/a> &nbsp;| &nbsp;<a href=\"https:\/\/exigotech.co\/au\/services\/security\">Security<\/a><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                        <\/div><div data-editorblocktype=\"Divider\" style=\"margin: 5px 0px;\"><div align=\"center\" class=\"dividerWrapper\" style=\"padding-top: 5px; padding-bottom: 5px;\">\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<table class=\"\" role=\"presentation\" style=\"padding: 0px; margin: 0px; width: 100%\">\r\n\t<tbody>\r\n\t\t<tr style=\"padding: 0px;\">\r\n\t\t\t<td style=\"margin: 0px; padding: 0px; vertical-align: top; border-bottom: 3px solid rgb(255, 255, 255);\">\r\n\t\t\t<p style=\"margin: 0px; padding: 0px; line-height: 0px; width: 100%;\"><span><!--[if gte mso 9]><br\/><![endif]-->&nbsp;<\/span><\/p>\r\n\t\t\t<\/td>\r\n\t\t<\/tr>\r\n\t<\/tbody>\r\n<\/table>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<\/div><\/div>\r\n                        <div style=\"clear:both;\"><\/div>\r\n                    <\/div><\/div><div data-section=\"true\" style=\"padding: 10px; background-color: rgb(75, 75, 222);\" class=\"\">\r\n                <div style=\"display: flex;\r\n            width: 100%;\r\n        ;flex-wrap: wrap;\" class=\"forceVertCenter\">\r\n                    <div style=\"clear:both\"><\/div>\r\n                    \r\n<div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33.33\" style=\"display: block; align-items: center; justify-content: center; min-height: 70px; float: left; padding: 0px; width: calc(33.33% + 0px); box-sizing: border-box; min-width: 15px;          word-wrap: break-word; word-break: break-word;         word-wrap: break-word; word-break: break-word;\">\r\n    \r\n<div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/8967edd2-d32d-ef11-840a-0022489522f1.png\" style=\"max-height: 100%; max-width: 60%; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px;\"><\/div>\r\n\r\n\r\n<\/div><\/div>\r\n\r\n<div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33.33\" style=\"display: block; align-items: center; justify-content: center; min-height: 70px; float: left; padding: 0px 10px 0px 0px; width: calc(33.33% + 0px); box-sizing: border-box; min-width: 15px;          word-wrap: break-word; word-break: break-word;         word-wrap: break-word; word-break: break-word;\">\r\n    \r\n<div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/09\/exigotech-w.png\" style=\"max-height: 100%; max-width: 250px; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px;\"><\/div>\r\n\r\n\r\n<\/div><\/div>\r\n\r\n<div data-container=\"true\" class=\"columnContainer\" data-container-width=\"33.33\" style=\"display: block; align-items: center; justify-content: center; min-height: 70px; float: left; padding: 0px; width: calc(33.33% + 0px); box-sizing: border-box; min-width: 15px;         word-wrap: break-word; word-break: break-word;        word-wrap: break-word; word-break: break-word;\">\r\n    \r\n<div data-editorblocktype=\"Image\"><div align=\"Center\" class=\"imageWrapper\" display=\"inline-block\" style=\"\" width=\"100%\"><img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/09\/microsoft-w.png\" style=\"max-height: 100%; max-width: 250px; box-sizing: border-box; margin: 0px; resize: none; position: relative; zoom: 1; display: block; top: 0px; left: 0px;\"><\/div>\r\n\r\n\r\n\r\n<\/div><\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n                    <div style=\"clear:both\"><\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/main>\r\n        <footer>\r\n            \r\n            \r\n            \r\n            \r\n        <\/footer>\r\n    <\/div>\r\n\r\n\r\n<div class=\"ms_crm_trackingscript_base\">\r\n<div id=\"djrh9Etzz-v6xhCu0Den8n9yNGtjVtCHsnKu9UfFEOkg\"><\/div><script src=\"https:\/\/mktdplp102cdn.azureedge.net\/public\/latest\/js\/ws-tracking.js?v=1.85.2002\"><\/script><div class=\"d365-mkt-config\" style=\"display:none\" data-website-id=\"jrh9Etzz-v6xhCu0Den8n9yNGtjVtCHsnKu9UfFEOkg\" data-hostname=\"c70f24be186b4e939b89419f4aee913d.svc.dynamics.com\"><\/div>\r\n<\/div>\r\n<\/body><\/html>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Exigo Tech&#8217;s: Managed Security as a Service Cybersecurity Threats Are Closer Than You Think: Be Aware, Be Safe, Be Secure [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"disabled","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"disabled","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"disabled","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2601","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/2601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/comments?post=2601"}],"version-history":[{"count":12,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/2601\/revisions"}],"predecessor-version":[{"id":2622,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/2601\/revisions\/2622"}],"wp:attachment":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/media?parent=2601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}