{"id":2623,"date":"2025-11-26T07:20:32","date_gmt":"2025-11-26T07:20:32","guid":{"rendered":"https:\/\/exigotech.co\/lp\/?page_id=2623"},"modified":"2025-12-03T06:59:51","modified_gmt":"2025-12-03T06:59:51","slug":"msaas-2025-new","status":"publish","type":"page","link":"https:\/\/exigotech.co\/lp\/msaas-2025-new\/","title":{"rendered":"MSaas 2025 -New"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2623\" class=\"elementor elementor-2623\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a0d065 e-flex e-con-boxed e-con e-parent\" data-id=\"8a0d065\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80bebbb elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"80bebbb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"77\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/exigo-tech-logo-on-dark-copy-300x77.webp\" class=\"attachment-medium size-medium wp-image-428\" alt=\"\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/exigo-tech-logo-on-dark-copy-300x77.webp 300w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/exigo-tech-logo-on-dark-copy-1024x262.webp 1024w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/exigo-tech-logo-on-dark-copy-768x196.webp 768w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/exigo-tech-logo-on-dark-copy-1536x393.webp 1536w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/exigo-tech-logo-on-dark-copy-2048x524.webp 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fb83d2 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"8fb83d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><br><div><font face=\"Segoe UI\"><span style=\"font-size: 36px\">Cybersecurity Threats Are Closer Than You Think: Be Aware, Be Safe, Be Secure<\/span><\/font><span style=\"font-size: 1.875rem;font-style: inherit\"><\/span><\/div><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2baa260 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2baa260\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Your Small or Medium-Sized Business from Hidden Dangers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ad57be elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"7ad57be\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/assets-oce.mkt.dynamics.com\/fc9b8594-69bb-47f5-a963-64c066b73bc4\/digitalassets\/standaloneforms\/011ca7bc-1fca-f011-bbd3-7ced8da25509\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_2\" viewBox=\"0 0 103.21 170.78\"><defs><style>      .cls-1 {        fill: #fff;      }    <\/style><\/defs><g id=\"Layer_1-2\" data-name=\"Layer_1\"><polygon class=\"cls-1\" points=\"103.21 85.39 54.05 170.78 25.92 170.78 75.08 85.39 25.92 0 54.05 0 103.21 85.39 103.21 85.39 103.21 85.39\"><\/polygon><polygon class=\"cls-1\" points=\"62.66 85.39 13.77 170.58 0 170.58 48.89 85.39 0 .2 13.77 .2 62.66 85.39 62.66 85.39 62.66 85.39\"><\/polygon><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Our MSaaS Solution<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-334bde2 e-flex e-con-boxed e-con e-parent\" data-id=\"334bde2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-443c8ba elementor-widget elementor-widget-text-editor\" data-id=\"443c8ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"min-height: 70px; min-width: 17.5px; width: calc(100% + 0px); flex-direction: column; padding: 10px; float: left; overflow-wrap: break-word; word-break: break-word; margin: 0px;\" data-container=\"true\" data-container-width=\"100\"><div style=\"text-align: center;\" data-editorblocktype=\"Text\"><p style=\"margin-bottom: 1.75em; text-align: left;\"><span style=\"color: #001433; font-family: Segoe UI, Frutiger, Helvetica Neue, Arial, sans-serif;\"><span style=\"font-size: 18px;\">When you hear about data breaches, the news often highlights large companies with massive amounts of customer data or financial records. But what about the countless small and medium-sized businesses (SMBs) that face similar threats every day? You might think that your business is less likely to be targeted by cybercriminals, but the reality is quite different. SMBs are often seen as easy targets due to limited resources and smaller security teams.<\/span><\/span><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72bb8d8 e-flex e-con-boxed e-con e-parent\" data-id=\"72bb8d8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1dec881 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"1dec881\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1086\" height=\"500\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/Did-you-know-MSaaS-updated2.gif\" class=\"attachment-full size-full wp-image-2628\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcfc4f8 e-flex e-con-boxed e-con e-parent\" data-id=\"bcfc4f8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8427958 elementor-widget elementor-widget-text-editor\" data-id=\"8427958\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"color: #001433; font-family: 'Segoe UI'; font-size: 14px; min-height: 70px; min-width: 17.5px; width: calc(100% + 0px); flex-direction: column; padding: 10px; float: left; overflow-wrap: break-word; word-break: break-word; margin: 0px;\" data-container=\"true\" data-container-width=\"100\"><div style=\"text-align: center;\" data-editorblocktype=\"Text\"><p style=\"font-size: 14px; margin-bottom: 1.75em; text-align: left;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 15.6933px;\"><span style=\"font-family: Aptos, sans-serif; line-height: 15.6933px;\"><span style=\"font-family: Calibri, sans-serif; line-height: 15.6933px;\"><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; line-height: 15.6933px;\"><span style=\"font-size: 18px; line-height: 27px;\">These statistics highlight the urgent need for SMBs to prioritise cybersecurity. Ignoring these threats could mean devastating consequences for your business. Despite this, many smaller businesses can be just as secure as larger ones by understanding the risks and taking proactive measures.<\/span><\/span><\/span><\/span><\/span><\/span><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-627013b e-flex e-con-boxed e-con e-parent\" data-id=\"627013b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ad6ea3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1ad6ea3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><div data-editorblocktype=\"Text\" style=\"text-align: start;padding-bottom: 10px\"><p style=\"text-align: left;font-weight:bold;margin-bottom: 0px\"><font color=\"#000000\" face=\"Segoe UI, Frutiger, Helvetica Neue, Arial, sans-serif\"><span style=\"font-size: 28px\">What Are Cybercriminals After?<\/span><\/font><span style=\"font-style: inherit;text-align: left\"><\/span><\/p><\/div><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8515114 elementor-widget elementor-widget-text-editor\" data-id=\"8515114\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"color: #001433; font-family: 'Segoe UI'; font-size: 14px; min-height: 70px; min-width: 20px; width: calc(100% + 0px); flex-direction: column; padding: 10px; float: left; overflow-wrap: break-word; word-break: break-word;\" data-container=\"true\" data-container-width=\"100\"><div data-editorblocktype=\"Text\"><p style=\"font-size: 14px; font-style: normal; font-weight: normal; margin-bottom: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; overflow-wrap: break-word; word-break: break-word; white-space-collapse: preserve; font-kerning: none; background-color: transparent; color: windowtext;\"><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif;\"><span style=\"font-size: 18px;\"><span style=\"line-height: 19.26px;\">It&#8217;s not just payment data that attackers are after anymore. Cybercriminals are expanding their reach, targeting a range of data types that can disrupt your operations, harm your reputation, and result in significant financial losses. Consider the following:<\/span><\/span><\/span><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff08db3 e-flex e-con-boxed e-con e-parent\" data-id=\"ff08db3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0d5354e e-con-full e-flex e-con e-child\" data-id=\"0d5354e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25bf197 elementor-widget elementor-widget-image\" data-id=\"25bf197\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/001-rf9h98lb5g51wek00c8yi3ukevtydvqgwd3outl3yc.png\" title=\"001\" alt=\"Comprehensive Optimization\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bbcfe2 elementor-widget elementor-widget-text-editor\" data-id=\"2bbcfe2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-editorblocktype=\"Text\"><p><strong>Personal Data:\u00a0<\/strong><\/p><\/div><div data-editorblocktype=\"Text\"><div class=\"columnContainer\" data-container=\"true\" data-container-width=\"33.33\"><div data-editorblocktype=\"Text\"><p>Information like names, addresses, and social security numbers are prime targets for identity theft.\u00a0<\/p><\/div><\/div><div class=\"columnContainer\" data-container=\"true\" data-container-width=\"33.33\"><div data-editorblocktype=\"Image\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8231a81 e-con-full e-flex e-con e-child\" data-id=\"8231a81\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-baeb350 elementor-widget elementor-widget-image\" data-id=\"baeb350\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/002-rf9h96pmrs2h96mqbbfpd4bn8437yhj083spw9nwas.png\" title=\"002\" alt=\"Proven Framework\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dccf073 elementor-widget elementor-widget-text-editor\" data-id=\"dccf073\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-editorblocktype=\"Text\"><p><strong>Corporate Data:<\/strong><\/p><\/div><div data-editorblocktype=\"Text\"><p>Proprietary business information, strategic plans, and intellectual property are lucrative targets for competitors and state-sponsored actors.\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9d2e9c e-con-full e-flex e-con e-child\" data-id=\"c9d2e9c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2caa6ad elementor-widget elementor-widget-image\" data-id=\"2caa6ad\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/03-rf9h95rsky16xko3gt12smk6mq7uqsf9vz58ezpah0.png\" title=\"03\" alt=\"Engineering-led Approach\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ade28a9 elementor-widget elementor-widget-text-editor\" data-id=\"ade28a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-editorblocktype=\"Text\"><div data-editorblocktype=\"Text\"><p><strong>Medical Records:<\/strong><\/p><\/div><div data-editorblocktype=\"Text\"><p>Health data is extremely sensitive that can be sold on the black market and can be used for insurance fraud.\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb491dc e-flex e-con-boxed e-con e-parent\" data-id=\"eb491dc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5ce63fb e-con-full e-flex e-con e-child\" data-id=\"5ce63fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72bb718 elementor-widget elementor-widget-image\" data-id=\"72bb718\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/004-rf9h94tye3zwlypgmamg84sq1cchj3bjjuhqxpqon8.png\" title=\"004\" alt=\"Quick Wins + Long-term Gains\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-002f6a5 elementor-widget elementor-widget-text-editor\" data-id=\"002f6a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-editorblocktype=\"Text\"><div data-editorblocktype=\"Text\"><p><strong>Confidential Data:\u00a0<\/strong><\/p><\/div><div data-editorblocktype=\"Text\"><p>Information about your business operations that can be leveraged in ransomware attacks and used to disrupt business processes.\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0e3d38 e-con-full e-flex e-con e-child\" data-id=\"b0e3d38\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e633d3 elementor-widget elementor-widget-image\" data-id=\"2e633d3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/elementor\/thumbs\/005-rf9h93w479ymacqtrs7tnn19fyh4be7t7pu9gfs2tg.png\" title=\"005\" alt=\"Transparent Outcomes\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20f6577 elementor-widget elementor-widget-text-editor\" data-id=\"20f6577\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-editorblocktype=\"Text\"><div data-editorblocktype=\"Text\"><p><strong>Private Communications:<\/strong><\/p><\/div><div data-editorblocktype=\"Text\"><p>Hackers can exploit confidential communications for blackmail or public exposure.\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b9414f e-flex e-con-boxed e-con e-parent\" data-id=\"7b9414f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-745166e e-con-full e-flex e-con e-child\" data-id=\"745166e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb7d130 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"cb7d130\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><div data-editorblocktype=\"Text\" style=\"font-size: 14px;font-weight: 400;padding-bottom: 10px\"><p style=\"font-size: 14px;margin-bottom: 0px\"><span style=\"font-size: 28px\"><span style=\"text-align: center\"><span style=\", Arial, sans-serif\"><span style=\"margin: 0px;padding: 0px;font-weight: 700\">Why SMBs Are Prime Targets<\/span><\/span><\/span><\/span><span style=\", sans-serif;font-size: 1.875rem;font-style: inherit;font-weight: 600\"><\/span><\/p><\/div><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02bab8f elementor-widget elementor-widget-text-editor\" data-id=\"02bab8f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #2a2a2a;\"><span style=\"font-size: 15px; white-space-collapse: preserve;\">Unfortunately, many SMBs believe they are too small to be targeted. This mindset can lead to inadequate security measures, leaving businesses exposed. And this is the perfect invitation for cybercriminals to cause havoc. They know that smaller businesses often lack the robust defences of larger enterprises, making them easier to breach and the rise of Ransomware-as-a-Service (RaaS) is a testament to this. <\/span><\/span><\/p><p><span style=\"font-size: 15px; white-space-collapse: preserve; color: #2a2a2a; font-style: inherit; font-weight: inherit;\">The truth is that cybercriminals are getting more sophisticated, and the tools they use to exploit vulnerabilities are becoming more accessible. No business is too small or large to escape their threat.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c64e3d9 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"c64e3d9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2618d02 elementor-widget elementor-widget-image\" data-id=\"2618d02\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"325\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/msass-box.gif\" class=\"attachment-large size-large wp-image-2632\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95611b9 e-flex e-con-boxed e-con e-parent\" data-id=\"95611b9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9bb301a e-con-full e-flex e-con e-child\" data-id=\"9bb301a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-049bd85 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"049bd85\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><div data-editorblocktype=\"Text\" style=\"text-align: start;padding-bottom: 10px\"><p style=\"text-align: left;font-weight:bold;margin-bottom: 0px\"><font color=\"#000000\" face=\"Segoe UI, Frutiger, Helvetica Neue, Arial, sans-serif\"><span style=\"font-size: 28px\">What\u2019s Next? Take Proactive Actions to Secure Your Business <\/span><\/font><span style=\"font-style: inherit\"><\/span><\/p><\/div><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cb4cd0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1cb4cd0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #2a2a2a;\"><span style=\"white-space-collapse: preserve;\">It\u2019s time to take control of your business\u2019s future. Understanding the risks is only the first step towards better cybersecurity; the next is taking action. Comprehensive cybersecurity measures are no longer a luxury; they are crucial if you don\u2019t want your business to become another statistic.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90582eb e-con-full e-flex e-con e-child\" data-id=\"90582eb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6abdc67 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6abdc67\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><div data-editorblocktype=\"Text\" style=\"padding-bottom: 10px\"><div data-editorblocktype=\"Text\" style=\"font-size: 14px;font-weight: 400\"><p style=\"font-size: 14px;font-style: normal;font-weight: normal;margin-bottom: 0px;padding-top: 15px;background-color: transparent;color: windowtext\"><span style=\"font-size: 22px\"><span style=\"font-weight: 700\"><span style=\", Arial, sans-serif\"><span style=\"line-height: 23.54px\">The Bright Side<\/span><\/span><\/span><\/span><span style=\", sans-serif;font-size: 25px;font-style: inherit;font-weight: 600\"><\/span><\/p><\/div><\/div><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce0cc86 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ce0cc86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #2a2a2a;\"><span style=\"white-space-collapse: preserve;\">The good news is that top-tier security is not out of reach. Exigo Tech has partnered with Microsoft and eSentire to bring you an enterprise-level security solution with zero upfront cost. <\/span><\/span><\/p><p><span style=\"color: #2a2a2a;\"><span style=\"white-space-collapse: preserve;\">Our Managed Security as a Service (MSaaS) offering combines innovative technology with expert support, ensuring that your business is protected from evolving threats without the complexity and cost of managing it on your own.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daaec61 elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"daaec61\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/assets-oce.mkt.dynamics.com\/fc9b8594-69bb-47f5-a963-64c066b73bc4\/digitalassets\/standaloneforms\/011ca7bc-1fca-f011-bbd3-7ced8da25509\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_2\" viewBox=\"0 0 103.21 170.78\"><defs><style>      .cls-1 {        fill: #fff;      }    <\/style><\/defs><g id=\"Layer_1-2\" data-name=\"Layer_1\"><polygon class=\"cls-1\" points=\"103.21 85.39 54.05 170.78 25.92 170.78 75.08 85.39 25.92 0 54.05 0 103.21 85.39 103.21 85.39 103.21 85.39\"><\/polygon><polygon class=\"cls-1\" points=\"62.66 85.39 13.77 170.58 0 170.58 48.89 85.39 0 .2 13.77 .2 62.66 85.39 62.66 85.39 62.66 85.39\"><\/polygon><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Our MSaaS Solution<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65922e0 e-flex e-con-boxed e-con e-parent\" data-id=\"65922e0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dc0b69d e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"dc0b69d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd48634 elementor-widget elementor-widget-image\" data-id=\"dd48634\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"470\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/security-accent-image-fixed.webp\" class=\"attachment-full size-full wp-image-2633\" alt=\"\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/security-accent-image-fixed.webp 550w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2025\/11\/security-accent-image-fixed-300x256.webp 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57bf0e4 e-con-full e-flex e-con e-child\" data-id=\"57bf0e4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0e310c elementor-widget elementor-widget-text-editor\" data-id=\"a0e310c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"color: #ffffff;\"><span style=\"font-size: 15px; white-space-collapse: preserve;\">At Exigo Tech, we understand the unique challenges SMBs face in cybersecurity. Our Managed Security as a Service (MSaaS) offering is the perfect solution to provide the protection you need without the overhead of an in-house team.<\/span><\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36ddef1 e-flex e-con-boxed e-con e-parent\" data-id=\"36ddef1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9347922 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9347922\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><div data-editorblocktype=\"Text\" style=\"text-align: start;padding-bottom: 10px;font-weight: 400;font-size: 14px\"><div data-editorblocktype=\"Text\" style=\"text-align: center\"><p style=\"font-size: 14px;font-style: normal;font-weight: normal;margin-bottom: 0px;background-color: transparent;color: windowtext\"><span style=\"font-size: 26px\"><span style=\"font-weight: 700\"><span style=\", Arial, sans-serif\"><span style=\"line-height: 27.82px\">Our Services<\/span><\/span><\/span><\/span><span style=\", sans-serif;font-size: 25px;font-style: inherit;font-weight: 600;text-align: left\"><\/span><\/p><\/div><\/div><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b7e8f7 elementor-widget elementor-widget-text-editor\" data-id=\"1b7e8f7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"color: #001433; font-family: 'Segoe UI'; font-size: 14px; min-height: 70px; min-width: 20px; width: calc(100% + 0px); flex-direction: column; padding: 10px; float: left; overflow-wrap: break-word; word-break: break-word;\" data-container=\"true\" data-container-width=\"100\"><div data-editorblocktype=\"Text\"><p style=\"font-size: 14px; font-style: normal; font-weight: normal; margin-bottom: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; overflow-wrap: break-word; word-break: break-word; white-space-collapse: preserve; font-kerning: none; background-color: transparent; color: windowtext;\"><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center; line-height: 21.4px;\" href=\"https:\/\/exigotech.co\/au\/services\/artificial-intelligence\">AI<\/a><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; font-size: 20px; text-align: center;\"> \u00a0| \u00a0<\/span><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center; line-height: 21.4px;\" href=\"https:\/\/exigotech.co\/au\/services\/delivery-model\">Managed Services<\/a><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; font-size: 20px; text-align: center;\"> \u00a0| \u00a0<\/span><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center; line-height: 21.4px;\" href=\"https:\/\/exigotech.co\/au\/services\/infrastructure\">Infrastructure \u00a0<\/a><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; font-size: 20px; text-align: center;\">| \u00a0<\/span><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center;\" href=\"https:\/\/exigotech.co\/au\/services\/networks\">Networks<\/a><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; font-size: 20px; text-align: center;\"> \u00a0| \u00a0<\/span><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center;\" href=\"https:\/\/exigotech.co\/au\/services\/cloud\">Cloud<\/a><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; font-size: 20px; text-align: center;\"> \u00a0| \u00a0<\/span><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center;\" href=\"https:\/\/exigotech.co\/au\/services\/business-applications\">Application<\/a><span style=\"font-family: 'Segoe UI', Frutiger, 'Helvetica Neue', Arial, sans-serif; font-size: 20px; text-align: center;\"> \u00a0| \u00a0<\/span><a style=\"background-color: #ffffff; color: #046bd2; transition-property: all; font-family: &#039;Segoe UI&#039;, Frutiger, &#039;Helvetica Neue&#039;, Arial, sans-serif; font-size: 20px; text-align: center;\" href=\"https:\/\/exigotech.co\/au\/services\/security\">Security<\/a><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec80f92 e-flex e-con-boxed e-con e-parent\" data-id=\"ec80f92\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-49f17f9 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"49f17f9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1947fc elementor-widget elementor-widget-image\" data-id=\"f1947fc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"200\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-be-empowered-et-al.png\" class=\"attachment-full size-full wp-image-436\" alt=\"\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-be-empowered-et-al.png 640w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-be-empowered-et-al-300x94.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-396a6d3 e-con-full e-flex e-con e-child\" data-id=\"396a6d3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2133fa6 elementor-widget elementor-widget-image\" data-id=\"2133fa6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"200\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-exigo-tech.png\" class=\"attachment-full size-full wp-image-437\" alt=\"\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-exigo-tech.png 640w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-exigo-tech-300x94.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e2bbbb e-con-full e-flex e-con e-child\" data-id=\"7e2bbbb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40a24ad elementor-widget elementor-widget-image\" data-id=\"40a24ad\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"200\" src=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-MS.png\" class=\"attachment-full size-full wp-image-438\" alt=\"\" srcset=\"https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-MS.png 640w, https:\/\/exigotech.co\/lp\/wp-content\/uploads\/2024\/10\/footer-MS-300x94.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Threats Are Closer Than You Think: Be Aware, Be Safe, Be Secure Protect Your Small or Medium-Sized Business from [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"disabled","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"disabled","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"disabled","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2623","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/2623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/comments?post=2623"}],"version-history":[{"count":20,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/2623\/revisions"}],"predecessor-version":[{"id":2790,"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/pages\/2623\/revisions\/2790"}],"wp:attachment":[{"href":"https:\/\/exigotech.co\/lp\/wp-json\/wp\/v2\/media?parent=2623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}