{"id":3609,"date":"2019-05-02T07:44:31","date_gmt":"2019-05-02T07:44:31","guid":{"rendered":"http:\/\/localhost\/wordpress\/?page_id=3609"},"modified":"2019-11-15T07:30:42","modified_gmt":"2019-11-15T07:30:42","slug":"it-security-audits","status":"publish","type":"page","link":"https:\/\/infogistic.com\/home\/it-security-audits\/","title":{"rendered":"IT Security Audits"},"content":{"rendered":"<div class=\"wp-block-image\"><figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"276\" height=\"200\" src=\"http:\/\/infogistic.com\/home\/wp-content\/uploads\/2019\/09\/infosec-services.jpg\" alt=\"\" class=\"wp-image-4425\"\/><\/figure><\/div><p class=\"SecurityAudit-p\"> An IT security audit analyzes individual technical infrastructure components at a detailed level, ensuring that each is functioning in a manner that reinforces appropriate information security. The stakes are made higher with a number of regulatory compliance requirements mandating that IT audits be included in organizational due diligence efforts. <\/p><p class=\"SecurityAudit-p\">\r\n\r\n<b style=\"color:#207146;\">INFOGISTIC\u2019s<\/b> IT &amp; Security Consultants will help you navigate a sea of ever-changing business risks. By using customized tools, expert resources, and proven methodologies, we tailor our IT audit services to your specific needs. Our experienced professionals bring a deep understanding of Internal Information System Audits, Application Control, and Security Services, as well as Pre- and Post-Implementation Reviews.\r\n\r\n<\/p>","protected":false},"excerpt":{"rendered":"<p>An IT security audit analyzes individual technical infrastructure components at a detailed level, ensuring that each is functioning in a manner that reinforces appropriate information security. The stakes are made higher with a number of regulatory compliance requirements mandating that IT audits be included in organizational due diligence efforts. INFOGISTIC\u2019s IT &amp; Security Consultants will [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3609","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/comments?post=3609"}],"version-history":[{"count":2,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3609\/revisions"}],"predecessor-version":[{"id":4685,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3609\/revisions\/4685"}],"wp:attachment":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/media?parent=3609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}