{"id":401,"date":"2025-01-23T11:34:38","date_gmt":"2025-01-23T11:34:38","guid":{"rendered":"https:\/\/itwireless.net\/?page_id=401"},"modified":"2025-02-25T09:50:31","modified_gmt":"2025-02-25T09:50:31","slug":"it-security","status":"publish","type":"page","link":"https:\/\/itwireless.net\/index.php\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"padding-top:64px;padding-right:32px;padding-bottom:64px;padding-left:32px;min-height:200px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-ti-bg-inv-background-color has-background-dim-70 has-background-dim\"><\/span><img decoding=\"async\" width=\"2560\" height=\"1708\" class=\"wp-block-cover__image-background wp-image-49\" alt=\"IT Security\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-scaled.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-scaled.jpg 2560w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-300x200.jpg 300w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-1024x683.jpg 1024w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-768x512.jpg 768w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-1536x1025.jpg 1536w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/computer-security-lock-and-payment-2048x1366.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-138c33e9 wp-block-group-is-layout-constrained\" style=\"padding-top:32px;padding-right:32px;padding-bottom:32px;padding-left:32px\"><h1 class=\"has-text-align-center wp-block-post-title\">IT Security<\/h1><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ti-fg-alt-color has-ti-accent-background-color has-text-color has-background is-layout-constrained wp-container-core-group-is-layout-5edc43e1 wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:64px;padding-bottom:64px\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-normal-font-size\">IT Wireless offers a wide range of security products and services. When you contact us regarding IT security, we conduct a full assessment of your current system. Based on the assessment, we provide recommendations to help you tighten security and ensure that potential threats do not impact you or your business.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:64px;padding-bottom:64px\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28232c24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"700\" height=\"347\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/HornetBanner.webp\" alt=\"Hornet Security\" class=\"wp-image-357\" style=\"width:333px;height:auto\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/HornetBanner.webp 700w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/HornetBanner-300x149.webp 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\">\n<h2 class=\"wp-block-heading\">Hornet Security<\/h2>\n\n\n\n<p>Secure your 365 and protect your emails from threats such as phishing and impersonation.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/itwireless.net\/index.php\/hornetsecurity\/\">Learn More<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ti-bg-alt-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:64px;padding-bottom:64px\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28232c24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\">\n<h2 class=\"wp-block-heading\">Huntress<\/h2>\n\n\n\n<p>With a powerful blend of purpose-built technology and human expertise, Huntress works with IT providers to monitor for suspicious activity, detect potential threats, and stop hackers in their tracks.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/itwireless.net\/index.php\/huntress-security\/\">Learn More<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1440\" height=\"1670\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/Huntress-Secondary-Logo-Teal.png\" alt=\"Huntress\" class=\"wp-image-189\" style=\"width:247px;height:auto\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/Huntress-Secondary-Logo-Teal.png 1440w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/Huntress-Secondary-Logo-Teal-259x300.png 259w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/Huntress-Secondary-Logo-Teal-883x1024.png 883w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/Huntress-Secondary-Logo-Teal-768x891.png 768w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/Huntress-Secondary-Logo-Teal-1324x1536.png 1324w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:0px;padding-bottom:0px\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28232c24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center has-black-color has-ti-bg-background-color has-text-color has-background has-link-color wp-elements-24c50c5ba6535fa657602ddda9209fb7 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\">\n<h2 class=\"wp-block-heading has-text-align-center\">Why use Huntress and Hornet Security side by side?<\/h2>\n\n\n\n<p class=\"has-text-align-center\">You may be wondering why we recommend two different security products. The reason is that Huntress secures your device itself from virus threats. However, Hornet Security focuses on protecting you from phishing and threats that may occur from attachments sent to you or your organisation. We have tried and tested this combination and are happy with the results.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:0px;padding-bottom:0px\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28232c24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1500\" height=\"1502\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/download.webp\" alt=\"Ubiquiti UniFi\" class=\"wp-image-413\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/download.webp 1500w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/download-300x300.webp 300w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/download-1024x1024.webp 1024w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/download-150x150.webp 150w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/download-768x769.webp 768w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\">\n<h2 class=\"wp-block-heading\">Ubiquiti UniFi<\/h2>\n\n\n\n<p>We provide supply and configuration of Ubiquiti UniFi products such as Gateway and Dream Machine. These products ensure your network is kept safe from potential threats.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ti-fg-alt-color has-ti-bg-inv-background-color has-text-color has-background has-link-color wp-elements-442bbc03413ec06ecef02cef4861cfd2 is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:0px;padding-bottom:0px\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28232c24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"2038\" height=\"2038\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo.webp\" alt=\"Kerio Control\" class=\"wp-image-370\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo.webp 2038w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo-300x300.webp 300w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo-1024x1024.webp 1024w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo-150x150.webp 150w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo-768x768.webp 768w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/kerio-control-vector-logo-1536x1536.webp 1536w\" sizes=\"(max-width: 2038px) 100vw, 2038px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\">\n<h2 class=\"wp-block-heading\">Kerio\/GFI<\/h2>\n\n\n\n<p>We provide Kerio\/GFI products and also technical support with Kerio Connect, Control and the rest of the GFI products.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"margin-top:0;margin-bottom:0;padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px;min-height:500px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-ti-bg-inv-background-color has-background-dim-80 has-background-dim\"><\/span><img decoding=\"async\" width=\"1279\" height=\"853\" class=\"wp-block-cover__image-background wp-image-408\" alt=\"Contact Us\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-rdne-7580908.webp\" data-object-fit=\"cover\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-rdne-7580908.webp 1279w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-rdne-7580908-300x200.webp 300w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-rdne-7580908-1024x683.webp 1024w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-rdne-7580908-768x512.webp 768w\" sizes=\"(max-width: 1279px) 100vw, 1279px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group has-ti-fg-alt-color has-text-color is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-huge-font-size\">Need More Information?<\/h2>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\">If you would like more information regarding IT Security please do not hesitate to contact us.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fc4fd283 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/itwireless.net\/index.php\/contact-page\/\">Contact Us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IT Wireless offers a wide range of security products and services. When you contact us regarding IT security, we conduct a full assessment of your current system. Based on the assessment, we provide recommendations to help you tighten security and ensure that potential threats do not impact you or your business. Hornet Security Secure your [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":517,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-401","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/pages\/401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/comments?post=401"}],"version-history":[{"count":0,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/pages\/401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/media\/517"}],"wp:attachment":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/media?parent=401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}