{"id":91953,"date":"2024-05-25T07:28:06","date_gmt":"2024-05-25T07:28:06","guid":{"rendered":"https:\/\/csblogging.com\/cloudconc\/?page_id=91953"},"modified":"2025-02-03T12:25:02","modified_gmt":"2025-02-03T12:25:02","slug":"cloud-based-cybersecurity-solutions","status":"publish","type":"page","link":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/","title":{"rendered":"Cloud-based Cybersecurity Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"91953\" class=\"elementor elementor-91953\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26ee988 e-flex e-con-boxed e-con e-parent\" data-id=\"26ee988\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fb4291 elementor-widget elementor-widget-heading\" data-id=\"6fb4291\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Cloudconc cloud-based cybersecurity solutions for factories<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-298794f animated-slow e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"298794f\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffb64f2 elementor-widget elementor-widget-text-editor\" data-id=\"ffb64f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>The manufacturing sector is currently undergoing a digital transformation that sees it rely more on connected machines, cloud apps and remote access. With all of these operational efficiencies come larger attack surfaces which cyber criminals can exploit. In an age where one data breach can cripple production and damage customer trust forever, businesses must now have strong security measures in place. We have developed a full range of industrial automation products like OT devices or IT systems protection software through the use of clouds by Cloudconc.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b6fa13 e-flex e-con-boxed e-con e-parent\" data-id=\"8b6fa13\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a53452 elementor-widget elementor-widget-heading\" data-id=\"3a53452\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding the Cybersecurity Landscape in Manufacturing<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f42bdc elementor-widget elementor-widget-text-editor\" data-id=\"0f42bdc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Because information technology and operations technology systems are merging within the industry, manufacturing faces unique cyber-security problems such as:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad2d298 e-flex e-con-boxed e-con e-parent\" data-id=\"ad2d298\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-19441fe e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"19441fe\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb9610f elementor-widget elementor-widget-rs-service-grid\" data-id=\"cb9610f\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                \t\t\t\t\t    \t\t\t\t\t\t\t    \t\t\t\r\n                <h4  \r\n                class=\"title\">\r\n\r\n                <a href=\"https:\/\/rstheme.com\/products\/wordpress\/bcom\/business-services\/\"  >\r\n                    Legacy Systems                <\/a>\r\n                <\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Most manufacturers still depend on outdated less robust legacy IT &amp; OT networks which are prone to attacks.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30fd41c e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"30fd41c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77ce7f1 elementor-widget elementor-widget-rs-service-grid\" data-id=\"77ce7f1\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                \t\t\t\t\t    \t\t\t\t\t\t\t    \t\t\t\r\n                <h4  \r\n                class=\"title\">\r\n\r\n                <a href=\"https:\/\/rstheme.com\/products\/wordpress\/bcom\/business-services\/\"  >\r\n                    Increased Connectivity                <\/a>\r\n                <\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Industrial IoT (IIoT) devices increase entry points for hackers looking to infiltrate your system via clouds.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b8fb0f e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"3b8fb0f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7df3126 elementor-widget elementor-widget-rs-service-grid\" data-id=\"7df3126\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                \t\t\t\t\t    \t\t\t\t\t\t\t    \t\t\t\r\n                <h4  \r\n                class=\"title\">\r\n\r\n                <a href=\"https:\/\/rstheme.com\/products\/wordpress\/bcom\/business-services\/\"  >\r\n                    Remote Access                <\/a>\r\n                <\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                More remote monitoring plus control means further vulnerability points will be made available for attackers thereby creating additional risks concerning safety controls during production processes.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df64db3 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"df64db3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d30693 elementor-widget elementor-widget-rs-service-grid\" data-id=\"3d30693\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                \t\t\t\t\t    \t\t\t\t\t\t\t    \t\t\t\r\n                <h4  \r\n                class=\"title\">\r\n\r\n                <a href=\"https:\/\/rstheme.com\/products\/wordpress\/bcom\/business-services\/\"  >\r\n                    Supply Chain Vulnerabilities                <\/a>\r\n                <\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Current crop yields as well as yield predictions based on past years\u2019 information            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f06610 e-flex e-con-boxed e-con e-parent\" data-id=\"9f06610\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a56e9a3 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"a56e9a3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20b5dc3 elementor-widget elementor-widget-rs-service-grid\" data-id=\"20b5dc3\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h6 class=\"title\"> Legacy Systems<\/h6>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Most manufacturers still depend on outdated less robust legacy IT &amp; OT networks which are prone to attacks.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2817375 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"2817375\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInRight&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c5f8d2 elementor-widget elementor-widget-rs-service-grid\" data-id=\"9c5f8d2\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h4 class=\"title\"> Increased Connectivity<\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Industrial IoT (IIoT) devices increase entry points for hackers looking to infiltrate your system via clouds.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d5e383 e-flex e-con-boxed e-con e-parent\" data-id=\"2d5e383\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f87b6ef e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"f87b6ef\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d8273f elementor-widget elementor-widget-rs-service-grid\" data-id=\"2d8273f\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h6 class=\"title\"> Supply Chain Vulnerabilities<\/h6>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                A manufacturer&#039;s supply chain weakness could lead to compromised security throughout their supplier network ultimately affecting every party involved.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fe2c17 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"6fe2c17\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInRight&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0bed92 elementor-widget elementor-widget-rs-service-grid\" data-id=\"d0bed92\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h4 class=\"title\"> Remote Access<\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                More remote monitoring plus control means further vulnerability points will be made available for attackers thereby creating additional risks concerning safety controls during production processes.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5937041 e-flex e-con-boxed e-con e-parent\" data-id=\"5937041\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-875736c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"875736c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e94a94 elementor-widget elementor-widget-heading\" data-id=\"7e94a94\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consequences of Cyber Attacks in Manufacturing include but are not limited to;<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48ff556 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"48ff556\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/csblogging.com\/cloudconc\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-list.min.css\">\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-double-angle-pointing-to-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Production Disruptions <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-202d8e2 elementor-widget elementor-widget-text-editor\" data-id=\"202d8e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Malware or system failure may stop assembly lines leading heavy financial losses for companies involved especially if they operate just-in-time manufacturing models;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-171b7df e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"171b7df\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25bbed1 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"25bbed1\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-double-angle-pointing-to-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data Breaches <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8635ec elementor-widget elementor-widget-text-editor\" data-id=\"f8635ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Theft or leakage of trade secrets, customer records as well as proprietary information related with production processes. These incidents harm reputations leading firms into uncompetitiveness;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21a7858 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"21a7858\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f3af7f elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1f3af7f\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-double-angle-pointing-to-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Safety Risks <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe1c918 elementor-widget elementor-widget-text-editor\" data-id=\"fe1c918\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Some industrial processes become unsafe after being tampered by attackers who might cause physical injuries among workers or even environmental pollution.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fc619f e-flex e-con-boxed e-con e-parent\" data-id=\"3fc619f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9919ed9 elementor-widget elementor-widget-heading\" data-id=\"9919ed9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud-Based Cyber Security Solutions as Powerful Defences<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a496d80 elementor-widget elementor-widget-text-editor\" data-id=\"a496d80\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The best way forward when looking at how best we can protect our factories against this digital era is through scalable cost-effective methods provided by cloud based cybersecurity solutions which offer a scalable and cost-effective method of protecting manufacturing operations in the digital age. The following are some of these needs;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51bb28a e-flex e-con-boxed e-con e-parent\" data-id=\"51bb28a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8cee4b6 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"8cee4b6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a42a49 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5a42a49\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-double-angle-pointing-to-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Centralized Security Management <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b44a51 elementor-widget elementor-widget-text-editor\" data-id=\"4b44a51\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This brings together all systems into one place where they can be monitored for any threats with appropriate access controls enforced across both Information Technology (IT) infrastructure as well operational technology (OT) networks;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f826b7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0f826b7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a7d681 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a7d681\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-double-angle-pointing-to-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Advanced Threat Detection & Response <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54a49aa elementor-widget elementor-widget-text-editor\" data-id=\"54a49aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Real time detection should be enabled through use machine learning algorithms capable of spotting sophisticated attacks faster while responding to them accordingly.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bbfbd78 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"bbfbd78\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a36538 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7a36538\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-double-angle-pointing-to-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data Encryption and Security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7797ef6 elementor-widget elementor-widget-text-editor\" data-id=\"7797ef6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Secure data storage by use robust encryption mechanisms offered by cloud providers such that information is always protected whether at rest or in transit.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0406a34 e-flex e-con-boxed e-con e-parent\" data-id=\"0406a34\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f22efad elementor-widget elementor-widget-heading\" data-id=\"f22efad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automated Patch Management <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6263f72 elementor-widget elementor-widget-text-editor\" data-id=\"6263f72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Cloud platforms automate patching processes thus reducing vulnerability exposures within software &amp; firmware running on connected devices thus cutting short attack surfaces<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8b3247 e-flex e-con-boxed e-con e-parent\" data-id=\"a8b3247\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e08e617 elementor-widget elementor-widget-rs-service-grid\" data-id=\"e08e617\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h6 class=\"title\"> Enhanced Awareness Training<\/h6>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Continuous education efforts need to made among employees who should know how best respond against cyber-crime acts after being exposed them using clouds.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ac9ee5 e-flex e-con-boxed e-con e-parent\" data-id=\"3ac9ee5\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e6be4c elementor-widget elementor-widget-heading\" data-id=\"4e6be4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In addition, implementing cloud-based security measures have other benefits apart from just defending against breaches<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff2a06e e-flex e-con-boxed e-con e-parent\" data-id=\"ff2a06e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cecb3de e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"cecb3de\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInDown&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c80c32 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"3c80c32\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e8af21f e-con-full e-flex e-con e-child\" data-id=\"e8af21f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b28593 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4b28593\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-stream\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 128h416c8.84 0 16-7.16 16-16V48c0-8.84-7.16-16-16-16H16C7.16 32 0 39.16 0 48v64c0 8.84 7.16 16 16 16zm480 80H80c-8.84 0-16 7.16-16 16v64c0 8.84 7.16 16 16 16h416c8.84 0 16-7.16 16-16v-64c0-8.84-7.16-16-16-16zm-64 176H16c-8.84 0-16 7.16-16 16v64c0 8.84 7.16 16 16 16h416c8.84 0 16-7.16 16-16v-64c0-8.84-7.16-16-16-16z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90da786 e-con-full e-flex e-con e-child\" data-id=\"90da786\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f781225 elementor-widget elementor-widget-heading\" data-id=\"f781225\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Improved Compliance <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-853c99c elementor-widget elementor-widget-text-editor\" data-id=\"853c99c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Manufacturers can easily comply with industry regulations plus data privacy standards since their details are stored within these systems which facilitate auditing authorities\u2019 checks when required;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-716f0fa e-flex e-con-boxed e-con e-parent\" data-id=\"716f0fa\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c1200d4 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"c1200d4\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInDown&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-980b7c5 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"980b7c5\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-69df746 e-con-full e-flex e-con e-child\" data-id=\"69df746\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4634e16 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4634e16\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-stream\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 128h416c8.84 0 16-7.16 16-16V48c0-8.84-7.16-16-16-16H16C7.16 32 0 39.16 0 48v64c0 8.84 7.16 16 16 16zm480 80H80c-8.84 0-16 7.16-16 16v64c0 8.84 7.16 16 16 16h416c8.84 0 16-7.16 16-16v-64c0-8.84-7.16-16-16-16zm-64 176H16c-8.84 0-16 7.16-16 16v64c0 8.84 7.16 16 16 16h416c8.84 0 16-7.16 16-16v-64c0-8.84-7.16-16-16-16z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31f31c3 e-con-full e-flex e-con e-child\" data-id=\"31f31c3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db9e855 elementor-widget elementor-widget-heading\" data-id=\"db9e855\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reduced IT Infrastructure Costs <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86ae78d elementor-widget elementor-widget-text-editor\" data-id=\"86ae78d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>By moving services off-site via cloud computing companies save money previously spent purchasing own premises hardware\/software firewalls etc., this leads massive savings on capital expenditure budgets especially during lean periods<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9797363 e-flex e-con-boxed e-con e-parent\" data-id=\"9797363\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5404cd6 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"5404cd6\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInDown&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-24155dc e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"24155dc\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31c0588 e-con-full e-flex e-con e-child\" data-id=\"31c0588\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b14b594 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b14b594\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-stream\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 128h416c8.84 0 16-7.16 16-16V48c0-8.84-7.16-16-16-16H16C7.16 32 0 39.16 0 48v64c0 8.84 7.16 16 16 16zm480 80H80c-8.84 0-16 7.16-16 16v64c0 8.84 7.16 16 16 16h416c8.84 0 16-7.16 16-16v-64c0-8.84-7.16-16-16-16zm-64 176H16c-8.84 0-16 7.16-16 16v64c0 8.84 7.16 16 16 16h416c8.84 0 16-7.16 16-16v-64c0-8.84-7.16-16-16-16z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c82e249 e-con-full e-flex e-con e-child\" data-id=\"c82e249\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f16602 elementor-widget elementor-widget-heading\" data-id=\"6f16602\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Scalability\/Flexibility <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5798d1e elementor-widget elementor-widget-text-editor\" data-id=\"5798d1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>These solutions allow businesses choose capacity needed at any given moment so that they scale up or down depending changing demands situational awareness around incidents happening real time basis becomes possible due increased visibility offered by clouds<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8214b21 e-flex e-con-boxed e-con e-parent\" data-id=\"8214b21\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6e8ca7 elementor-widget elementor-widget-text-editor\" data-id=\"d6e8ca7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Cloudconc Cloud-Based Cybersecurity Solutions for Manufacturing Organizations<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-092a9d2 e-flex e-con-boxed e-con e-parent\" data-id=\"092a9d2\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bd4415f e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"bd4415f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca053d elementor-widget elementor-widget-rs-service-grid\" data-id=\"5ca053d\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h6 class=\"title\"> Expertise by Field<\/h6>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                We know much about manufacturing processes, IT\/OT convergence challenges, and the latest cyber threats faced by industry.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bfb811 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"6bfb811\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInRight&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a91b533 elementor-widget elementor-widget-rs-service-grid\" data-id=\"a91b533\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h4 class=\"title\"> Evaluation of Security and Identification of Gaps<\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                What Cloudconc does is evaluate security right from the scratch to expose any vulnerabilities in your infrastructure relating to IT, OT or cloud as a whole.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5adfd68 e-flex e-con-boxed e-con e-parent\" data-id=\"5adfd68\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f12ee47 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"f12ee47\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInLeft&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a682261 elementor-widget elementor-widget-rs-service-grid\" data-id=\"a682261\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h6 class=\"title\"> Cloud Safety Implementation and Management<\/h6>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                We can pick out appropriate measures for ensuring safety in clouds; connect them with other systems that may be already installed and maintain this security status forever on behalf of our customers \u2013 this is what Cloudconc does.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15354e8 e-con-full e-transform e-flex elementor-invisible e-con e-child\" data-id=\"15354e8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.1,&quot;sizes&quot;:[]},&quot;animation_mobile&quot;:&quot;fadeInRight&quot;,&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3382ee elementor-widget elementor-widget-rs-service-grid\" data-id=\"c3382ee\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h4 class=\"title\"> Personalized Cloud Safety Strategy<\/h4>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                Our experts will design for you a specialized plan that will take care of all your needs concerning cloud security while still adhering to universally recognized standards.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc7c27a e-flex e-con-boxed e-con e-parent\" data-id=\"cc7c27a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbee506 elementor-widget elementor-widget-rs-service-grid\" data-id=\"fbee506\" data-element_type=\"widget\" data-widget_type=\"rs-service-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"rs-addon-services style2  \">\r\n\t\t\t<div class=\"services-inner\">\r\n            \r\n    <div class=\"content_part\">\r\n                    <div class=\"services-title\">\t\t\t\t    \t\t\r\n                                    <h6 class=\"title\"> Responding to Incidents &amp; Recovery<\/h6>\r\n                \t\t\t\t    \t\t\r\n            <\/div>\r\n        \r\n                    <div class=\"desc-text\">\r\n                It\u2019s our responsibility as an organization working round-the-clock giving support whenever required during incidents response so that affected firms can restore their operations without wasting much time.            <\/div>\r\n                \r\n            <\/div>\r\n<\/div>\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cloudconc cloud-based cybersecurity solutions for factories The manufacturing sector is currently undergoing a digital transformation that sees it rely more on connected machines, cloud apps and remote access. With all of these operational efficiencies come larger attack surfaces which cyber criminals can exploit. In an age where one data breach can cripple production and damage&#8230;<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":90000,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-91953","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc<\/title>\n<meta name=\"description\" content=\"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc\" \/>\n<meta property=\"og:description\" content=\"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"cloudcons\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-03T12:25:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc\" \/>\n<meta name=\"twitter:description\" content=\"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc","description":"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc","og_description":"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.","og_url":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/","og_site_name":"cloudcons","article_modified_time":"2025-02-03T12:25:02+00:00","twitter_card":"summary_large_image","twitter_title":"Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc","twitter_description":"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/","url":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/","name":"Cloud-Based Cybersecurity Solutions For Manufacturing Industry | Cloudconc","isPartOf":{"@id":"https:\/\/csblogging.com\/cloudconc\/#website"},"datePublished":"2024-05-25T07:28:06+00:00","dateModified":"2025-02-03T12:25:02+00:00","description":"Cloud-based cybersecurity solutions to safeguard manufacturing businesses. Protect your infrastructure, data, and assets with our advanced, scalable security services tailored for the manufacturing industry.","breadcrumb":{"@id":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/cloud-based-cybersecurity-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csblogging.com\/cloudconc\/"},{"@type":"ListItem","position":2,"name":"Industry","item":"https:\/\/csblogging.com\/cloudconc\/industry\/"},{"@type":"ListItem","position":3,"name":"MANUFACTURING","item":"https:\/\/csblogging.com\/cloudconc\/industry\/manufacturing\/"},{"@type":"ListItem","position":4,"name":"Cloud-based Cybersecurity Solutions"}]},{"@type":"WebSite","@id":"https:\/\/csblogging.com\/cloudconc\/#website","url":"https:\/\/csblogging.com\/cloudconc\/","name":"cloudcons","description":"","publisher":{"@id":"https:\/\/csblogging.com\/cloudconc\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csblogging.com\/cloudconc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csblogging.com\/cloudconc\/#organization","name":"cloudcons","url":"https:\/\/csblogging.com\/cloudconc\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csblogging.com\/cloudconc\/#\/schema\/logo\/image\/","url":"https:\/\/csblogging.com\/cloudconc\/wp-content\/uploads\/2024\/02\/SmallPNG_new-.png","contentUrl":"https:\/\/csblogging.com\/cloudconc\/wp-content\/uploads\/2024\/02\/SmallPNG_new-.png","width":158,"height":58,"caption":"cloudcons"},"image":{"@id":"https:\/\/csblogging.com\/cloudconc\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/pages\/91953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/comments?post=91953"}],"version-history":[{"count":28,"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/pages\/91953\/revisions"}],"predecessor-version":[{"id":106024,"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/pages\/91953\/revisions\/106024"}],"up":[{"embeddable":true,"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/pages\/90000"}],"wp:attachment":[{"href":"https:\/\/csblogging.com\/cloudconc\/wp-json\/wp\/v2\/media?parent=91953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}