1:"$Sreact.fragment" 2:I[6691,["/_next/static/chunks/ad943b4a4048068d.js","/_next/static/chunks/c44cb8750ce96b65.js","/_next/static/chunks/90e1ac0e0d74f3e7.js"],"default"] 3:I[39756,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] 4:I[37457,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] 5:I[7602,["/_next/static/chunks/ad943b4a4048068d.js","/_next/static/chunks/c44cb8750ce96b65.js","/_next/static/chunks/90e1ac0e0d74f3e7.js"],"default"] 15:I[68027,[],"default"] :HL["/_next/static/chunks/0d47d0c13a70aea9.css","style"] :HL["/_next/static/media/e8f2fbee2754df70-s.p.9b7a96b4.woff2","font",{"crossOrigin":"","type":"font/woff2"}] 0:{"P":null,"b":"Dx2wfYnVmJhg4TVB_-lM_","c":["","services","cyber-security"],"q":"","i":false,"f":[[["",{"children":["services",{"children":["cyber-security",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/0d47d0c13a70aea9.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/ad943b4a4048068d.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/c44cb8750ce96b65.js","async":true,"nonce":"$undefined"}],["$","script","script-2",{"src":"/_next/static/chunks/90e1ac0e0d74f3e7.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"en","children":[["$","head",null,{"children":["$","link",null,{"rel":"icon","href":"/smatech_t_logo.svg","type":"image/svg+xml"}]}],["$","body",null,{"className":"montserrat_9f51c4c3-module__UzAAjW__variable antialiased text-black font-sans","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}]]}]]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[["$","div",null,{"className":"pt-24 text-black bg-white","children":[["$","div",null,{"className":"flex flex-col items-center space-y-6 text-center ","children":[["$","p",null,{"className":"!text-sm !font-bold !text-[#8DC440] pt-20 md:pt-0","children":"Our Solutions"}],["$","h1",null,{"className":"!text-[#03577A] !text-3xl xl:!text-[53px] !font-bold lg:!text-4xl","children":["Industry leading systems ",["$","br",null,{}]," and solutions"]}],["$","p",null,{"children":["We are a leading provider of IT and cyber security solutions ",["$","br",null,{}],"for businesses of all sizes. Whether you need to protect your ",["$","br",null,{}],"data, optimize your network, or streamline your operations, ",["$","br",null,{}],"we have the expertise to help you achieve your goals."]}]]}],["$","section",null,{"className":"flex flex-col-reverse items-center gap-10 px-5 py-16 md:flex-row md:py-14 md:px-24","children":[["$","div",null,{"className":"space-y-4 md:w-1/2","children":[["$","h2",null,{"className":"text-3xl font-bold text-gray-900","children":"Leader in cybersecurity and data protection"}],["$","p",null,{"className":"text-base text-gray-600","children":"Our advanced managed cyber security services will safeguard your organisation from threats and vulnerabilities, be they malicious or accidental."}],["$","div",null,{"className":"my-6 border-b border-gray-300"}],["$","div",null,{"className":"grid grid-cols-1 gap-6 md:grid-cols-2","children":[["$","div","0",{"className":"flex flex-col items-center text-center md:items-start md:text-left","children":[["$","div",null,{"className":"mb-3 text-4xl text-[#03577A]","children":"$L6"}],"$L7","$L8"]}],"$L9"]}]]}],"$La"]}],"$Lb","$Lc","$Ld","$Le","$Lf","$L10"]}],["$L11","$L12"],"$L13"]}],{},null,false,false]},null,false,false]},null,false,false]},null,false,false],"$L14",false]],"m":"$undefined","G":["$15",[]],"S":true} 17:I[12842,["/_next/static/chunks/ad943b4a4048068d.js","/_next/static/chunks/c44cb8750ce96b65.js","/_next/static/chunks/90e1ac0e0d74f3e7.js","/_next/static/chunks/9c7a5cdf31b73684.js","/_next/static/chunks/222c775e8f5cf4ad.js"],"default"] 18:I[58897,["/_next/static/chunks/ad943b4a4048068d.js","/_next/static/chunks/c44cb8750ce96b65.js","/_next/static/chunks/90e1ac0e0d74f3e7.js","/_next/static/chunks/9c7a5cdf31b73684.js","/_next/static/chunks/222c775e8f5cf4ad.js"],"default"] 19:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"OutletBoundary"] 1a:"$Sreact.suspense" 1c:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"ViewportBoundary"] 1e:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"MetadataBoundary"] :HL["/cyber_security.png","image"] :HL["/cyber_security_2.png","image"] :HL["/cyber_security_3.png","image"] 6:["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock w-8 h-8","aria-hidden":"true","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}] 7:["$","h3",null,{"className":"font-semibold text-gray-900 text-md","children":"Risk & threat"}] 8:["$","p",null,{"className":"mt-1 text-sm text-gray-600","children":"We support you in making your vision a reality and make."}] 9:["$","div","1",{"className":"flex flex-col items-center text-center md:items-start md:text-left","children":[["$","div",null,{"className":"mb-3 text-4xl text-[#03577A]","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield-check w-8 h-8","aria-hidden":"true","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}]}],["$","h3",null,{"className":"font-semibold text-gray-900 text-md","children":"Protect"}],["$","p",null,{"className":"mt-1 text-sm text-gray-600","children":"We support you in making your vision a reality and make."}]]}] a:["$","div",null,{"className":"flex my-5 overflow-hidden md:w-1/2 h-96 rounded-xl","children":["$","img",null,{"src":"/cyber_security.png","alt":"Cybersecurity illustration","width":500,"height":500,"className":"object-cover w-full h-full"}]}] b:["$","section",null,{"className":"flex flex-col items-center w-full gap-10 px-5 py-16 md:flex-row md:py-14 md:px-24","children":[["$","div",null,{"className":"flex my-5 overflow-hidden md:w-1/2 h-96 rounded-xl","children":["$","img",null,{"src":"/cyber_security_2.png","alt":"Cybersecurity illustration","width":500,"height":500,"className":"object-cover w-full h-full"}]}],["$","div",null,{"className":"space-y-4 md:w-1/2","children":[["$","h2",null,{"className":"text-3xl font-bold text-gray-900","children":"Cybersecurity services and solutions per markets"}],["$","p",null,{"className":"text-base text-gray-600","children":"Capitalising on Thales expertise in manufacturing solutions for main markets as well as on strong cyber integration capabilities for large and complex projects"}],["$","div",null,{"className":"my-6 border-b border-gray-300"}],["$","div",null,{"className":"grid grid-cols-1 gap-6 md:grid-cols-2","children":[["$","div","0",{"className":"flex flex-col items-center text-center md:items-start md:text-left","children":[["$","div",null,{"className":"mb-3 text-4xl text-[#03577A]","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-radar w-8 h-8","aria-hidden":"true","children":[["$","path","z3du51",{"d":"M19.07 4.93A10 10 0 0 0 6.99 3.34"}],["$","path","oypzma",{"d":"M4 6h.01"}],["$","path","qzzz0",{"d":"M2.29 9.62A10 10 0 1 0 21.31 8.35"}],["$","path","1yjesh",{"d":"M16.24 7.76A6 6 0 1 0 8.23 16.67"}],["$","path","mhygvu",{"d":"M12 18h.01"}],["$","path","1u2y91",{"d":"M17.99 11.66A6 6 0 0 1 15.77 16.67"}],["$","circle","1c9p78",{"cx":"12","cy":"12","r":"2"}],["$","path","mhq4k0",{"d":"m13.41 10.59 5.66-5.66"}],"$undefined"]}]}],["$","h3",null,{"className":"font-semibold text-gray-900 text-md","children":"Detect & respond"}],["$","p",null,{"className":"mt-1 text-sm text-gray-600","children":"We support you in making your vision a reality and make."}]]}],["$","div","1",{"className":"flex flex-col items-center text-center md:items-start md:text-left","children":[["$","div",null,{"className":"mb-3 text-4xl text-[#03577A]","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-book-open w-8 h-8","aria-hidden":"true","children":[["$","path","1akyts",{"d":"M12 7v14"}],["$","path","ruj8y",{"d":"M3 18a1 1 0 0 1-1-1V4a1 1 0 0 1 1-1h5a4 4 0 0 1 4 4 4 4 0 0 1 4-4h5a1 1 0 0 1 1 1v13a1 1 0 0 1-1 1h-6a3 3 0 0 0-3 3 3 3 0 0 0-3-3z"}],"$undefined"]}]}],["$","h3",null,{"className":"font-semibold text-gray-900 text-md","children":"Train & experiment"}],["$","p",null,{"className":"mt-1 text-sm text-gray-600","children":"We support you in making your vision a reality and make."}]]}]]}]]}]]}] c:["$","div",null,{"className":"flex flex-col items-center space-y-6 text-center bg-gradient-to-t from-[#d5f3ff] to-white","children":[["$","p",null,{"className":"!text-sm !font-bold !text-[#8DC440] pt-20 md:pt-0","children":"BENEFITS"}],["$","h1",null,{"className":"!text-[#03577A] !text-3xl xl:!text-[53px] !font-bold lg:!text-4xl","children":["Why do you need ",["$","br",null,{}]," cybersecurity?"]}],["$","p",null,{"children":["That's more than 2,200 attacks daily. Is your business protected ",["$","br",null,{}],"from the ever looming threat of would-be hackers?"]}]]}] d:["$","section",null,{"className":"flex flex-col gap-10 pt-10 pb-10 md:pb-24 px-5 text-black md:px-24 md:flex-row bg-[#d5f3ff] md:pt-14","children":[["$","div","0",{"className":"flex flex-col items-center space-y-5 text-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":40,"height":40,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-user-x text-[#4A90A4] hover:text-[#8DC440]","aria-hidden":"true","children":[["$","path","1yyitq",{"d":"M16 21v-2a4 4 0 0 0-4-4H6a4 4 0 0 0-4 4v2"}],["$","circle","nufk8",{"cx":"9","cy":"7","r":"4"}],["$","line","3nzzx3",{"x1":"17","x2":"22","y1":"8","y2":"13"}],["$","line","1swrse",{"x1":"22","x2":"17","y1":"8","y2":"13"}],"$undefined"]}],["$","h1",null,{"className":"text-2xl font-bold capitalize","children":"Internal Attacks"}],["$","p",null,{"className":"text-sm lg:text-xs xl:text-sm","children":"A high value target to hackers but sometimes the hackers are already inside your network. Whether intentionally or unintentionally, 60% of all cybersecurity breaches originate from within the organization itself."}]]}],["$","div","1",{"className":"flex flex-col items-center space-y-5 text-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":40,"height":40,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-eye-off text-[#4A90A4] hover:text-[#8DC440]","aria-hidden":"true","children":[["$","path","ct8e1f",{"d":"M10.733 5.076a10.744 10.744 0 0 1 11.205 6.575 1 1 0 0 1 0 .696 10.747 10.747 0 0 1-1.444 2.49"}],["$","path","151rxh",{"d":"M14.084 14.158a3 3 0 0 1-4.242-4.242"}],["$","path","13bj9a",{"d":"M17.479 17.499a10.75 10.75 0 0 1-15.417-5.151 1 1 0 0 1 0-.696 10.75 10.75 0 0 1 4.446-5.143"}],["$","path","1ooewy",{"d":"m2 2 20 20"}],"$undefined"]}],["$","h1",null,{"className":"text-2xl font-bold capitalize","children":"Spyware"}],["$","p",null,{"className":"text-sm lg:text-xs xl:text-sm","children":"Insidious programs, known as “spyware,” can be installed innocuously on your networks. Hackers can use this information to steal money or sell your information to third parties, affecting the reputation of your business."}]]}],["$","div","2",{"className":"flex flex-col items-center space-y-5 text-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":40,"height":40,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield-alert text-[#03577A] hover:text-[#8DC440]","aria-hidden":"true","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],["$","path","1got3b",{"d":"M12 8v4"}],["$","path","1drbdi",{"d":"M12 16h.01"}],"$undefined"]}],["$","h1",null,{"className":"text-2xl font-bold capitalize","children":"Ransomware"}],["$","p",null,{"className":"text-sm lg:text-xs xl:text-sm","children":"The annual cost of ransomware attacks in the United States is estimated to be $3.5 billion in 2019 alone. This unique cyber-attack accesses and locks your company data, demanding a ransom for the return of it."}]]}]]}] e:["$","div",null,{"className":"flex flex-col items-center pt-6 text-center md:pt-14","children":[["$","h1",null,{"className":"text-black text-3xl xl:!text-[50px] !font-bold lg:!text-4xl","children":["All your IT and ",["$","br",null,{}],"cybersecurity needs."]}],["$","section",null,{"className":"flex flex-col items-center w-full gap-10 px-5 py-6 md:flex-row md:py-14 md:px-24","children":[["$","div",null,{"className":"flex my-5 overflow-hidden md:w-1/2 h-96 rounded-xl","children":["$","img",null,{"src":"/cyber_security_3.png","alt":"Cyber Security Third Image","width":500,"height":500,"className":"object-cover w-full h-full"}]}],["$","div",null,{"className":"pb-4 space-y-4 md:w-1/2 text-start","children":[["$","h2",null,{"className":"text-3xl font-bold text-gray-800","children":"Why choose smatech?"}],["$","p",null,{"className":"text-sm text-gray-600 lg:text-xs xl:text-sm","children":"We offer customized solutions that fit your specific needs and budget and We use the latest technologies and best practices to ensure the highest level of security and performance. We also have a team of certified professionals who are ready to assist you 24/7. Smatech has a proven track record of delivering successful projects and satisfied clients."}],["$","div",null,{"className":"pb-4 border-b border-black"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 text-sm text-gray-800 lg:text-xs xl:text-sm","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-5 h-5 text-[#00b956]","aria-hidden":"true","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],"IT consulting and strategy"]}],["$","li","1",{"className":"flex items-center gap-2 text-sm text-gray-800 lg:text-xs xl:text-sm","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-5 h-5 text-[#00b956]","aria-hidden":"true","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],"Network design and installation"]}],["$","li","2",{"className":"flex items-center gap-2 text-sm text-gray-800 lg:text-xs xl:text-sm","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-5 h-5 text-[#00b956]","aria-hidden":"true","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],"Cloud computing and migration"]}],["$","li","3",{"className":"flex items-center gap-2 text-sm text-gray-800 lg:text-xs xl:text-sm","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-5 h-5 text-[#00b956]","aria-hidden":"true","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],"Data backup and recovery"]}],["$","li","4",{"className":"flex items-center gap-2 text-sm text-gray-800 lg:text-xs xl:text-sm","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-5 h-5 text-[#00b956]","aria-hidden":"true","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],"Cyber security assessment and remediation"]}],"$L16"]}]]}]]}]]}] f:["$","div",null,{"className":"pb-10 bg-[#86e50004]","children":[["$","div",null,{"className":"flex items-center px-5 my-10 md:px-24","children":[["$","div",null,{"className":"flex-grow border-t border-gray-400"}],["$","span",null,{"className":"text-sm font-semibold text-[#8DC440] whitespace-nowrap px-2","children":"FREQUENTLY ASKED QUESTIONS"}],["$","div",null,{"className":"flex-grow border-t border-gray-400"}]]}],["$","h1",null,{"className":"my-8 text-3xl font-bold text-center","children":"Frequently Asked Questions"}],["$","$L17",null,{"data":[{"question":"Are free Anti-Virus software any good?","answer":"First and foremost, you never want to go without security protection on your computer. Free Anti-Virus has very low detection rates. Give us a call and we will be happy to inform you of the latest security software we recommend and sell to all our clients for Spyware, Malware and Virus protection."},{"question":"What does having managed IT services cost?","answer":"Managed IT costs vary by scope and size of your organization."},{"question":"What is cloud backup?","answer":"Cloud backup stores your data safely offsite to protect from local disasters."},{"question":"What types of systems do you support?","answer":"We support Windows, Mac, Linux, and various server platforms."},{"question":"What if we already have an internal IT department?","answer":"We can supplement your internal IT as a co-managed service."},{"question":"What exactly are managed IT services?","answer":"A proactive approach to IT management including monitoring, maintenance, and support."},{"question":"How does a flat rate billing save me money?","answer":"Flat rate billing prevents unpredictable costs from break-fix IT support."},{"question":"How long is a managed services contract for?","answer":"Contracts are typically 12 months but can be customized."}]}]]}] 10:["$","$L18",null,{}] 11:["$","script","script-0",{"src":"/_next/static/chunks/9c7a5cdf31b73684.js","async":true,"nonce":"$undefined"}] 12:["$","script","script-1",{"src":"/_next/static/chunks/222c775e8f5cf4ad.js","async":true,"nonce":"$undefined"}] 13:["$","$L19",null,{"children":["$","$1a",null,{"name":"Next.MetadataOutlet","children":"$@1b"}]}] 14:["$","$1","h",{"children":[null,["$","$L1c",null,{"children":"$@1d"}],["$","div",null,{"hidden":true,"children":["$","$L1e",null,{"children":["$","$1a",null,{"name":"Next.Metadata","children":"$@1f"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}] 16:["$","li","5",{"className":"flex items-center gap-2 text-sm text-gray-800 lg:text-xs xl:text-sm","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-5 h-5 text-[#00b956]","aria-hidden":"true","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],"Managed IT services and support"]}] 1d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 20:I[27201,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"IconMark"] 1f:[["$","title","0",{"children":"Cybersecurity Solutions | Enterprise-Grade Protection for Businesses"}],["$","meta","1",{"name":"description","content":"Comprehensive cybersecurity services including threat detection, data protection, and managed IT security for businesses of all sizes. 24/7 monitoring and support."}],["$","link","2",{"rel":"manifest","href":"/manifest.json","crossOrigin":"$undefined"}],["$","meta","3",{"property":"og:title","content":"Enterprise Cybersecurity Services | Threat Protection & Data Security"}],["$","meta","4",{"property":"og:description","content":"Proactive cybersecurity solutions with risk assessment, network protection, and ransomware defense tailored to your business needs."}],["$","meta","5",{"property":"og:url","content":"https://smatechgroup.com/services/cybersecurity"}],["$","meta","6",{"property":"og:site_name","content":"SmaTech Group"}],["$","meta","7",{"name":"twitter:card","content":"summary"}],["$","meta","8",{"name":"twitter:title","content":"Enterprise Cybersecurity Services | Threat Protection & Data Security"}],["$","meta","9",{"name":"twitter:description","content":"Proactive cybersecurity solutions with risk assessment, network protection, and ransomware defense tailored to your business needs."}],["$","link","10",{"rel":"icon","href":"/favicon.ico?favicon.2cf6bc09.ico","sizes":"48x48","type":"image/x-icon"}],["$","link","11",{"rel":"icon","href":"/icon0.svg?icon0.57942166.svg","sizes":"any","type":"image/svg+xml"}],["$","link","12",{"rel":"icon","href":"/icon1.png?icon1.14cb46f0.png","sizes":"96x96","type":"image/png"}],["$","link","13",{"rel":"apple-touch-icon","href":"/apple-icon.png?apple-icon.c3fe21ba.png","sizes":"180x180","type":"image/png"}],["$","$L20","14",{}]] 1b:null