{"id":6275,"date":"2023-08-13T23:39:46","date_gmt":"2023-08-13T23:39:46","guid":{"rendered":"https:\/\/mik.innovativesolution.co.ke\/?page_id=6275"},"modified":"2023-08-16T16:50:27","modified_gmt":"2023-08-16T16:50:27","slug":"security-and-data-integrity","status":"publish","type":"page","link":"https:\/\/frequency.co.ke\/?page_id=6275","title":{"rendered":"Security and data integrity"},"content":{"rendered":"<section class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1531818488553{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 95px !important;padding-bottom: 80px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1531818384661{margin-top: 0px !important;margin-bottom: 40px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;SERVER SECURITY&#8221; font_container=&#8221;tag:h6|font_size:16px|text_align:left|color:%23181616|line_height:26px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-medium&#8221; css=&#8221;.vc_custom_1692203997097{margin-top: 0px !important;margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;Security and Data Integrity&#8221; font_container=&#8221;tag:h1|font_size:35px|text_align:left|color:%23181616|line_height:46px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-bold&#8221; css=&#8221;.vc_custom_1692204225968{margin-top: 0px !important;margin-bottom: 25px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1692204248520{margin-top: 0px !important;margin-bottom: 35px !important;}&#8221;]The security of your data is our top priority. We implement robust security solutions, including firewalls in the form of software or hardware solutions. We perform port analysis on your existing firewall upon request. We set up or optimize your intrusion detection system to protect your data from threats. We develop a backup concept with you to minimize the possibility of data loss. In case of data loss due to accidental deletion by users, we will assist you with our recovery strategies.[\/vc_column_text]\r<!-- radiantthemes-custom-button -->\r<div class=\"radiantthemes-custom-button hover-style-five rt1221769139  wpb_animate_when_almost_visible wpb_fadeIn fadeIn display-inline-block\"  data-button-direction=\"center\" data-button-fullwidth=\"false\"  data-button-icon-position=\"right\"><a style=\" color: #ffffff; line-height: 26px; font-size: 15px;\" class=\"radiantthemes-custom-button-main  vc_custom_1692204111051\" href=\"https:\/\/mik.innovativesolution.co.ke\/contact-us-version-1\/\"  title=\"Contact Us\" target=\"_self\"><div class=\"placeholder\">Contact Us<i class=\"\"><\/i><\/div><\/a><\/div>\r<!-- radiantthemes-custom-button -->\r[\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1531818391315{margin-top: 0px !important;margin-bottom: 40px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_single_image image=&#8221;6355&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1692204269165{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;][\/vc_column][\/vc_row]\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1531818488553{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 95px !important;padding-bottom: 80px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1531818384661{margin-top: 0px !important;margin-bottom: 40px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;SERVER SECURITY&#8221; font_container=&#8221;tag:h6|font_size:16px|text_align:left|color:%23181616|line_height:26px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-medium&#8221; css=&#8221;.vc_custom_1692203997097{margin-top: 0px !important;margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;Security and Data Integrity&#8221; font_container=&#8221;tag:h1|font_size:35px|text_align:left|color:%23181616|line_height:46px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-bold&#8221; css=&#8221;.vc_custom_1692204225968{margin-top: 0px !important;margin-bottom: 25px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1692204248520{margin-top: 0px !important;margin-bottom: 35px !important;}&#8221;]The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6275","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/6275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6275"}],"version-history":[{"count":3,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/6275\/revisions"}],"predecessor-version":[{"id":6405,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/6275\/revisions\/6405"}],"wp:attachment":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}