[kc_row use_container=”yes” _id=”868715″ cols_gap=”{`kc-css`:{}}” force=”yes” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6InRyYW5zcGFyZW50IiwibGluZWFyR3JhZGllbnQiOlsicmdiYSgwLCAxMDAsIDExNSwgMC40NSkiXSwiaW1hZ2UiOiIlU0lURV9VUkwlL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDE3LzA3L0Zsb3JpZGEtQ3liZXItU2VjdXJpdHktU2VydmljZXMtZTE1MTcyNTg3NDE1NjEuanBlZyIsInBvc2l0aW9uIjoiY2VudGVyIGNlbnRlciIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjoxfQ==`},`box`:{`height|`:`350px`}}}}” _collapse=”1″][kc_column width=”12/12″ video_bg_url=”https://www.youtube.com/watch?v=dOWFVKb2JqM” _id=”8992″][kc_row_inner row_id=” ” _id=”985284″ cols_gap=”{`kc-css`:{}}” row_class=”inner-subheader” css_custom=”{`kc-css`:{`any`:{`custom`:{`custom|`:`margin-top:-70px;`}}}}”][kc_column_inner width=”18.81%” _id=”595941″][/kc_column_inner][kc_column_inner width=”62.01%” _id=”929454″ css_custom=”{`kc-css`:{`any`:{`box`:{`margin|`:`150px inherit 150px inherit`}}}}”][kc_title text=”Q1lCRVJTRUNVUklUWQ==” _id=”595560″ type=”h1″ style=”lighting” css_custom=”{`kc-css`:{`any`:{`title-style`:{`color|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`#ffffff`,`font-family|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`Didact Gothic`,`display|`:`inline`}}}}”][kc_column_text _id=”477183″]

CompassMSP has the expertise and support necessary to protect your business against Cyber Threats.

[/kc_column_text][/kc_column_inner][kc_column_inner width=”19.16%” _id=”638067″][/kc_column_inner][/kc_row_inner][/kc_column][/kc_row][kc_row use_container=”yes” _id=”541266″ cols_gap=”{`kc-css`:{`any`:{`group`:{`max-width|.kc-container`:`100%`}}}}” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`box`:{`padding|`:`20px 50px 20px 50px`}}}}” _collapse=”1″][kc_column width=”100%” video_mute=”no” _id=”190189″][kc_spacing height=”50px” _id=”691492″][kc_row_inner column_align=”middle” video_mute=”no” _id=”901007″][kc_column_inner width=”100%” _id=”761591″][kc_column_text _id=”298942″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#545454`,`font-family|,p`:`Didact Gothic`}}}}”]

Is Your Business Protected Against Cyber Threats?

Today, growing cybercrime threatens every business, it’s no longer a question of “if”, but a question of “when and how bad will it be?” The latest report from Cybersecurity Ventures estimates that the total global cost of cybercrime will exceed $6 trillion by 2021, and the CEO of IBM describes cybercrime as “The greatest threat to every company in the world.”

Contrary to popular belief, being small does NOT make you invisible to threats. Businesses of all sizes are attacked each day. If you’re connected to the internet, you are automatically a target. Hackers use automated processes to identify any vulnerable connection on the internet and over 58% of attacks are deliberately targeted at small & medium-sized business, who lack the staff, technology, and expertise to protect themselves (Verizon DBIR, 2018).

[/kc_column_text][kc_spacing height=”60px” _id=”282926″][/kc_column_inner][/kc_row_inner][/kc_column][/kc_row][kc_row use_container=”yes” _id=”490229″ cols_gap=”{`kc-css`:{`any`:{`group`:{`max-width|.kc-container`:`100%`}}}}” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}” _collapse=”1″][kc_column width=”12/12″ video_bg_url=”https://www.youtube.com/watch?v=dOWFVKb2JqM” _id=”340518″][kc_spacing height=”30px” _id=”117412″][kc_row_inner column_align=”middle” video_mute=”no” _id=”225267″][kc_column_inner width=”59.92%” _id=”289374″][kc_column_text _id=”197851″]

Ready for a Cyber Security Plan?

[/kc_column_text][/kc_column_inner][kc_column_inner width=”40.07%” _id=”573972″][kc_call_to_action layout=”2″ title=”__empty__” desc=”__empty__” button_show=”yes” button_text=”Get Your Free Assessment” _id=”361554″ button_link=”http://www.compassmsp.com/contact/||” css_custom=”{`kc-css`:{`any`:{`title`:{`color|.kc-cta-desc h2`:`#ffffff`,`font-family|.kc-cta-desc h2`:`Didact Gothic`},`description`:{`color|.kc-cta-desc .kc-cta-text`:`#ffffff`,`font-family|.kc-cta-desc .kc-cta-text`:`Didact Gothic`},`button`:{`color|.kc-cta-button a`:`#ffffff`,`background-color|.kc-cta-button a`:`#dd5a17`,`font-family|.kc-cta-button a`:`Didact Gothic`},`button-hover`:{`color|.kc-cta-button a:hover`:`#dd5a17`,`background-color|.kc-cta-button a:hover`:`#ffffff`},`boxes`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}”][/kc_column_inner][/kc_row_inner][kc_spacing height=”30px” _id=”825876″ class=”0″][/kc_column][/kc_row][kc_row use_container=”yes” _id=”307147″ cols_gap=”{`kc-css`:{`any`:{`group`:{`max-width|.kc-container`:`100%`}}}}” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiNkZDVhMTciLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}” _collapse=”1″][kc_column width=”12/12″ video_mute=”no” _id=”156892″][kc_spacing height=”50px” _id=”697250″][kc_title text=”U2VjdXJpdHkgYnkgdGhlIE51bWJlcnM=” _id=”997421″ type=”h3″ style=”lighting” css_custom=”{`kc-css`:{`any`:{`title-style`:{`color|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`#ffffff`,`font-family|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`Didact Gothic`,`padding|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`20px inherit 20px inherit`}}}}”][kc_row_inner _id=”681182″ cols_gap=”{`kc-css`:{`any`:{`group`:{`gap|:gt:.kc_column_inner, :gt:div:gt:.kc_column_inner`:`10px`}}}}” css_custom=”{`kc-css`:{`any`:{`box`:{`padding|`:`inherit 20px inherit 20px`}}}}”][kc_column_inner width=”33.33%” _id=”735548″ css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6InJnYmEoMjIxLCA5MCwgMjMsIDAuNjUpIiwibGluZWFyR3JhZGllbnQiOlsiIl0sImltYWdlIjoibm9uZSIsInBvc2l0aW9uIjoiMCUgMCUiLCJzaXplIjoiYXV0byIsInJlcGVhdCI6InJlcGVhdCIsImF0dGFjaG1lbnQiOiJzY3JvbGwiLCJhZHZhbmNlZCI6MH0=`},`box`:{`padding|`:`10px 10px 10px 10px`}}}}”][kc_icon _id=”436349″ icon=”mn-icon-1048″ css_custom=”{`kc-css`:{`any`:{`icon-style`:{`color|i`:`#ffffff`,`font-size|i`:`75px`,`text-align|`:`center`,`padding|i`:`20px 20px 20px 20px`},`icon-hover`:{`color|+:hover i`:`#e86725`}}}}”][kc_column_text _id=”421136″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#ffffff`,`font-family|,p`:`Didact Gothic`,`text-align|,p`:`center`},`box`:{`padding|`:`20px 20px 20px 20px`}}}}”]

8 months

Average time from cyber breach to discovery of the breach.

[/kc_column_text][/kc_column_inner][kc_column_inner width=”33.33%” _id=”116762″ css_custom=”{`kc-css`:{`any`:{`box`:{`padding|`:`10px 10px 10px 10px`}}}}”][kc_icon _id=”740499″ icon=”mn-icon-831″ css_custom=”{`kc-css`:{`any`:{`icon-style`:{`color|i`:`#ffffff`,`font-size|i`:`75px`,`text-align|`:`center`,`padding|i`:`20px 20px 20px 20px`},`icon-hover`:{`color|+:hover i`:`#e86725`}}}}”][kc_column_text _id=”496017″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#ffffff`,`font-family|,p`:`Didact Gothic`,`text-align|,p`:`center`},`box`:{`padding|`:`20px 20px 20px 20px`}}}}”]

50%

percentage of mid-size businesses breached in the last 12 months.

[/kc_column_text][/kc_column_inner][kc_column_inner width=”33.33%” _id=”414872″ css_custom=”{`kc-css`:{`any`:{`box`:{`padding|`:`10px 10px 10px 10px`}}}}”][kc_icon _id=”963981″ icon=”mn-icon-975″ css_custom=”{`kc-css`:{`any`:{`icon-style`:{`color|i`:`#ffffff`,`font-size|i`:`75px`,`text-align|`:`center`,`padding|i`:`20px 20px 20px 20px`},`icon-hover`:{`color|+:hover i`:`#e86725`}}}}”][kc_column_text _id=”473860″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#ffffff`,`font-family|,p`:`Didact Gothic`,`text-align|,p`:`center`},`box`:{`padding|`:`20px 20px 20px 20px`}}}}”]

$879,000

Average loss from theft cost for mid-size businesses.

[/kc_column_text][/kc_column_inner][/kc_row_inner][kc_spacing height=”50px” _id=”153297″][/kc_column][/kc_row][kc_row use_container=”no” _id=”568825″ cols_gap=”{`kc-css`:{}}” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6InJnYmEoMjU1LCAyNTUsIDI1NSwgMC40NykiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`},`box`:{`padding|`:`inherit 25px inherit 25px`}}}}” animate=”||” _collapse=”1″][kc_column width=”12/12″ video_mute=”no” _id=”820836″][kc_spacing height=”50px” _id=”668800″][kc_column_text _id=”574209″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#545454`,`font-family|,p`:`Didact Gothic`},`box`:{`padding|`:`inherit 140px inherit 140px`}}}}”]

CompassMSP’s Cyber Security Solutions

Are you proactively taking steps to ensure your cybersecurity is up to date and can prevent cyber attacks? For today’s threats, you need more than perimeter tools, antivirus products, and DNS security. Threats are constantly changing, hackers are consistently changing the way they exploit businesses

The ever-changing landscape of cybercrime requires 360-degree protection. CompassMSP provides enterprise quality managed cybersecurity solutions to small and mid-sized businesses. Our multi-layered security approach leverages a team of security engineers, 24×7 network monitoring, and managed detection and response (MDR) capabilities to prevent, detect and rapidly respond to attacks.

[/kc_column_text][kc_spacing height=”50px” _id=”915482″][kc_title text=”MzYwwrAgUHJvdGVjdGlvbg==” _id=”955379″ type=”h3″ style=”dark” css_custom=”{`kc-css`:{`any`:{`title-style`:{`color|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`#004c57`,`font-family|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`Didact Gothic`,`text-align|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`center`}}}}”][kc_spacing height=”40px” _id=”896778″][kc_row_inner column_align=”middle” video_mute=”no” _id=”584525″][kc_column_inner width=”20%” _id=”131182″ css_custom=”{`kc-css`:{`any`:{`box`:{`border|`:`|1px dashed #004c57||`}}}}”][kc_feature_box layout=”1″ title=”Protection” desc=”VGhlIGJhc2ljcyBuZWNlc3Nhcnk=” icon=”mn-icon-7″ show_button=”__empty__” _id=”214034″ css_custom=”{`kc-css`:{`any`:{`title`:{`color|.content-title`:`#dd5a17`,`color|+:hover .content-title`:`#008ea4`,`font-family|.content-title`:`Didact Gothic`,`margin|.content-title`:`inherit inherit 0px inherit`},`subtitle`:{`margin|.content-position`:`inherit inherit 0px inherit`},`desc`:{`color|.content-desc`:`#545454`,`font-family|.content-desc`:`Didact Gothic`},`icon`:{`color|.content-icon i`:`#008ea4`,`color|+:hover .content-icon i`:`#dd5a17`}}}}” image=””][kc_column_text _id=”610851″]

  • Firewalls with Intrusion Prevention​
  • Next Gen Endpoint Security​
  • Email Security & Encryption
  • Application Whitelisting
  • 2 Factor Authentication

[/kc_column_text][/kc_column_inner][kc_column_inner width=”20%” _id=”907480″ css_custom=”{`kc-css`:{`any`:{`box`:{`border|`:`|1px dashed #004c57||`}}}}”][kc_feature_box layout=”1″ title=”Compliance” desc=”UHJvdGVjdGlvbiBmb3IgcmVndWxhdGVkIGluZHVzdHJpZXM=” icon=”mn-icon-7″ show_button=”__empty__” _id=”671626″ css_custom=”{`kc-css`:{`any`:{`title`:{`color|.content-title`:`#dd5a17`,`color|+:hover .content-title`:`#008ea4`,`font-family|.content-title`:`Didact Gothic`,`margin|.content-title`:`inherit inherit 0px inherit`},`desc`:{`color|.content-desc`:`#545454`,`font-family|.content-desc`:`Didact Gothic`},`icon`:{`color|.content-icon i`:`#008ea4`,`color|+:hover .content-icon i`:`#dd5a17`}}}}” image=””][kc_column_text _id=”652743″]

  • Gap Analysis
  • HIPAA, PCI, SEC
  • NIST

[/kc_column_text][/kc_column_inner][kc_column_inner width=”20%” _id=”311692″ css_custom=”{`kc-css`:{`any`:{`box`:{`border|`:`|1px dashed #004c57||`}}}}”][kc_feature_box layout=”1″ title=”Assessments” desc=”RW5zdXJlIHlvdXIgc3lzdGVtcyBhcmUgdXAgdG8gZGF0ZQ==” icon=”mn-icon-7″ show_button=”__empty__” _id=”204659″ css_custom=”{`kc-css`:{`any`:{`title`:{`color|.content-title`:`#dd5a17`,`color|+:hover .content-title`:`#008ea4`,`font-family|.content-title`:`Didact Gothic`,`margin|.content-title`:`inherit inherit 0px inherit`},`desc`:{`color|.content-desc`:`#545454`,`font-family|.content-desc`:`Didact Gothic`},`icon`:{`color|.content-icon i`:`#008ea4`,`color|+:hover .content-icon i`:`#e86725`}}}}” image=””][kc_column_text _id=”165999″]

  • Vulnerability Scans
  • Penetration Testing
  • Application Testing

[/kc_column_text][/kc_column_inner][kc_column_inner width=”20%” _id=”428180″ css_custom=”{`kc-css`:{`any`:{`box`:{`border|`:`|1px dashed #004c57||`}}}}”][kc_feature_box layout=”1″ title=”Training” desc=”S2VlcCB5b3VyIHN0YWZmIGluIHRoZSBrbm93″ icon=”mn-icon-7″ show_button=”__empty__” _id=”997401″ css_custom=”{`kc-css`:{`any`:{`title`:{`color|.content-title`:`#dd5a17`,`color|+:hover .content-title`:`#008ea4`,`font-family|.content-title`:`Didact Gothic`,`margin|.content-title`:`inherit inherit 0px inherit`},`desc`:{`color|.content-desc`:`#545454`,`font-family|.content-desc`:`Didact Gothic`},`icon`:{`color|.content-icon i`:`#008ea4`,`color|+:hover .content-icon i`:`#e86725`}}}}” image=””][kc_column_text _id=”742142″]

  • Security Awareness
  • Passwords
  • Phishing Training

[/kc_column_text][/kc_column_inner][kc_column_inner width=”20%” _id=”277057″][kc_feature_box layout=”1″ title=”SOC” desc=”TmV4dCBzdGVwIGluIHRoZSBldm9sdXRpb24gb2Ygc2VjdXJpdHkgeW91ciBidXNpbmVzcw==” icon=”mn-icon-7″ show_button=”__empty__” _id=”607427″ css_custom=”{`kc-css`:{`any`:{`title`:{`color|.content-title`:`#dd5a17`,`color|+:hover .content-title`:`#008ea4`,`font-family|.content-title`:`Didact Gothic`,`margin|.content-title`:`inherit inherit 0px inherit`},`desc`:{`color|.content-desc`:`#545454`,`font-family|.content-desc`:`Didact Gothic`},`icon`:{`color|.content-icon i`:`#008ea4`,`color|+:hover .content-icon i`:`#e86725`}}}}” image=””][kc_column_text _id=”790590″]

  • 24×7 Security Operations Center (SOC)
  • Managed Detection & Response (MDR)
  • Managed SIEM

[/kc_column_text][/kc_column_inner][/kc_row_inner][kc_spacing height=”50px” _id=”230324″][/kc_column][/kc_row][kc_row use_container=”yes” _id=”875″ cols_gap=”{`kc-css`:{`any`:{`group`:{`max-width|.kc-container`:`100%`}}}}” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiM5ODk4OTgiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`},`box`:{`padding|`:`20px inherit 20px inherit`}}}}” animate=”||”][kc_column width=”12/12″ video_bg_url=”https://www.youtube.com/watch?v=dOWFVKb2JqM” _id=”556307″][kc_spacing height=”50px” _id=”775064″][kc_title text=”SG93IGRvZXMgeW91ciBzZWN1cml0eSBzdGFjayB1cD8=” _id=”439962″ type=”h3″ style=”lighting” css_custom=”{`kc-css`:{`any`:{`title-style`:{`color|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`#ffffff`,`font-family|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`Didact Gothic`,`text-align|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`center`}}}}”][kc_spacing height=”30px” _id=”78683″][kc_row_inner row_id=” ” _id=”400343″ cols_gap=”{`kc-css`:{}}” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiM5ODk4OTgiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`},`box`:{`padding|`:`10px inherit 10px inherit`,`width|`:`100%`}}}}”][kc_column_inner width=”50%” _id=”951942″ css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiM5ODk4OTgiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}”][kc_column_text _id=”251384″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#ffffff`,`font-family|,p`:`Didact Gothic`},`box`:{`background|`:`eyJjb2xvciI6IiM5ODk4OTgiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`,`padding|`:`10px 10px 10px 40px`}}}}”]

Ask yourself the following questions …

  1. What would a breach cost your business (e.g. data compromised, downtime)?
  2. If you lose IP, what is the value of your intellectual property (e.g. original designs, patents)?

[/kc_column_text][/kc_column_inner][kc_column_inner width=”50%” _id=”703198″ css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiM5ODk4OTgiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}”][kc_column_text _id=”727867″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#ffffff`,`font-family|,p`:`Didact Gothic`},`box`:{`background|`:`eyJjb2xvciI6IiM5ODk4OTgiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`,`padding|`:`10px 10px 10px 40px`}}}}”]

3. How do you proactively limit your risk and liability around cyber…how do you know it’s working?

4. How many times a day/week/month are you actively attacked?

5. What is your response process to a breach?

[/kc_column_text][/kc_column_inner][/kc_row_inner][kc_spacing height=”50px” _id=”755803″][/kc_column][/kc_row][kc_row use_container=”yes” _id=”762070″ cols_gap=”{`kc-css`:{`any`:{`group`:{`max-width|.kc-container`:`100%`}}}}” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}” _collapse=”1″][kc_column width=”12/12″ video_bg_url=”https://www.youtube.com/watch?v=dOWFVKb2JqM” _id=”871774″][kc_spacing height=”30px” _id=”768006″][kc_row_inner row_id=” ” _id=”455680″ cols_gap=”{`kc-css`:{}}” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`},`box`:{`width|`:`100%`}}}}”][kc_column_inner width=”18.11%” _id=”53345″ css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}”][/kc_column_inner][kc_column_inner width=”63.73%” _id=”397935″][kc_call_to_action layout=”2″ title=”How Safe is Your Business? ” desc=”SWYgeW914oCZcmUgbm90IHN1cmUgaG93IHlvdXIgc2VjdXJpdHkgc3RhY2tzIHVwLCBsZXQgdXMga25vdy4gT3VyIHRlYW0gY2FuIGhlbHAgeW91IGlkZW50aWZ5IGFueSBnYXBzIG9yIHZ1bG5lcmFiaWxpdGllcyBpbiB5b3VyIG5ldHdvcmsgc2VjdXJpdHkgc3RyYXRlZ3ku” button_show=”yes” button_text=”Contact Us” _id=”838478″ button_link=”http://www.compassmsp.com/contact/||” css_custom=”{`kc-css`:{`any`:{`title`:{`color|.kc-cta-desc h2`:`#ffffff`,`font-family|.kc-cta-desc h2`:`Didact Gothic`},`description`:{`color|.kc-cta-desc .kc-cta-text`:`#ffffff`,`font-family|.kc-cta-desc .kc-cta-text`:`Didact Gothic`},`button`:{`color|.kc-cta-button a`:`#ffffff`,`background-color|.kc-cta-button a`:`#dd5a17`,`font-family|.kc-cta-button a`:`Didact Gothic`},`button-hover`:{`color|.kc-cta-button a:hover`:`#dd5a17`,`background-color|.kc-cta-button a:hover`:`#ffffff`},`boxes`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}”][/kc_column_inner][kc_column_inner width=”18.12%” _id=”72278″ css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiMwMDc4OGEiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`}}}}”][/kc_column_inner][/kc_row_inner][kc_spacing height=”30px” _id=”746236″ class=”0″][/kc_column][/kc_row]