{"id":10,"date":"2024-06-25T07:53:39","date_gmt":"2024-06-25T11:53:39","guid":{"rendered":"https:\/\/argosradarsolutions.com\/services\/"},"modified":"2024-09-29T09:13:15","modified_gmt":"2024-09-29T13:13:15","slug":"services","status":"publish","type":"page","link":"https:\/\/argosradarsolutions.com\/?page_id=10","title":{"rendered":"Services"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-1 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-right:var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal));padding-bottom:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-left:var(--wp--style--root--padding-left, var(--wp--custom--gap--horizontal))\">\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-1 wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading\">Services<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>Our team focuses on your business needs and assesses how technology can be adapted to your strategic direction. <\/p>\n\n\n\n<p>Cyber security continues to be a growing priority for organizations of all sizes, across all industries. With new threats appearing on a daily basis and attackers continuously evolving their techniques, it can be extremely difficult to keep up. If you seldom feel confident you\u2019re making measurable progress and getting ahead of the game, you\u2019re not alone.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-4 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-right:var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal));padding-bottom:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-left:var(--wp--style--root--padding-left, var(--wp--custom--gap--horizontal))\">\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-general.jpg\" alt=\"\" class=\"wp-image-127\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">GENERAL SECURITY <\/h3>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">ASSESSMENT<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We discuss your current cyber security  posture as it relates to the CIS controls, where you would like it to go, and how we            would get there.            <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interview key personnel<\/li>\n\n\n\n<li>Identify any gaps in processes<\/li>\n\n\n\n<li>Discuss current standards and practices<\/li>\n\n\n\n<li>Report on key configurations &amp; policies<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-pen-testing-.jpg\" alt=\"\" class=\"wp-image-52\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">PENETRATION<\/h3>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">TESTING<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We will not only scan for vulnerabilities but attempt to exploit them in various (safe!) ways and generate reports on exactly what it was able to do. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Arsenal of attacks &amp; techniques<\/li>\n\n\n\n<li>User credential validation<\/li>\n\n\n\n<li>Data hygiene and sanitation verification<\/li>\n\n\n\n<li>Testing for lateral path availability<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1900\" height=\"1900\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-ransomware.jpg\" alt=\"\" class=\"wp-image-124\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">RANSOMWARE <\/h3>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">EMULATION<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We will attempt to execute defanged versions of ransomware to the chosen systems.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduced threat and ransomware impact<\/li>\n\n\n\n<li>Hardened network and security readiness<\/li>\n\n\n\n<li>Accelerated validation-remediation cycle<\/li>\n\n\n\n<li>Assured continuous efficacy of your security program<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-2 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-right:var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal));padding-bottom:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-left:var(--wp--style--root--padding-left, var(--wp--custom--gap--horizontal))\">\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2100\" height=\"2100\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-cloud-.jpg\" alt=\"\" class=\"wp-image-125\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">CLOUD <\/h3>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">SIEM<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Protect your existing infrastructure by collecting logs from all systems into our centralized platform.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Log aggregation across different sources<\/li>\n\n\n\n<li>Real-time alerting<\/li>\n\n\n\n<li>Easy to follow remediation playbooks<\/li>\n\n\n\n<li>Automation abilities<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-4 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-policy-discussions.jpg\" alt=\"\" class=\"wp-image-58\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">VULNERABILITY <\/h3>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">SCANNING<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We will run a vulnerability scan on any endpoints you choose.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ranked list of findings<\/li>\n\n\n\n<li>Explanation of results and solutions if applicable<\/li>\n\n\n\n<li>CVE for reference<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2100\" height=\"2100\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-password.jpg\" alt=\"\" class=\"wp-image-126\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">ACTIVE DIRECTORY PASSWORD ASSESSMENT<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We will copy the user hashes contained within your AD structure and attempt to crack them.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Verify password policies<\/li>\n\n\n\n<li>Identify weak passwords<\/li>\n\n\n\n<li>Identify accounts with the same password<\/li>\n\n\n\n<li>Locate all privileged users<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-3 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-right:var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal));padding-bottom:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-left:var(--wp--style--root--padding-left, var(--wp--custom--gap--horizontal))\">\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-employee-training.jpg\" alt=\"\" class=\"wp-image-57\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">EMPLOYEE TRAINING<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We offer short training courses on general security practices.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>85% of breaches involve human interaction<\/li>\n\n\n\n<li>61% of breaches use stolen credentials<\/li>\n\n\n\n<li>Technological controls only go so far<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-7 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-tactical-ttx-1.jpg\" alt=\"\" class=\"wp-image-60\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">TACTICAL TABLETOPS<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We work with you to create and facilitate focused and meaningful tabletops that<br>identify potential gaps in your security posture.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Custom scenarios<\/li>\n\n\n\n<li>Ensuring relevant personnel are involved<\/li>\n\n\n\n<li>Dialed in to identify gaps in your infrastructure<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-8 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2100\" height=\"2100\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-policy.jpg\" alt=\"\" class=\"wp-image-123\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">POLICY DISCUSSIONS<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We discuss your current security-based policies and decide where you want to go<br>with them and how to get there.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discuss common security policies<\/li>\n\n\n\n<li>Identify gaps with current policies<\/li>\n\n\n\n<li>Suggest improvements as necessary<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-9 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/argosradarsolutions.com\/?page_id=11\">Get Started<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-6 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-right:var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal));padding-bottom:calc( 0.5 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)));padding-left:var(--wp--style--root--padding-left, var(--wp--custom--gap--horizontal))\">\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading alignwide has-text-align-left has-large-font-size\">Reviews<\/h2>\n<\/div>\n\n\n\n<div style=\"height:calc( 0.25 * var(--wp--style--root--padding-right, var(--wp--custom--gap--horizontal)))\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size\">Matt L.<\/h3>\n\n\n\n<p>&#8220;NineStar\/Argos Radar Solutions has built a strong reputation, and for me the value of what you get compared to other experiences&#8230;I figured we couldn&#8217;t go wrong.&#8221;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size\">Justin W.<\/h3>\n\n\n\n<p>&#8220;Argos went above and beyond to do some test for us that they didn&#8217;t have to do such as running things on all segments of our network. We felt like they left no stone unturned.&#8221;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size\">Brad T.<\/h3>\n\n\n\n<p>&#8220;They came out, met with people, and talked to them about their needs. We weren&#8217;t treated like just another customer.&#8221;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-small-font-size\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading alignwide\">Top 10 Cyber Security Threats<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social Engineering \u2013 Any network is hackable if an employee can be manipulated into sharing access.<\/li>\n\n\n\n<li>Third-Party Exposure \u2013 Vendors, clients and app integrations with poor security can provide access to an otherwise well-protected network.<\/li>\n\n\n\n<li>Configuration Mistakes \u2013 Even the most cutting-edge security software only works if it\u2019s installed correctly.<\/li>\n\n\n\n<li>Poor Cyber Hygiene \u2013 Employee training is essential to ensure those with network access maintain safe cyber practices.<\/li>\n\n\n\n<li>Cloud Vulnerabilities \u2013 Increased attack surface means more vigilance is needed.<\/li>\n\n\n\n<li>Ransomware \u2013 Hackers can capture sensitive data or take down networks and demand payment for restored access.<\/li>\n\n\n\n<li>Mobile Device Vulnerabilities \u2013 Easily lost or stolen devices need extra protection.<\/li>\n\n\n\n<li>Internet of Things \u2013 Smart technology users may not realize that any loT device can be hacked to obtain network access.<\/li>\n\n\n\n<li>Poor Data Management \u2013 When massive amounts of data are kept, it\u2019s easier to lose and expose essential information.<\/li>\n\n\n\n<li>Inadequate Post-Attack Procedures \u2013 Hindsight is 20\/20, learn from the experience.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/argosradarsolutions.com\/wp-content\/uploads\/2024\/06\/argos-general.jpg\" alt=\"\" class=\"has-border-color has-theme-1-border-color wp-image-127\" style=\"border-radius:100em;aspect-ratio:1;object-fit:cover\"\/><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Services Our team focuses on your business needs and assesses how technology can be adapted to your strategic direction. Cyber security continues to be a growing priority for organizations of all sizes, across all industries. With new threats appearing on a daily basis and attackers continuously evolving their techniques, it can be extremely difficult to [&hellip;]<\/p>\n","protected":false},"author":252528369,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/10"}],"collection":[{"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=\/wp\/v2\/users\/252528369"}],"replies":[{"embeddable":true,"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10"}],"version-history":[{"count":26,"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/argosradarsolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}