{"id":544,"date":"2022-12-15T18:31:21","date_gmt":"2022-12-15T18:31:21","guid":{"rendered":"https:\/\/urapp.net\/wordpress\/?page_id=544"},"modified":"2023-01-05T17:00:31","modified_gmt":"2023-01-05T17:00:31","slug":"ot_cybersecurity","status":"publish","type":"page","link":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/","title":{"rendered":"OT Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"544\" class=\"elementor elementor-544\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6acb176 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6acb176\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e4dd6f4\" data-id=\"e4dd6f4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b142fd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"b142fd0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c3184e0\" data-id=\"c3184e0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-112044c elementor-widget elementor-widget-heading\" data-id=\"112044c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.8.1 - 13-11-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">OT Cybersecurity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9413cc8 elementor-widget elementor-widget-heading\" data-id=\"9413cc8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity services from ICT Libya include several solutions that secure your business systems from the increasing cyberthreats,  which is developing due to new penetrating technologies by hackers.  \n\nIn the digital era, the Operational Technology OT is threatened as well, because systems, machines, devices are connected to the network, where the big data is found, and targeted by attackers.\n\nAny attack on these components can make catastrophic loss which urge the presence of constant and solid cybersecurity solutions to secure the operational technology of your business.\n\nICT Libya introduces OT\/IT cybersecurity solutions that ensure the optimum security of information and operations on the same pace<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3d9c2f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d9c2f7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1a50b56\" data-id=\"1a50b56\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a607850 elementor-widget elementor-widget-heading\" data-id=\"a607850\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OT Cybersecurity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f6e09e elementor-widget elementor-widget-heading\" data-id=\"4f6e09e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The OT Cybersecurity is essential component in industrial control systems, especially if the industrial plant or organization is using IIoT, and that is because it saves them from any cyberattack, and manage the IT cybersecurity. \nIn ICT Libya we are able to secure your operational technology through different solutions:\n<ul>\n<li>System hardening\n<li>Fixing the gaps of OT assets \n<li>Backup and restore management\n<li>Network security\n<li>System assessment\n<li>Prevent data leaks\n<li>Real-time monitoring of critical networks \n<li>Control remote access\n<\/ul><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b4e442b\" data-id=\"b4e442b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f3a4ec elementor-widget elementor-widget-image\" data-id=\"9f3a4ec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.8.1 - 13-11-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_9-pysv2mnu6qxp8ruogozvtan6e21nuwup6sfmjn5kp2.png\" title=\"sol_9\" alt=\"sol_9\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0fd43c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0fd43c4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5a7b9d9\" data-id=\"5a7b9d9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c74fbd2 elementor-widget elementor-widget-image\" data-id=\"c74fbd2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_10-pysv34irslm6lk670z1ccaoqi0b37452jnk4dvlzr6.png\" title=\"sol_10\" alt=\"sol_10\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8f9e4e2\" data-id=\"8f9e4e2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fb41a6 elementor-widget elementor-widget-heading\" data-id=\"7fb41a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Endpoint Security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d76f524 elementor-widget elementor-widget-heading\" data-id=\"d76f524\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ICT Libya introduces Endpoint security solutions that ensures the highest safety to end devices like computers, tablets, and any other staff devices, which is considered as critical points that are permanent goals for hackers, because end-user may be working remotely, or one of employees may be a victim of phishing or  hacking.\nWith ICT Libya, your company is ready for any attack, by securing workflow with no downtime, all staff, wherever remote they are, they are secured with the best cybersecurity technologies. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cedce54 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cedce54\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eef286e\" data-id=\"eef286e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e0ccef elementor-widget elementor-widget-heading\" data-id=\"5e0ccef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Email & Web Security <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf9e72f elementor-widget elementor-widget-heading\" data-id=\"cf9e72f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">One of the most important types of cybersecurity is securing internet and email system of your company, that is because many attacks and cyber crimes happen through emails and unprotected pages or links. \nWith ICT Libya your company is safe nd protected from any phishing, social engineering or any other cyberthreat, thanks to our premium technologies from our elite partners like Kaspersky, Fidelis and others. \n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3d0c5b5\" data-id=\"3d0c5b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97edeec elementor-widget elementor-widget-image\" data-id=\"97edeec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_9-pysv2mnu6qxp8ruogozvtan6e21nuwup6sfmjn5kp2.png\" title=\"sol_9\" alt=\"sol_9\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ddd9f0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ddd9f0e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-168d0be\" data-id=\"168d0be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80af149 elementor-widget elementor-widget-image\" data-id=\"80af149\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_10-pysv34irslm6lk670z1ccaoqi0b37452jnk4dvlzr6.png\" title=\"sol_10\" alt=\"sol_10\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-97b9580\" data-id=\"97b9580\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7649a4c elementor-widget elementor-widget-heading\" data-id=\"7649a4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Security <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e887de1 elementor-widget elementor-widget-heading\" data-id=\"e887de1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We work in ICT Libya on securing networks of our customers, by managing accessibility on systems or apps, controlling the privilege of each employee on the system, detecting the activity of individuals on the network, beside preventing any penetration attempts from hackers or insiders. <br>\nWe achieve that with the most sophisticated technologies  that guarantee maximum security for your data from any cyberthreat. \n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8b036b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b036b2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-02e5c04\" data-id=\"02e5c04\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea1ad6c elementor-widget elementor-widget-heading\" data-id=\"ea1ad6c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> Cybersecurity awareness<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db1fec6 elementor-widget elementor-widget-heading\" data-id=\"db1fec6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ICT Libya do not only offer cybersecurity services for business and industrial enterprises, but also work to spread the cybersecurity awareness between all customers, organizations and individuals. <br>\nOrganizations always secure their information, systems, networks by deploying the best cybersecurity solutions, while individuals have the responsibility to know the dangers of cyberattacks and how it can happen, and how they may be the weak point that allow hacking or data loss. <br>\nSo, in ICT Libya we are care on transferring all instructions and knowledge to our customers, individuals and organizations, to make sure that all member in the team know his\/her responsibility. \n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8de5ad7\" data-id=\"8de5ad7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48210e3 elementor-widget elementor-widget-image\" data-id=\"48210e3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_9-pysv2mnu6qxp8ruogozvtan6e21nuwup6sfmjn5kp2.png\" title=\"sol_9\" alt=\"sol_9\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-67386fb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"67386fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7bd69dd\" data-id=\"7bd69dd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b88e86 elementor-widget elementor-widget-image\" data-id=\"2b88e86\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_10-pysv34irslm6lk670z1ccaoqi0b37452jnk4dvlzr6.png\" title=\"sol_10\" alt=\"sol_10\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b0e0afc\" data-id=\"b0e0afc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9371b41 elementor-widget elementor-widget-heading\" data-id=\"9371b41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DDI Security Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e338bf8 elementor-widget elementor-widget-heading\" data-id=\"e338bf8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">It is the service that includes security solutions of DNS, DHCP, IPAM, that ICT Libya works on managing all the network components and securing it with the most efficient techniques.<br>\nWith this service, we assure automating the monthly maintenance, detecting problems clearly and solving it,  more security and higher resilience. In addition to that it gives you more flexibility in managing the network and its availability. \n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>OT Cybersecurity Cybersecurity services from ICT Libya include several solutions that secure your business systems from the increasing cyberthreats, which is developing due to new penetrating technologies by hackers. In the digital era, the Operational Technology OT is threatened as well, because systems, machines, devices are connected to the network, where the big data is &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/\"> <span class=\"screen-reader-text\">OT Cybersecurity<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-544","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OT Cybersecurity - ICT LIBYA - INNOVATION FOR BUSINESS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT Cybersecurity - ICT LIBYA - INNOVATION FOR BUSINESS\" \/>\n<meta property=\"og:description\" content=\"OT Cybersecurity Cybersecurity services from ICT Libya include several solutions that secure your business systems from the increasing cyberthreats, which is developing due to new penetrating technologies by hackers. In the digital era, the Operational Technology OT is threatened as well, because systems, machines, devices are connected to the network, where the big data is &hellip; OT Cybersecurity Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ICT LIBYA - INNOVATION FOR BUSINESS\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-05T17:00:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_9-pysv2mnu6qxp8ruogozvtan6e21nuwup6sfmjn5kp2.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/\",\"url\":\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/\",\"name\":\"OT Cybersecurity - ICT LIBYA - INNOVATION FOR BUSINESS\",\"isPartOf\":{\"@id\":\"https:\/\/urapp.net\/wordpress\/#website\"},\"datePublished\":\"2022-12-15T18:31:21+00:00\",\"dateModified\":\"2023-01-05T17:00:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/urapp.net\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OT Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/urapp.net\/wordpress\/#website\",\"url\":\"https:\/\/urapp.net\/wordpress\/\",\"name\":\"ICT LIBYA - INNOVATION FOR BUSINESS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/urapp.net\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/urapp.net\/wordpress\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/urapp.net\/wordpress\/#organization\",\"name\":\"ICT LIBYA - INNOVATION FOR BUSINESS\",\"url\":\"https:\/\/urapp.net\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/urapp.net\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/2022\/12\/cropped-ict_logo-1.png\",\"contentUrl\":\"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/2022\/12\/cropped-ict_logo-1.png\",\"width\":445,\"height\":122,\"caption\":\"ICT LIBYA - INNOVATION FOR BUSINESS\"},\"image\":{\"@id\":\"https:\/\/urapp.net\/wordpress\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OT Cybersecurity - ICT LIBYA - INNOVATION FOR BUSINESS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"OT Cybersecurity - ICT LIBYA - INNOVATION FOR BUSINESS","og_description":"OT Cybersecurity Cybersecurity services from ICT Libya include several solutions that secure your business systems from the increasing cyberthreats, which is developing due to new penetrating technologies by hackers. In the digital era, the Operational Technology OT is threatened as well, because systems, machines, devices are connected to the network, where the big data is &hellip; OT Cybersecurity Read More &raquo;","og_url":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/","og_site_name":"ICT LIBYA - INNOVATION FOR BUSINESS","article_modified_time":"2023-01-05T17:00:31+00:00","og_image":[{"url":"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/elementor\/thumbs\/sol_9-pysv2mnu6qxp8ruogozvtan6e21nuwup6sfmjn5kp2.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/","url":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/","name":"OT Cybersecurity - ICT LIBYA - INNOVATION FOR BUSINESS","isPartOf":{"@id":"https:\/\/urapp.net\/wordpress\/#website"},"datePublished":"2022-12-15T18:31:21+00:00","dateModified":"2023-01-05T17:00:31+00:00","breadcrumb":{"@id":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/urapp.net\/wordpress\/ot_cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/urapp.net\/wordpress\/"},{"@type":"ListItem","position":2,"name":"OT Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/urapp.net\/wordpress\/#website","url":"https:\/\/urapp.net\/wordpress\/","name":"ICT LIBYA - INNOVATION FOR BUSINESS","description":"","publisher":{"@id":"https:\/\/urapp.net\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urapp.net\/wordpress\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urapp.net\/wordpress\/#organization","name":"ICT LIBYA - INNOVATION FOR BUSINESS","url":"https:\/\/urapp.net\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urapp.net\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/2022\/12\/cropped-ict_logo-1.png","contentUrl":"https:\/\/urapp.net\/wordpress\/wp-content\/uploads\/2022\/12\/cropped-ict_logo-1.png","width":445,"height":122,"caption":"ICT LIBYA - INNOVATION FOR BUSINESS"},"image":{"@id":"https:\/\/urapp.net\/wordpress\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/pages\/544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/comments?post=544"}],"version-history":[{"count":11,"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/pages\/544\/revisions"}],"predecessor-version":[{"id":873,"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/pages\/544\/revisions\/873"}],"wp:attachment":[{"href":"https:\/\/urapp.net\/wordpress\/wp-json\/wp\/v2\/media?parent=544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}