{"id":8,"date":"2024-08-29T00:46:40","date_gmt":"2024-08-29T00:46:40","guid":{"rendered":"https:\/\/broadwingtechnology.com\/?page_id=8"},"modified":"2024-09-10T01:42:43","modified_gmt":"2024-09-10T01:42:43","slug":"one-page-express","status":"publish","type":"page","link":"https:\/\/broadwingtechnology.com\/","title":{"rendered":"Front Page"},"content":{"rendered":"<div  id=\"overlapable-2\" style=\"background-color: #ffffff;\" data-label=\"Overlapable\" data-id=\"stripped-coloured-icon-boxes\" data-category=\"overlapable\" class=\"features-coloured-icon-boxes-section\" data-overlap=\"true\"> <div  class=\"gridContainer\"> <div  class=\"features-coloured-icon-boxes-innerrow flexbox-list dark-text\" data-type=\"row\"> <div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-gears\"><\/i> <\/div> <h4  class=\"\">Managed IT<\/h4> <p  class=\"\">We provide comprehensive support and proactive management of your IT infrastructure, including system monitoring, troubleshooting, software updates, and cybersecurity.&nbsp;<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div> <div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-cloud\"><\/i> <\/div> <h4  class=\"\">&nbsp;Network and Data Security<\/h4> <p  class=\"\">Discover and address digital security weaknesses with our proactive vulnerability assessments and penetration testing.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div> <div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-user-secret\"><\/i> <\/div> <h4  class=\"\">Employee and Associates Security<\/h4> <p  class=\"\">&nbsp;We conduct sophisticated social engineering exercises, including phishing, pretexting, and baiting, to evaluate how well your employees can detect and respond to deceptive tactics. These simulations help identify susceptibility to manipulation and improve your team\u2019s ability to recognize and report suspicious activity.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div> <div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-building-o\"><\/i> <\/div> <h4  class=\"\">Physical Site Security<\/h4> <p  class=\"\">We simulate real-world scenarios to identify weaknesses in physical access controls and security measures, ensuring your premises are safeguarded against unauthorized entry.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div> <div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-check-square-o\"><\/i> <\/div> <h4  class=\"\">Security Audits<\/h4> <p  class=\"\">A total audit of your systems and infrastructure to provide actionable information about potential weaknesses and existing flaws.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-connectdevelop\"><\/i> <\/div> <h4  class=\"\">Security&nbsp; Planning<\/h4> <p  class=\"\">Design and implement an InfoSec strategy that both protects current network environments and meets emerging challenges.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-book\"><\/i> <\/div> <h4  class=\"\">Security Training<\/h4> <p  class=\"\">Give your IT professionals the knowledge and resources they need to defend your network more effectively and implement adaptive security policy.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-bomb\"><\/i> <\/div> <h4  class=\"\">Threat &amp; Vulnerability Assessments<\/h4> <p  class=\"\">Provide a complete picture of your existing security posture and where improvements may be required. <\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-rocket\"><\/i> <\/div> <h4  class=\"\">Modernize IT<\/h4> <p  class=\"\">Modernize IT<br >Refresh or retire IT infrastructure, build more efficient processes,  reducing reliance on on-premises environments and considering cloud modernization projects.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-briefcase\"><\/i> <\/div> <h4  class=\"\">CIO Outsourcing<\/h4> <p  class=\"\">&nbsp;Our experienced Chief Information Officers (CIOs) provide strategic leadership and vision to optimize your technology investments and align IT with your business goals. We offer executive-level guidance on technology planning, digital transformation, and IT governance, helping you navigate complex decisions and drive innovation. \n<br ><br >With our outsourced CIOs, you gain access to high-level expertise and strategic insight without the cost of a full-time executive, ensuring your IT strategy is both effective and scalable.\n<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-truck\"><\/i> <\/div> <h4  class=\"\">Datacenter Relocation<\/h4> <p  class=\"\">Datacenter Relocation<br >Seamlessly transition your data center with our expert relocation services. We manage every aspect of your move, from meticulous planning and risk assessment to secure transportation and reinstallation. Our team ensures minimal downtime and disruption, handling the migration of your hardware, data, and applications with precision. We also provide comprehensive testing and validation to guarantee that your new setup operates efficiently and securely. \n<br ><br >Trust us to execute a smooth and successful datacenter relocation, so you can focus on your core business activities.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-eye\"><\/i> <\/div> <h4  class=\"\">Expert Witnesses<\/h4> <p  class=\"\">&nbsp;We provide authoritative testimony and detailed analysis in legal cases involving IT and cybersecurity matters. Our experts offer insights on technical issues, security breaches, and technology standards, helping to clarify complex concepts for courts and legal teams. With extensive experience in forensic investigations and technology assessments, we deliver clear, credible testimony and support to strengthen your case and ensure informed decision-making.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-file-text-o\"><\/i> <\/div> <h4  class=\"\">Computer Security Audits and Certifications<\/h4> <p  class=\"\">Stay ahead of security threats with our expert audits and certifications. \n<br ><br >We ensure your systems meet critical standards such as ISO\/IEC 27001, NIST SP 800-53, PCI DSS, HIPAA, GDPR, CMMC, and FISMA. Our comprehensive approach aligns with CIS Controls to safeguard your data, streamline compliance, and enhance your security posture. \n<br ><br >Trust us to help you navigate complex regulations and protect your organization\u2019s valuable information.\n<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-bitcoin\"><\/i> <\/div> <h4  class=\"\">Crypto Recovery Services<\/h4> <p  class=\"\">Lost access to your crypto assets? Our specialized cryptocurrency recovery services offer a lifeline. \n<br ><br >We employ cutting-edge techniques and industry expertise to recover lost or inaccessible digital assets from wallets and exchanges. Whether due to forgotten keys, compromised accounts, or technical issues, we provide a discreet and efficient solution to reclaim your cryptocurrency. \n<br ><br >Trust us to navigate the complexities of crypto recovery and restore your financial peace of mind.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-cloud\"><\/i> <\/div> <h4  class=\"\">Cloud Security<\/h4> <p  class=\"\">We help you understand, address, and actively manage the risks you face to successfully operate your business in a secure cloud.\n<br ><br >We configure secure, scalable cloud infrastructure tailored to your needs and implement robust VPN access to ensure safe, encrypted remote connections. \n<br ><br >Our approach safeguards your data from unauthorized access and cyber threats, enabling seamless and secure operations for your team, no matter where they are. \n<br ><br >Trust us to deliver a fortified cloud solution that combines cutting-edge security with reliable, remote access.<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><div  class=\"features-coloured-icon-boxes-featurecol cp3cols\"> <div  class=\"features-coloured-icon-boxes-iconcontainer\" data-content-item-container=\"true\"> <i  data-cp-fa=\"true\" class=\"features-coloured-icon fa fa-cubes\"><\/i> <\/div> <h4  class=\"\">Cybersecurity Concierge Service<\/h4> <p  class=\"\">Provide a high-touch, bespoke cybersecurity service tailored specifically for high-profile individuals worldwide.&nbsp;\n<br ><br >24\/7 Personal Security Analyst \u2013 Dedicated cybersecurity experts available around the clock for real-time threat monitoring, incident response, and personal security advice.\n<br ><br >Custom Security Protocols \u2013 Development and implementation of highly personalized security measures for digital assets, communication channels, and personal devices.<br ><br >Regular Penetration Testing and Vulnerability Assessments \u2013 Routine and ad-hoc security assessments to identify and address potential vulnerabilities.\n<br ><br >Luxury Device Security \u2013 Enhanced security solutions for high-end devices, including advanced encryption and secure, private communications.\n<br ><br >Cybersecurity Training and Awareness \u2013 Tailored training sessions for the client and their immediate circle, focusing on best practices for maintaining personal and professional cybersecurity.\n<br ><br ><br >Incident Response and Recovery \u2013 Rapid response and recovery services in case of a security breach, including data recovery and<\/p> <a class=\"features-coloured-button\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\">LEARN MORE<\/a> <\/div><\/div> <\/div><\/div><div  id=\"cta-1\" data-label=\"Call to action\" data-id=\"cta-blue-section\" data-category=\"cta\" class=\"cta-blue-section\"> <div  class=\"gridContainer\"> <div  class=\"flexbox-list flexbox-list-align-center row\"> <div  class=\"cta-blue-textcol dynamic-color\"> <h2  class=\"cta-blue-text\"> <b  class=\"element2\"> Ready to take action? \n<br >Contact Us. <\/b> It will only take a minute <\/h2> <\/div> <div  class=\"cta-blue-btncol\"> <a class=\"button big yellow dark-text\" href=\"#contact-4\" target=\"_self\" rel=\"noopener\"> GET STARTED TODAY <\/a> <\/div> <\/div> <\/div> <\/div><div  data-label=\"Features\" data-id=\"features-large-icons-section\" data-category=\"features\" class=\"features-large-icons-section\" id=\"features-3\" style=\"background-color: rgb(255, 255, 255);\"> <div  class=\"gridContainer dynamic-color\"> <div  class=\"features-large-icons-textrow\"> <div  class=\"features-large-icons-textcol\" data-type=\"column\"> <h2  class=\"\">A few things we\u2019re great at<\/h2>  <\/div> <\/div> <div  class=\"features-large-icons-featrow\" data-type=\"row\"> <div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-bolt\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/palo-alto-e1681238047450-400x196.png.webp\" alt=\"\"><\/div> <div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-cloud\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/cisco-logo-400x296.png-1.webp\" alt=\"\"><\/div> <div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-signal\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/opentxt.png\" alt=\"\"><\/div> <div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-pie-chart\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/checkpoint-logo.png\" alt=\"\"><\/div> <div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-random\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/Tenable-400x89.png.webp\" alt=\"\"><\/div><div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-database\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/Qualys.svg-400x126.png.webp\" alt=\"\"><\/div><div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-bolt\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/openvpn.png\" alt=\"\"><\/div><div  class=\"features-large-icons-featcol cp3cols cp6cols-tablet\"> <div  class=\"features-icon-container-nomargin\"><i  data-cp-fa=\"true\" class=\"font-icon-features-icon-container fa fa-bolt\"><\/i> <\/div>  <p  class=\"\"><\/p> <img  decoding=\"async\" class=\"custom-image\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/08\/aws-logo.png\" alt=\"\"><\/div><\/div> <\/div><\/div><div  data-label=\"Features\" data-id=\"features-image-cards-section\" data-category=\"features\" class=\"features-image-cards-section\" style=\"background-color: rgb(246, 246, 246);\" id=\"features-2\"> <div  class=\"gridContainer\"> <div  class=\"features-image-cards-textrow\"> <div  class=\"features-image-cards-textcol dynamic-color\" data-type=\"column\"> <h2  class=\"\">Scan the pizza below to contact us or use the form below!<\/h2>  <\/div> <\/div> <div  class=\"features-image-cards-innerrow flexbox-list dark-text\" data-type=\"row\"> <div  class=\"features-image-cards-cardcol cp4cols cp6cols-tablet\"> <div  class=\"features-image-cards-cardrow\"><img  decoding=\"async\" class=\"features-image-cards-featimg\" src=\"https:\/\/broadwingtechnology.com\/wp-content\/uploads\/2024\/09\/Screen-Shot-2024-09-05-at-8.00.25-PM.png\" alt=\"\"> <div  class=\"features-image-cards-cardtextrow\" data-type=\"column\">   <a href=\"#\" class=\"\" target=\"_self\" data-reiki-hidden=\"true\" rel=\"noopener\"><i  data-cp-fa=\"true\" class=\"font-icon-22 fa fa-arrow-circle-right\"><\/i>&nbsp;learn more<\/a> <\/div> <\/div> <\/div>   <\/div> <\/div><\/div><div  data-label=\"Contact\" data-id=\"contact-section\" data-category=\"contact\" data-bg=\"transparent\" class=\"contact-section-formsection white-text contact-section\" id=\"contact-4\" style=\"background-image: url(&quot;https:\/\/broadwingtechnology.com\/wp-content\/plugins\/one-page-express-companion\/theme-data\/one-page-express\/sections\/images\/Travel_through_New_York_wallpaper-1920x1200.jpg&quot;); background-size: auto 1206.5px; background-repeat: no-repeat; background-position: center top 89.5354%;\"> <div  class=\"gridContainer\"> <div  class=\"row_224\"> <div  class=\"contact-textrow\"> <div  class=\"contact-textcol dynamic-color\"> <h2  class=\"\">Contact&nbsp; Us\n<br >Call\/Txt&nbsp; (469) 573-1085\u202c\n<\/h2> <p  class=\"white_text\">Or use the form below to reach us.<\/p> <\/div> <\/div> <\/div> <div  class=\"contact-formcol\" data-content-shortcode=\"one_page_express_contact_form shortcode=&quot;contact-form-7 id=&amp;amp;quot;66e1add&amp;amp;quot; title=&amp;amp;quot;Contact form 1&amp;amp;quot;&quot;\" data-editable=\"true\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f59-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F8#wpcf7-f59-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"59\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.9.8\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f59-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<p><label> Your name<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your email<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your phone number<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Number\"><input class=\"wpcf7-form-control wpcf7-number wpcf7-validates-as-number\" aria-invalid=\"false\" value=\"\" type=\"number\" name=\"Number\" \/><\/span><\/label>\n<\/p>\n<p><label> Subject<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your message (optional)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><label>Finish this sentence in lower case. The art of ?<\/label>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"quiz-007\"><label><span class=\"wpcf7-quiz-label\">The art of ?<\/span> <input size=\"40\" class=\"wpcf7-form-control wpcf7-quiz\" autocomplete=\"off\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"quiz-007\" \/><\/label><input type=\"hidden\" name=\"_wpcf7_quiz_answer_quiz-007\" value=\"b8fb030984b542cabf989ef097b7515d\" \/><\/span><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Submit\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div> <\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Managed IT We provide comprehensive support and proactive management of your IT infrastructure, including system monitoring, troubleshooting, software updates, and cybersecurity.&nbsp; LEARN MORE &nbsp;Network and Data Security Discover and address digital security weaknesses with our proactive vulnerability assessments and penetration testing. LEARN MORE Employee and Associates Security &nbsp;We conduct sophisticated social engineering exercises, including phishing,&hellip; <br \/> <a class=\"button small blue\" href=\"https:\/\/broadwingtechnology.com\/?p=1\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8"}],"version-history":[{"count":32,"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":139,"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=\/wp\/v2\/pages\/8\/revisions\/139"}],"wp:attachment":[{"href":"https:\/\/broadwingtechnology.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}