{"id":4677,"date":"2021-06-02T17:33:50","date_gmt":"2021-06-02T17:33:50","guid":{"rendered":"https:\/\/www.odinenterprises.net\/?page_id=4677"},"modified":"2021-06-10T19:24:02","modified_gmt":"2021-06-10T19:24:02","slug":"cyber-defense","status":"publish","type":"page","link":"https:\/\/www.odinenterprises.net\/index.php\/cyber-defense\/","title":{"rendered":"Odin Cyber Defense"},"content":{"rendered":"<div id=\"pl-4677\"  class=\"panel-layout\" ><div id=\"pg-4677-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-4677-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-4677-0-0-0\" class=\"so-panel widget widget_sow-hero panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-4677-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-hero so-widget-sow-hero-default-7c1b3f5a69fb-4677 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t>\t\t\t\t<div class=\"sow-slider-base\" style=\"display: none\">\n\t\t\t\t\t<ul\n\t\t\t\t\tclass=\"sow-slider-images\"\n\t\t\t\t\tdata-settings=\"{&quot;pagination&quot;:true,&quot;speed&quot;:800,&quot;timeout&quot;:8000,&quot;paused&quot;:false,&quot;pause_on_hover&quot;:false,&quot;swipe&quot;:true,&quot;nav_always_show_desktop&quot;:&quot;&quot;,&quot;nav_always_show_mobile&quot;:&quot;&quot;,&quot;breakpoint&quot;:&quot;780px&quot;,&quot;unmute&quot;:false,&quot;anchor&quot;:null}\"\n\t\t\t\t\tstyle=\"min-height: 300px\"\t\t\t\t\tdata-anchor-id=\"\"\n\t\t\t\t>\t\t<li class=\"sow-slider-image  sow-slider-image-cover\" style=\"visibility: visible;;background-color: #333333\" >\n\t\t\t\t\t<div class=\"sow-slider-image-container\">\n\t\t\t<div class=\"sow-slider-image-wrapper\">\n\t\t\t\t<h1 style=\"text-align: center\"><strong>Odin Cyber Security<\/strong><\/h1>\n<p style=\"text-align: center\"><span lang=\"EN-GB\">Odin Cyber Security<\/span><em><span lang=\"EN-GB\"> can help your business protect against cyber attacks originating from software or social engineering.<\/span><\/em><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"sow-slider-image-overlay sow-slider-image-cover\" style=\"background-image: url(https:\/\/www.odinenterprises.net\/wp-content\/uploads\/2021\/06\/pexels-markus-spiske-1089438-scaled.jpg);opacity: 0.4\"  ><\/div>\t\t<\/li>\n\t\t<\/ul>\t\t\t\t<ol class=\"sow-slider-pagination\">\n\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"#\" data-goto=\"0\" aria-label=\"display slide 1\"><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<\/ol>\n\n\t\t\t\t<div class=\"sow-slide-nav sow-slide-nav-next\">\n\t\t\t\t\t<a href=\"#\" data-goto=\"next\" aria-label=\"next slide\" data-action=\"next\">\n\t\t\t\t\t\t<em class=\"sow-sld-icon-thin-right\"><\/em>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\n\t\t\t\t<div class=\"sow-slide-nav sow-slide-nav-prev\">\n\t\t\t\t\t<a href=\"#\" data-goto=\"previous\" aria-label=\"previous slide\" data-action=\"prev\">\n\t\t\t\t\t\t<em class=\"sow-sld-icon-thin-left\"><\/em>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-4677-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-4677-1\" ><div id=\"pgc-4677-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-4677-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-a9a534c6fd99-4677\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t<h1 class='sow-headline'>The vast majority of hacks are due to human factors like social engineering or unpatched computer systems. Odin Cyber Defense can help.<\/h1><h6 class='sow-sub-headline'>Only two percent of hacks are a result of Zero Day vulnerabilities in computer software and ninety-eight percent of cyber attacks are the result of unpatched software or social engineering attacks.  We can train your employees to understand and counter these attacks.  We can also assist in putting plans in place that can minimize the damage of any attack, and we can test and evaluate those plans.  If an exploit is already on your system, we can evict the attackers and analyze the attack vectors.<\/h6>\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-4677-1-0-1\" class=\"so-panel widget widget_sow-features panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-features so-widget-sow-features-default-dbe7be403f84-4677\"\n\t\t\t\n\t\t>\n<div class=\"sow-features-list sow-features-responsive\">\n\n\t\t\t\t\t\t\t\t\t<div\n\t\t\t\tclass=\"sow-features-feature sow-icon-container-position-top sow-features-feature-last-row\"\n\t\t\t\tstyle=\"display: flex; flex-direction: column; width: 33.333%;\"\n\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\ttitle=\"Pre-Incident Planning\">\n\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-far\" data-sow-icon=\"&#xf328;\"\n\t\tstyle=\"font-size: 84px; color: #4a525a\" \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"textwidget\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h5>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\tPre-Incident Planning\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<p>Topics covered include: <span class=\"\">Training,\u00a0<\/span><span class=\"\">Penetration Testing,\u00a0<\/span><span class=\"\">Red Team,\u00a0<\/span><span class=\"\">Table Top Exercises and\u00a0<\/span><span class=\"\">Vulnerability Assessments for Operational Technology and Enterprise (IT) Systems<\/span><\/p>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div\n\t\t\t\tclass=\"sow-features-feature sow-icon-container-position-top sow-features-feature-last-row\"\n\t\t\t\tstyle=\"display: flex; flex-direction: column; width: 33.333%;\"\n\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\ttitle=\"Incident Recovery and Response\">\n\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-far\" data-sow-icon=\"&#xf06e;\"\n\t\tstyle=\"font-size: 84px; color: #4a525a\" \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"textwidget\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h5>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\tIncident Recovery and Response\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<p>Includes:\u00a0<span class=\"\">Forensic Analysis and\u00a0<\/span><span class=\"\">Hunt Team Operations<\/span><\/p>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div\n\t\t\t\tclass=\"sow-features-feature sow-icon-container-position-top sow-features-feature-last-row\"\n\t\t\t\tstyle=\"display: flex; flex-direction: column; width: 33.333%;\"\n\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\ttitle=\"Social Engineering Defense\">\n\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-far\" data-sow-icon=\"&#xf4ad;\"\n\t\tstyle=\"font-size: 84px; color: #4a525a\" \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"textwidget\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h5>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\tSocial Engineering Defense\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<p>We can help train your employees to spot and resist social engineering attempts.<\/p>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Odin Cyber Security Odin Cyber Security can help your business protect against cyber attacks originating from software or social engineering. The vast majority of hacks are due to human factors like social engineering or unpatched computer systems. Odin Cyber Defense can help.Only two percent of hacks are a result of Zero Day vulnerabilities in computer [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages\/4677"}],"collection":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/comments?post=4677"}],"version-history":[{"count":39,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages\/4677\/revisions"}],"predecessor-version":[{"id":4719,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages\/4677\/revisions\/4719"}],"wp:attachment":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/media?parent=4677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}