{"id":78272,"date":"2023-08-22T19:55:14","date_gmt":"2023-08-22T11:55:14","guid":{"rendered":"https:\/\/uat.rovertech.com.hk\/cybersecurity\/"},"modified":"2026-03-19T11:12:20","modified_gmt":"2026-03-19T03:12:20","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/rovertech.com.hk\/en\/cybersecurity\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"78272\" class=\"elementor elementor-78272 elementor-77503\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ba7b37a elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6ba7b37a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-429707e0\" data-id=\"429707e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68c1f03 elementor-widget__width-inherit elementor-widget elementor-widget-breadcrumbs\" data-id=\"68c1f03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p><span class=\"last\">Home<\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e1c980d elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle\" data-id=\"e1c980d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b9803df\" data-id=\"4b9803df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8efa3e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8efa3e7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6f9d732\" data-id=\"6f9d732\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-140b5257 elementor-widget elementor-widget-heading\" data-id=\"140b5257\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-185084c7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"185084c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4862812f elementor-widget elementor-widget-text-editor\" data-id=\"4862812f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;In today\u2019s connected world, cybersecurity is more important than ever before as more of our personal and private information are available online. Although this provides significant convenience benefits, it also increases risks of cyberattacks which can lead to identify theft, extortion attempts and more.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15233,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:28,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:10027008}}}\uee10{&quot;1&quot;:41}\">In today\u2019s connected world, cybersecurity is more important than ever before as more of our personal and private information are available online. Although this provides significant convenience benefits, it also increases risks of cyberattacks which can lead to identify theft, extortion attempts and more.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79643be1 elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle\" data-id=\"79643be1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d96c75\" data-id=\"6d96c75\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b2ecd9 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b2ecd9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f29dbe\" data-id=\"1f29dbe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0169d6e elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0169d6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-feab1fc\" data-id=\"feab1fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79fa0f0 elementor-widget elementor-widget-heading\" data-id=\"79fa0f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Provided Cyber Security Services.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a943685 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a943685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-791c695\" data-id=\"791c695\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0ccf6e elementor-widget elementor-widget-heading\" data-id=\"a0ccf6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Customized services for your journey to innovation and success.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9f06888 elementor-invisible\" data-id=\"9f06888\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf62bf0 elementor-widget elementor-widget-heading\" data-id=\"bf62bf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-967ff16 elementor-widget elementor-widget-text-editor\" data-id=\"967ff16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWe can implement measures to protect your business from digital attacks against your systems, networks and programs. These cyberattacks can be detrimental to regular business operations but also lead to private data leaks which can have significant implications for business reputation.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf70dd2 elementor-widget elementor-widget-heading\" data-id=\"bf70dd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enterprise Firewall<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11cfc87 elementor-widget elementor-widget-text-editor\" data-id=\"11cfc87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFirewalls are the first line of defence in network security by protecting computers from malicious software and unauthorised data access. Our team can help implement the best security measures for your business depending on the risks, and ensure you have the best security measures available to protect you and your clients.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b72e5b5 elementor-align-left elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"b72e5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/rovertech.com.hk\/en\/enterprise-firewall\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"b385ca18-4b85-46d4-bb4b-571c73a19812\" data-name=\"b922a425-e5e0-4ef1-881c-5748460fd139\" viewBox=\"0 0 30.125 18.1738\"><title>arrow-icon-size3<\/title><path d=\"M29.75,9.3948,21.5281,1.1735a.8479.8479,0,0,0-.601-.261L20.9124.9119a.8526.8526,0,0,0-.5956.2409.8642.8642,0,0,0-.0027,1.23l6.7618,6.7611H.7316a.8566.8566,0,1,0,0,1.7131H27.0759l-6.7591,6.7591a.8576.8576,0,0,0-.0214,1.2113.8462.8462,0,0,0,.61.2583.8949.8949,0,0,0,.621-.2556l8.2233-8.224A.8587.8587,0,0,0,29.75,9.3948Z\" transform=\"translate(0.125 -0.9119)\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf40345 elementor-widget elementor-widget-heading\" data-id=\"cf40345\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23812a7 elementor-widget elementor-widget-text-editor\" data-id=\"23812a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs the attack surface evolves, you need a vulnerability assessment for the modern attack surface. Through vulnerability assessment, you can also secure your web applications, cloud infrastructure and gain visibility into your internet-connected attack surface.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0807a96 elementor-align-left elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"0807a96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/rovertech.com.hk\/en\/vulnerability-assessment\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"b385ca18-4b85-46d4-bb4b-571c73a19812\" data-name=\"b922a425-e5e0-4ef1-881c-5748460fd139\" viewBox=\"0 0 30.125 18.1738\"><title>arrow-icon-size3<\/title><path d=\"M29.75,9.3948,21.5281,1.1735a.8479.8479,0,0,0-.601-.261L20.9124.9119a.8526.8526,0,0,0-.5956.2409.8642.8642,0,0,0-.0027,1.23l6.7618,6.7611H.7316a.8566.8566,0,1,0,0,1.7131H27.0759l-6.7591,6.7591a.8576.8576,0,0,0-.0214,1.2113.8462.8462,0,0,0,.61.2583.8949.8949,0,0,0,.621-.2556l8.2233-8.224A.8587.8587,0,0,0,29.75,9.3948Z\" transform=\"translate(0.125 -0.9119)\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c048f8 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"3c048f8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e4d87e8\" data-id=\"e4d87e8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-073c8fb elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-invisible\" data-id=\"073c8fb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-05944dc\" data-id=\"05944dc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f6f9cf\" data-id=\"7f6f9cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5cad184 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"5cad184\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cddd4dd elementor-invisible\" data-id=\"cddd4dd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe7fded elementor-widget elementor-widget-heading\" data-id=\"fe7fded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security for peace of mind<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b2c515 elementor-widget elementor-widget-text-editor\" data-id=\"9b2c515\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDespite the risk of cyberattacks such as ransomware and data theft ever looming, many still neglect cybersecurity under the belief that these attacks would not happen to them. However, we believe that a well implemented security systems are essential for businesses and acts like an insurance against these attacks. These attacks may not happen to you, but it is a small price to pay for the peace of mind offered by having these measures in place.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fcad62 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"3fcad62\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62d2f21\" data-id=\"62d2f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7990784 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7990784\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c13a1db\" data-id=\"c13a1db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4ba34b elementor-widget elementor-widget-heading\" data-id=\"e4ba34b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Certificates.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-946c976 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"946c976\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a29d0da\" data-id=\"a29d0da\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91927f4 gallery-spacing-custom elementor-invisible elementor-widget elementor-widget-image-gallery\" data-id=\"91927f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-gallery\">\n\t\t\t\n\t\t<style>\n\t\t\t#gallery-1 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 20%;\n\t\t\t}\n\t\t\t#gallery-1 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-1' class='gallery galleryid-78272 gallery-columns-5 gallery-size-full'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Cisco-Certified-Network-Professional.png\" class=\"attachment-full size-full\" alt=\"Cisco Certified Network Professional\" aria-describedby=\"gallery-1-88921\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Cisco-Certified-Network-Professional.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Cisco-Certified-Network-Professional-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88921'>\n\t\t\t\tCisco Certified Network Professional\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-System-Security-Professional.png\" class=\"attachment-full size-full\" alt=\"Certified Information System Security Professional - Rovertech\" aria-describedby=\"gallery-1-88919\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-System-Security-Professional.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-System-Security-Professional-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88919'>\n\t\t\t\tCertified Information System Security Professional &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-Security-Manager.png\" class=\"attachment-full size-full\" alt=\"Certified Information Security Manager - Rovertech\" aria-describedby=\"gallery-1-88915\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-Security-Manager.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-Security-Manager-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88915'>\n\t\t\t\tCertified Information Security Manager &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-System-Auditor.png\" class=\"attachment-full size-full\" alt=\"Certified Information System Auditor - Rovertech\" aria-describedby=\"gallery-1-88917\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-System-Auditor.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Certified-Information-System-Auditor-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88917'>\n\t\t\t\tCertified Information System Auditor &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/CyberArk-Certified-Delivery-Engineer.png\" class=\"attachment-full size-full\" alt=\"CyberArk Certified Delivery Engineer - Rovertech\" aria-describedby=\"gallery-1-88923\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/CyberArk-Certified-Delivery-Engineer.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/CyberArk-Certified-Delivery-Engineer-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88923'>\n\t\t\t\tCyberArk Certified Delivery Engineer &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/EC-Council-Certified-Ethical-Hacker-Master.png\" class=\"attachment-full size-full\" alt=\"EC-Council Certified Ethical Hacker Master - Rovertech\" aria-describedby=\"gallery-1-88927\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/EC-Council-Certified-Ethical-Hacker-Master.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/EC-Council-Certified-Ethical-Hacker-Master-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88927'>\n\t\t\t\tEC-Council Certified Ethical Hacker Master &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/CyberArk-Certified-Trustee-1.png\" class=\"attachment-full size-full\" alt=\"CyberArk Certified Trustee - Rovertech\" aria-describedby=\"gallery-1-88925\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/CyberArk-Certified-Trustee-1.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/CyberArk-Certified-Trustee-1-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88925'>\n\t\t\t\tCyberArk Certified Trustee &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-Certified-Azure-Fundamentals-1.png\" class=\"attachment-full size-full\" alt=\"Microsoft Certified Azure Fundamentals - Rovertech\" aria-describedby=\"gallery-1-88941\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-Certified-Azure-Fundamentals-1.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-Certified-Azure-Fundamentals-1-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88941'>\n\t\t\t\tMicrosoft Certified Azure Fundamentals &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-Certified-Azure-Solutions-Architect-Expert-1.png\" class=\"attachment-full size-full\" alt=\"Microsoft Certified Azure Solutions Architect Expert - Rovertech\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-Certified-Azure-Solutions-Architect-Expert-1.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-Certified-Azure-Solutions-Architect-Expert-1-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/AWS-Certificated-DevOps-Professional.png\" class=\"attachment-full size-full\" alt=\"AWS Certificated DevOps Professional - Rovertech\" aria-describedby=\"gallery-1-88913\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/AWS-Certificated-DevOps-Professional.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/AWS-Certificated-DevOps-Professional-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88913'>\n\t\t\t\tAWS Certificated DevOps Professional &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Web-Expert.png\" class=\"attachment-full size-full\" alt=\"Offensive Security Web Expert\" aria-describedby=\"gallery-1-88955\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Web-Expert.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Web-Expert-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88955'>\n\t\t\t\tOffensive Security Web Expert\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Experienced-Pentester.png\" class=\"attachment-full size-full\" alt=\"Offensive Security Experienced Pentester - Rovertech\" aria-describedby=\"gallery-1-88947\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Experienced-Pentester.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Experienced-Pentester-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88947'>\n\t\t\t\tOffensive Security Experienced Pentester &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Certified-Professional.png\" class=\"attachment-full size-full\" alt=\"Offensive Security Certified Professional - Rovertech\" aria-describedby=\"gallery-1-88945\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Certified-Professional.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Offensive-Security-Certified-Professional-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88945'>\n\t\t\t\tOffensive Security Certified Professional &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-1.png\" class=\"attachment-full size-full\" alt=\"Fortinet NSE 1 - Rovertech\" aria-describedby=\"gallery-1-88929\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-1.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-1-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88929'>\n\t\t\t\tFortinet NSE 1 &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-2.png\" class=\"attachment-full size-full\" alt=\"Fortinet NSE 2 - Rovertech\" aria-describedby=\"gallery-1-88931\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-2.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-2-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88931'>\n\t\t\t\tFortinet NSE 2 &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-3.png\" class=\"attachment-full size-full\" alt=\"Fortinet NSE 3 - Rovertech\" aria-describedby=\"gallery-1-88933\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-3.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-3-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88933'>\n\t\t\t\tFortinet NSE 3 &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-4.png\" class=\"attachment-full size-full\" alt=\"Fortinet NSE 4 - Rovertech\" aria-describedby=\"gallery-1-88935\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-4.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-NSE-4-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88935'>\n\t\t\t\tFortinet NSE 4 &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/PMI-\u2013-Project-Management-Professional.png\" class=\"attachment-full size-full\" alt=\"PMI \u2013 Project Management Professional - Rovertech\" aria-describedby=\"gallery-1-88949\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/PMI-\u2013-Project-Management-Professional.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/PMI-\u2013-Project-Management-Professional-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88949'>\n\t\t\t\tPMI \u2013 Project Management Professional &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Huawei-HCIP.png\" class=\"attachment-full size-full\" alt=\"Huawei HCIP - Rovertech\" aria-describedby=\"gallery-1-88937\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Huawei-HCIP.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Huawei-HCIP-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88937'>\n\t\t\t\tHuawei HCIP &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/ISACA-China-Hong-Kong-Chapter.png\" class=\"attachment-full size-full\" alt=\"ISACA China Hong Kong Chapter - Rovertech\" aria-describedby=\"gallery-1-88939\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/ISACA-China-Hong-Kong-Chapter.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/ISACA-China-Hong-Kong-Chapter-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-88939'>\n\t\t\t\tISACA China Hong Kong Chapter &#8211; Rovertech\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f5d9b9 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1f5d9b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-04348a4\" data-id=\"04348a4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-65b626f elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"65b626f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b88ad1b\" data-id=\"b88ad1b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62e48b7 elementor-widget elementor-widget-heading\" data-id=\"62e48b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Partners.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-774b415 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"774b415\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92feb70 elementor-widget elementor-widget-heading\" data-id=\"92feb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Our network provides us with unique strengths to achieve your business visions and keep you ahead of the game.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e3b39b\" data-id=\"3e3b39b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b80d802 gallery-spacing-custom elementor-invisible elementor-widget elementor-widget-image-gallery\" data-id=\"b80d802\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-gallery\">\n\t\t\t\n\t\t<style>\n\t\t\t#gallery-2 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-2 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 20%;\n\t\t\t}\n\t\t\t#gallery-2 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-2 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-2' class='gallery galleryid-78272 gallery-columns-5 gallery-size-full'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Cisco-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Cisco-1.png 314w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Cisco-1-300x137.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-1.png 314w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Fortinet-1-300x137.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Google-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Google-1.png 315w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Google-1-300x136.png 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/HP-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/HP-1.png 314w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/HP-1-300x137.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/IBM-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/IBM-1.png 314w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/IBM-1-300x137.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" title=\"\">\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Kapersky-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Kapersky-1.png 315w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Kapersky-1-300x136.png 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Lenovo-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Lenovo-1.png 314w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Lenovo-1-300x137.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-1.png 315w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Microsoft-1-300x136.png 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Netgear-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Netgear-1.png 315w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Netgear-1-300x136.png 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Symantec-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Symantec-1.png 314w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Symantec-1-300x137.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" title=\"\">\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Veeam-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Veeam-1.png 315w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/Veeam-1-300x136.png 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"143\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/VMware-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/VMware-1.png 315w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/03\/VMware-1-300x136.png 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" title=\"\">\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"150\" src=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/06\/Tenable-Nessus.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/06\/Tenable-Nessus.png 330w, https:\/\/rovertech.com.hk\/wp-content\/uploads\/2024\/06\/Tenable-Nessus-300x136.png 300w\" sizes=\"(max-width: 330px) 100vw, 330px\" title=\"\">\n\t\t\t<\/dt><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9210f99 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9210f99\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bfc9fc5\" data-id=\"bfc9fc5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4ce278c elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ce278c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3084318\" data-id=\"3084318\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3026c89 elementor-widget elementor-widget-heading\" data-id=\"3026c89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security FAQs.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c656c38 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c656c38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cea2aa7\" data-id=\"cea2aa7\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a38a0b elementor-widget elementor-widget-accordion\" data-id=\"7a38a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1281\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1281\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is Cyber Security?<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1281\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1281\"><p>Cybersecurity refers to the practice of safeguarding computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, damage, or unauthorized access. It involves implementing measures to prevent and detect cyber threats, ensuring the integrity, confidentiality, and availability of information.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1282\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1282\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why Cyber Security is important for my business?<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1282\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1282\"><p>Cybersecurity is critical for businesses for several reasons:<\/p><p>&#8211; Data Protection: Businesses handle sensitive data, such as customer information, employee records, and intellectual property. Cybersecurity measures protect this data from unauthorized access or theft.<\/p><p>&#8211; Financial Security: Cyber attacks can lead to significant financial losses due to interrupted operations, loss of customer trust, or possible regulatory fines.<\/p><p>&#8211; Reputation Management: A data breach can cause serious damage to your brand&#8217;s reputation, resulting in loss of customers.<\/p><p>&#8211; Regulatory Compliance: Many industries have regulations requiring businesses to protect certain types of data. Cybersecurity helps ensure compliance with these regulations.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1283\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1283\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What are the types of Cyber threats?<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1283\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1283\"><p>There are several types of cyber threats, including:<\/p><p>&#8211; Malware: Malicious software such as viruses, ransomware, and spyware that can damage systems or steal data.<\/p><p>&#8211; Phishing: Fraudulent attempts to obtain sensitive information by posing as a trustworthy entity through email or other communication channels.<\/p><p>&#8211; Man-in-the-middle Attacks: These occur when attackers intercept and potentially alter communication between two parties without their knowledge.<\/p><p>&#8211; Denial-of-Service Attacks: These attacks overwhelm systems, servers, or networks to interrupt or suspend services.<\/p><p>&#8211; SQL Injection: An attack that uses malicious SQL code to manipulate a database into revealing information.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1284\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1284\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What are the types of Cyber Security service?<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1284\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1284\"><p>Cybersecurity services vary based on business needs but can include:<\/p><p>&#8211; Risk Assessment: Identifying potential vulnerabilities in your systems and understanding the risks associated with them.<\/p><p>&#8211; Data Protection: Services that protect data both in transit and at rest, such as encryption and secure data storage.<\/p><p>&#8211; Network Security: Protecting your network from intrusions with firewalls, intrusion detection systems, and secure network architectures.<\/p><p>&#8211; Incident Response: Teams that respond to a cybersecurity incident and manage the recovery process.<\/p><p>&#8211; Security Training: Educating employees about cybersecurity threats and best practices.<\/p><p>&#8211; Penetration Testing: Simulated attacks on your systems to identify vulnerabilities before they can be exploited by attackers.<\/p><p>&#8211; Compliance Services: Ensuring that your business meets industry-specific regulatory requirements for data security.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2454a99 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2454a99\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fdcf99e\" data-id=\"fdcf99e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7839a23 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7839a23\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f3f0f86\" data-id=\"f3f0f86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ebf802 elementor-widget elementor-widget-heading\" data-id=\"9ebf802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Related services.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44e1a65 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"44e1a65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7224195 elementor-widget elementor-widget-heading\" data-id=\"7224195\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Discover more of our comprehensive IT solutions and services.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-654e42a\" data-id=\"654e42a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0513fa2 icon-position-top content-align-left icon-box-vertical-align-top icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget\" data-id=\"0513fa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_icon_box_grid_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-0513fa2\">\t\t\t<div class=\"dt-css-grid\">\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<a class=\"the7-icon-box-grid box-hover\" href=\"https:\/\/rovertech.com.hk\/en\/it-consultation\/\" aria-label=\"IT Consultation\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tIT Consultation\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-description\">Consultation is paramount during large projects especially when your company does not have an in-house specialist\u2026<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-button elementor-button elementor-size-md\">MORE<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<a class=\"the7-icon-box-grid box-hover\" href=\"https:\/\/rovertech.com.hk\/en\/it-support-and-it-outsource\/\" aria-label=\"IT Outsourcing\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tIT Outsourcing\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-description\">IT outsourcing is a common practice for businesses to reduce cost but still have access to IT professionals when\u2026<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-button elementor-button elementor-size-md\">MORE<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<a class=\"the7-icon-box-grid box-hover\" href=\"https:\/\/rovertech.com.hk\/en\/infrastructure\/\" aria-label=\"IT Infrastructure\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tIT Infrastructure\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-description\">IT infrastructure enables companies to build and run applications which are crucial for their business operations\u2026<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-button elementor-button elementor-size-md\">MORE<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<a class=\"the7-icon-box-grid box-hover\" href=\"https:\/\/rovertech.com.hk\/en\/it-solutions\/\" aria-label=\"IT Solutions\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tIT Solutions\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-description\">The ways in with IT implemented are countless, and for each situation there can be multiple solutions to handle\u2026<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-button elementor-button elementor-size-md\">MORE<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Cyber Security In today\u2019s connected world, cybersecurity is more important than ever before as more of our personal and private information are available online. Although this provides significant convenience benefits, it also increases risks of cyberattacks which can lead to identify theft, extortion attempts and more. Provided Cyber Security Services. Customized services for your&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-78272","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/pages\/78272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/comments?post=78272"}],"version-history":[{"count":0,"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/pages\/78272\/revisions"}],"wp:attachment":[{"href":"https:\/\/rovertech.com.hk\/en\/wp-json\/wp\/v2\/media?parent=78272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}