{"id":2001,"date":"2024-01-16T01:48:05","date_gmt":"2024-01-16T01:48:05","guid":{"rendered":"https:\/\/qorosec.com\/?page_id=2001"},"modified":"2024-01-16T03:10:53","modified_gmt":"2024-01-16T03:10:53","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2001\" class=\"elementor elementor-2001\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f510f8 elementor-section-stretched elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle elementor-invisible\" data-id=\"3f510f8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b29ff2\" data-id=\"3b29ff2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b287ad6 elementor-widget elementor-widget-heading\" data-id=\"b287ad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CyberSecurity\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ae1976 elementor-widget elementor-widget-text-editor\" data-id=\"6ae1976\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Guard your digital fortress with our cybersecurity services. From deploying state-of-the-art solutions like multi-factor authentication and endpoint protection to offering expert threat detection powered by artificial intelligence, we fortify your digital landscape against evolving cyber threats, ensuring resilience and peace of mind for your business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8b9efbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b9efbb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aed80cc\" data-id=\"aed80cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8fd0895 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8fd0895\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0e25a85\" data-id=\"0e25a85\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76fda57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76fda57\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27c1efd\" data-id=\"27c1efd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9896df9 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"9896df9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-edit\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMulti-Factor Authentication (MFA) Deployment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tStrengthen your security posture with our MFA deployment service. We implement multi-factor authentication, an effective deterrent against unauthorized access, ensuring an extra layer of defense for your digital assets.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-daa3f4c\" data-id=\"daa3f4c\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1b98f6 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"f1b98f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-lock\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t<p style=\"border-style: solid;--tw-border-spacing-x:0;--tw-border-spacing-y:0;--tw-translate-x:0;--tw-translate-y:0;--tw-rotate:0;--tw-skew-x:0;--tw-skew-y:0;--tw-scale-x:1;--tw-scale-y:1;--tw-pan-x:;--tw-pan-y:;--tw-pinch-zoom:;--tw-scroll-snap-strictness:proximity;--tw-ordinal:;--tw-slashed-zero:;--tw-numeric-figure:;--tw-numeric-spacing:;--tw-numeric-fraction:;--tw-ring-inset:;--tw-ring-offset-width:0px;--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;--tw-shadow-colored:0 0 #0000;--tw-blur:;--tw-brightness:;--tw-contrast:;--tw-grayscale:;--tw-hue-rotate:;--tw-invert:;--tw-saturate:;--tw-sepia:;--tw-drop-shadow:;--tw-backdrop-blur:;--tw-backdrop-brightness:;--tw-backdrop-contrast:;--tw-backdrop-grayscale:;--tw-backdrop-hue-rotate:;--tw-backdrop-invert:;--tw-backdrop-opacity:;--tw-backdrop-saturate:;--tw-backdrop-sepia:;margin-bottom: 0px;text-align: center;line-height: 2rem\"><\/p>Data Loss Preventation (DLP) Implementation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSafeguard your sensitive data with our DLP services. Our solutions prevent data leaks and unauthorized access, offering comprehensive protection against both external threats and inadvertent breaches.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6a85468 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a85468\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1d65d90\" data-id=\"1d65d90\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32ecb48 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"32ecb48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-shield\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEndpoint Protection Solutions\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProtect your network's integrity with our Endpoint Protection services. We deploy advanced solutions that secure individual devices, defending against malware, ransomware, and other cyber threats to keep your systems resilient.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5a9832e\" data-id=\"5a9832e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d30fff7 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"d30fff7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-book-open\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSecurity Awareness Training\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEmpower your team against cyber threats with our Security Awareness Training. We equip your staff with the knowledge and skills needed to identify and respond to potential security risks, creating a vigilant and cyber-aware workforce.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CyberSecurity\u200b Guard your digital fortress with our cybersecurity services. From deploying state-of-the-art solutions like multi-factor authentication and endpoint protection to offering expert threat detection powered by artificial intelligence, we fortify your digital landscape against evolving cyber threats, ensuring resilience and peace of mind for your business. Multi-Factor Authentication (MFA) Deployment Strengthen your security posture with &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/\"> <span class=\"screen-reader-text\">Cybersecurity<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":21,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-2001","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Qorosec - Software Testing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Qorosec - Software Testing\" \/>\n<meta property=\"og:description\" content=\"CyberSecurity\u200b Guard your digital fortress with our cybersecurity services. From deploying state-of-the-art solutions like multi-factor authentication and endpoint protection to offering expert threat detection powered by artificial intelligence, we fortify your digital landscape against evolving cyber threats, ensuring resilience and peace of mind for your business. Multi-Factor Authentication (MFA) Deployment Strengthen your security posture with &hellip; Cybersecurity Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Qorosec - Software Testing\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-16T03:10:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/services\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/services\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - Qorosec - Software Testing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#website\"},\"datePublished\":\"2024-01-16T01:48:05+00:00\",\"dateModified\":\"2024-01-16T03:10:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/services\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/qorosec.com\\\/index.php\\\/services\\\/cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/services\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/qorosec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#website\",\"url\":\"https:\\\/\\\/qorosec.com\\\/\",\"name\":\"Qorosec - Software Testing\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/qorosec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#organization\",\"name\":\"Qorosec - Software Testing\",\"url\":\"https:\\\/\\\/qorosec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/qorosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/qorosec-8.png\",\"contentUrl\":\"https:\\\/\\\/qorosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/qorosec-8.png\",\"width\":499,\"height\":103,\"caption\":\"Qorosec - Software Testing\"},\"image\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Qorosec - Software Testing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Qorosec - Software Testing","og_description":"CyberSecurity\u200b Guard your digital fortress with our cybersecurity services. From deploying state-of-the-art solutions like multi-factor authentication and endpoint protection to offering expert threat detection powered by artificial intelligence, we fortify your digital landscape against evolving cyber threats, ensuring resilience and peace of mind for your business. Multi-Factor Authentication (MFA) Deployment Strengthen your security posture with &hellip; Cybersecurity Read More &raquo;","og_url":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/","og_site_name":"Qorosec - Software Testing","article_modified_time":"2024-01-16T03:10:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/","url":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/","name":"Cybersecurity - Qorosec - Software Testing","isPartOf":{"@id":"https:\/\/qorosec.com\/#website"},"datePublished":"2024-01-16T01:48:05+00:00","dateModified":"2024-01-16T03:10:53+00:00","breadcrumb":{"@id":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/qorosec.com\/index.php\/services\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/qorosec.com\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/qorosec.com\/index.php\/services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/qorosec.com\/#website","url":"https:\/\/qorosec.com\/","name":"Qorosec - Software Testing","description":"","publisher":{"@id":"https:\/\/qorosec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/qorosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/qorosec.com\/#organization","name":"Qorosec - Software Testing","url":"https:\/\/qorosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/qorosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/qorosec.com\/wp-content\/uploads\/2023\/04\/qorosec-8.png","contentUrl":"https:\/\/qorosec.com\/wp-content\/uploads\/2023\/04\/qorosec-8.png","width":499,"height":103,"caption":"Qorosec - Software Testing"},"image":{"@id":"https:\/\/qorosec.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/pages\/2001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=2001"}],"version-history":[{"count":15,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/pages\/2001\/revisions"}],"predecessor-version":[{"id":2059,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/pages\/2001\/revisions\/2059"}],"up":[{"embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/pages\/21"}],"wp:attachment":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=2001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}