{"id":2798,"date":"2020-09-25T17:42:39","date_gmt":"2020-09-25T17:42:39","guid":{"rendered":"https:\/\/wp-unity.mspwebsite.com\/?page_id=2798"},"modified":"2021-03-26T06:02:11","modified_gmt":"2021-03-26T10:02:11","slug":"understanding-it","status":"publish","type":"page","link":"https:\/\/nexela.com\/?page_id=2798","title":{"rendered":"Nexela Understanding IT"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2798\" class=\"elementor elementor-2798\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-708a9d8 boxed-content ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"708a9d8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1f6efb3\" data-id=\"1f6efb3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b320fc elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3b320fc\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-blockchain\" tabindex=\"-1\"><img decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/understanding_blockchain-sm.png\" class=\"attachment-full size-full wp-image-2927\" alt=\"Blockchain Image\" srcset=\"\/wp-content\/uploads\/understanding_blockchain-sm.png 205w, \/wp-content\/uploads\/understanding_blockchain-sm-150x150.png 150w, \/wp-content\/uploads\/understanding_blockchain-sm-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-blockchain\">Understanding Blockchain<\/a><\/h3><p class=\"elementor-image-box-description\">The technology behind the ever-popular cryptocurrency Bitcoin is quickly becoming a household name.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1deb70 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"b1deb70\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-blockchain\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-420f785\" data-id=\"420f785\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21b5813 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"21b5813\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-general-data-protection-regulation-compliance\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/gdpr-sm.png\" class=\"attachment-full size-full wp-image-2924\" alt=\"GDPR Image\" srcset=\"\/wp-content\/uploads\/gdpr-sm.png 205w, \/wp-content\/uploads\/gdpr-sm-150x150.png 150w, \/wp-content\/uploads\/gdpr-sm-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-general-data-protection-regulation-compliance\/\">Understanding GDPR<\/a><\/h3><p class=\"elementor-image-box-description\">In April of 2016, the European Union Parliament and Council voted to replace Data Protection Directive.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22a53e9 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"22a53e9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-general-data-protection-regulation-compliance\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-98f9eb8\" data-id=\"98f9eb8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f735cfd elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f735cfd\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-automation\" tabindex=\"-1\"><img decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/automation-sm.png\" class=\"attachment-full size-full wp-image-2921\" alt=\"Automation Image\" srcset=\"\/wp-content\/uploads\/automation-sm.png 205w, \/wp-content\/uploads\/automation-sm-150x150.png 150w, \/wp-content\/uploads\/automation-sm-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-automation\">Understanding Automation<\/a><\/h3><p class=\"elementor-image-box-description\">The automation of technology service delivery gives you a stronger business by streamlining the services. <\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26afd2a elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"26afd2a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-automation\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e5f18cc boxed-content ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e5f18cc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-438b90c\" data-id=\"438b90c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3fad213 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3fad213\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-ransomware\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/ransomware-sm.png\" class=\"attachment-full size-full wp-image-2918\" alt=\"Ransomware Image\" srcset=\"\/wp-content\/uploads\/ransomware-sm.png 205w, \/wp-content\/uploads\/ransomware-sm-150x150.png 150w, \/wp-content\/uploads\/ransomware-sm-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-ransomware\">Understanding Ransomware<\/a><\/h3><p class=\"elementor-image-box-description\">What you need to know about the malware that hits your data, and then your wallet.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-290170a elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"290170a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-ransomware\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-63d994e\" data-id=\"63d994e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-addb4fc elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"addb4fc\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-shadow-it\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/understanding_shadow_it_sm.jpg\" class=\"attachment-full size-full wp-image-2915\" alt=\"Shadow IT Image\" srcset=\"\/wp-content\/uploads\/understanding_shadow_it_sm.jpg 205w, \/wp-content\/uploads\/understanding_shadow_it_sm-150x150.jpg 150w, \/wp-content\/uploads\/understanding_shadow_it_sm-75x75.jpg 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-shadow-it\/\">Understanding Shadow IT<\/a><\/h3><p class=\"elementor-image-box-description\">Having a software deployment strategy for your company\u2019s needs is important.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87a3569 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"87a3569\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-shadow-it\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-458792d\" data-id=\"458792d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b880b0f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b880b0f\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-your-virtual-identity\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/identity_security_image.png\" class=\"attachment-full size-full wp-image-2912\" alt=\"Virtual Identity Image\" srcset=\"\/wp-content\/uploads\/identity_security_image.png 205w, \/wp-content\/uploads\/identity_security_image-150x150.png 150w, \/wp-content\/uploads\/identity_security_image-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-your-virtual-identity\/\">Your Virtual Identity<\/a><\/h3><p class=\"elementor-image-box-description\">Protect your business from online identity thieves with secure business infrastructures.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c429207 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"c429207\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-your-virtual-identity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9c7df4 boxed-content title-three-lines ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9c7df4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b18a841\" data-id=\"b18a841\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64c524f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"64c524f\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-the-modern-office\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/the_modern_office-small.png\" class=\"attachment-full size-full wp-image-2909\" alt=\"The Modern Office Image\" srcset=\"\/wp-content\/uploads\/the_modern_office-small.png 205w, \/wp-content\/uploads\/the_modern_office-small-150x150.png 150w, \/wp-content\/uploads\/the_modern_office-small-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-the-modern-office\/\">Understanding the Modern Office<\/a><\/h3><p class=\"elementor-image-box-description\">Nexela is your Philadelphia leader for comprehensive managed IT services.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc9ec61 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"dc9ec61\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-the-modern-office\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5c5225c\" data-id=\"5c5225c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89be6f1 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"89be6f1\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/it-threat-glossary\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/it_threat_glossary.png\" class=\"attachment-full size-full wp-image-2904\" alt=\"IT Threat Glossary Image\" srcset=\"\/wp-content\/uploads\/it_threat_glossary.png 205w, \/wp-content\/uploads\/it_threat_glossary-150x150.png 150w, \/wp-content\/uploads\/it_threat_glossary-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/it-threat-glossary\/\">Nexela's IT Threat Glossary<\/a><\/h3><p class=\"elementor-image-box-description\">Understand what threats are in store for your business. The Internet can be dangerous.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8fe20f elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"c8fe20f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/it-threat-glossary\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c8bf75d\" data-id=\"c8bf75d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e9f2dad elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e9f2dad\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-business-continuity\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/understanding_business_continuity_lg.png\" class=\"attachment-full size-full wp-image-2901\" alt=\"Business Continuity Image\" srcset=\"\/wp-content\/uploads\/understanding_business_continuity_lg.png 205w, \/wp-content\/uploads\/understanding_business_continuity_lg-150x150.png 150w, \/wp-content\/uploads\/understanding_business_continuity_lg-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-business-continuity\/\">Business Continuity<\/a><\/h3><p class=\"elementor-image-box-description\">A well-structured Continuity plan can save your business and employees.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fd18a7 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"7fd18a7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-business-continuity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f1eaa65 boxed-content title-two-lines ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1eaa65\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-46abca2\" data-id=\"46abca2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2426b92 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2426b92\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-windows-10\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/understanding_windows_10_image.png\" class=\"attachment-full size-full wp-image-2944\" alt=\"Windows 10 Image\" srcset=\"\/wp-content\/uploads\/understanding_windows_10_image.png 205w, \/wp-content\/uploads\/understanding_windows_10_image-150x150.png 150w, \/wp-content\/uploads\/understanding_windows_10_image-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-windows-10\/\">Windows 10<\/a><\/h3><p class=\"elementor-image-box-description\">Learn about the latest Windows operating system for your IT infrastructure.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56befa6 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"56befa6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-windows-10\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5824965\" data-id=\"5824965\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fc3744 iot-description elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2fc3744\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-the-internet-of-things\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/internet_of-things_image.png\" class=\"attachment-full size-full wp-image-2942\" alt=\"Internet of Things Image\" srcset=\"\/wp-content\/uploads\/internet_of-things_image.png 205w, \/wp-content\/uploads\/internet_of-things_image-150x150.png 150w, \/wp-content\/uploads\/internet_of-things_image-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-the-internet-of-things\/\">Internet of Things<\/a><\/h3><p class=\"elementor-image-box-description\">Our UTM is designed to protect your network from various, harmful threats.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8db73ff elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"8db73ff\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-the-internet-of-things\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7b19efb\" data-id=\"7b19efb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f423c60 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f423c60\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-network-security\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/network_security_image.png\" class=\"attachment-full size-full wp-image-2940\" alt=\"Network Security Image\" srcset=\"\/wp-content\/uploads\/network_security_image.png 205w, \/wp-content\/uploads\/network_security_image-150x150.png 150w, \/wp-content\/uploads\/network_security_image-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-network-security\/\">Network Security<\/a><\/h3><p class=\"elementor-image-box-description\">Maximizing Your Business\u2019 Security and their day-to-day operations.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e00b3 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"10e00b3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-network-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c49562c boxed-content ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c49562c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-23b2e7c\" data-id=\"23b2e7c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08d7a7d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"08d7a7d\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-sox\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"197\" src=\"\/wp-content\/uploads\/sox_compliance_image.png\" class=\"attachment-full size-full wp-image-2938\" alt=\"SOX Image\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-sox\">Understanding SOX<\/a><\/h3><p class=\"elementor-image-box-description\">Ensuring your IT Infrastructure is SOX-complaint is a necessity.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4cab7d elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"c4cab7d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-sox\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d30a5c3\" data-id=\"d30a5c3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f1c6eb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"4f1c6eb\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-byod\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/byod-image.png\" class=\"attachment-full size-full wp-image-2936\" alt=\"BYOD Image\" srcset=\"\/wp-content\/uploads\/byod-image.png 205w, \/wp-content\/uploads\/byod-image-150x150.png 150w, \/wp-content\/uploads\/byod-image-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-byod\/\">Understanding BYOD<\/a><\/h3><p class=\"elementor-image-box-description\">Your company can use advanced mobility to enhance production.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93c8b01 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"93c8b01\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-byod\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-bef7dcc\" data-id=\"bef7dcc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdeb7ba elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"fdeb7ba\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-pci-dss\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"\/wp-content\/uploads\/payment_card_industry_image.png\" class=\"attachment-full size-full wp-image-2934\" alt=\"PCI Image\" srcset=\"\/wp-content\/uploads\/payment_card_industry_image.png 200w, \/wp-content\/uploads\/payment_card_industry_image-150x150.png 150w, \/wp-content\/uploads\/payment_card_industry_image-75x75.png 75w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-pci-dss\/\">Understanding PCI DSS<\/a><\/h3><p class=\"elementor-image-box-description\">Solutions for companies searching for a secure interface.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-feddb17 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"feddb17\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-pci-dss\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2334426 boxed-content ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2334426\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-cbf895d\" data-id=\"cbf895d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91d20ef elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"91d20ef\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/understanding-hipaa\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"222\" src=\"\/wp-content\/uploads\/hipaa-image.png\" class=\"attachment-full size-full wp-image-2932\" alt=\"Hipaa Image\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/understanding-hipaa\/\">HIPAA Compliance<\/a><\/h3><p class=\"elementor-image-box-description\">Laws for the secure and private transfer of individual's medical information.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93dff99 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"93dff99\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/understanding-hipaa\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-89abbb1\" data-id=\"89abbb1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-921d9d1 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"921d9d1\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/understanding-it\/cloud-computing\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"205\" src=\"\/wp-content\/uploads\/cloud-computing-image.png\" class=\"attachment-full size-full wp-image-2929\" alt=\"Cloud Computing Image\" srcset=\"\/wp-content\/uploads\/cloud-computing-image.png 205w, \/wp-content\/uploads\/cloud-computing-image-150x150.png 150w, \/wp-content\/uploads\/cloud-computing-image-75x75.png 75w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/understanding-it\/cloud-computing\/\">Cloud Computing<\/a><\/h3><p class=\"elementor-image-box-description\">Free yourself from traditional IT with Cloud Services and Cloud computing.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db5ef98 elementor-align-justify readmore elementor-widget elementor-widget-button\" data-id=\"db5ef98\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/understanding-it\/cloud-computing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-66215e5\" data-id=\"66215e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Understanding Blockchain The technology behind the ever-popular cryptocurrency Bitcoin is quickly becoming a household name. Read More Understanding GDPR In April of 2016, the European Union Parliament and Council voted to replace Data Protection Directive. Read More Understanding Automation The automation of technology service delivery gives you a stronger business by streamlining the services. Read More Understanding Ransomware What you need to know about the malware that hits your data, and then your wallet. Read More Understanding Shadow IT Having a software deployment strategy for your company\u2019s needs is important. Read More Your Virtual Identity Protect your business from online identity thieves with secure business infrastructures. Read More Understanding the Modern Office NOCOLOGY is your Upstate New York leader for comprehensive managed IT services. Read More NOCOLOGY&#8217;s IT Threat Glossary Understand what threats are in store for your business. The Internet can be dangerous. Read More Business Continuity A well-structured Continuity plan can save your business and employees. Read More Windows 10 Learn about the latest Windows operating system for your IT infrastructure. Read More Internet of Things Our UTM is designed to protect your network from various, harmful threats. Read More Network Security Maximizing Your Business\u2019 Security and their day-to-day operations. Read More Understanding SOX Ensuring your IT Infrastructure is SOX-complaint is a necessity. Read More Understanding BYOD Your company can use advanced mobility to enhance production. Read More Understanding PCI DSS Solutions for companies searching for a secure interface. Read More HIPAA Compliance Laws for the secure and private transfer of individual&#8217;s medical information. Read More Cloud Computing Free yourself from traditional IT with Cloud Services and Cloud computing. Read More<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2798","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding IT | Philadelphia, PA | Nexela<\/title>\n<meta name=\"description\" content=\"Learn how to reduce IT security risk to your business and become compliant with IT industry standards. Understanding these tools that can help your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nexela.com\/?page_id=2798\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding IT | Philadelphia, PA | Nexela\" \/>\n<meta property=\"og:description\" content=\"Learn how to reduce IT security risk to your business and become compliant with IT industry standards. Understanding these tools that can help your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nexela.com\/?page_id=2798\" \/>\n<meta property=\"og:site_name\" content=\"| Philadelphia, PA | Nexela\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PhiladelphiaITsupport\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-26T10:02:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NexelaInc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nexela.com\/?page_id=2798\",\"url\":\"https:\/\/nexela.com\/?page_id=2798\",\"name\":\"Understanding IT | Philadelphia, PA | Nexela\",\"isPartOf\":{\"@id\":\"https:\/\/nexela.com\/#website\"},\"datePublished\":\"2020-09-25T17:42:39+00:00\",\"dateModified\":\"2021-03-26T10:02:11+00:00\",\"description\":\"Learn how to reduce IT security risk to your business and become compliant with IT industry standards. Understanding these tools that can help your business.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nexela.com\/?page_id=2798\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nexela.com\/#website\",\"url\":\"https:\/\/nexela.com\/\",\"name\":\"| Philadelphia, PA | Nexela\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nexela.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding IT | Philadelphia, PA | Nexela","description":"Learn how to reduce IT security risk to your business and become compliant with IT industry standards. Understanding these tools that can help your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nexela.com\/?page_id=2798","og_locale":"en_US","og_type":"article","og_title":"Understanding IT | Philadelphia, PA | Nexela","og_description":"Learn how to reduce IT security risk to your business and become compliant with IT industry standards. Understanding these tools that can help your business.","og_url":"https:\/\/nexela.com\/?page_id=2798","og_site_name":"| Philadelphia, PA | Nexela","article_publisher":"https:\/\/www.facebook.com\/PhiladelphiaITsupport","article_modified_time":"2021-03-26T10:02:11+00:00","twitter_card":"summary_large_image","twitter_site":"@NexelaInc","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nexela.com\/?page_id=2798","url":"https:\/\/nexela.com\/?page_id=2798","name":"Understanding IT | Philadelphia, PA | Nexela","isPartOf":{"@id":"https:\/\/nexela.com\/#website"},"datePublished":"2020-09-25T17:42:39+00:00","dateModified":"2021-03-26T10:02:11+00:00","description":"Learn how to reduce IT security risk to your business and become compliant with IT industry standards. Understanding these tools that can help your business.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nexela.com\/?page_id=2798"]}]},{"@type":"WebSite","@id":"https:\/\/nexela.com\/#website","url":"https:\/\/nexela.com\/","name":"| Philadelphia, PA | Nexela","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nexela.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/pages\/2798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2798"}],"version-history":[{"count":0,"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/pages\/2798\/revisions"}],"wp:attachment":[{"href":"https:\/\/nexela.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}