{"id":7,"date":"2012-05-26T12:22:55","date_gmt":"2012-05-26T12:22:55","guid":{"rendered":"http:\/\/cyberconsultingservices.com\/wordpress\/?page_id=7"},"modified":"2016-03-16T00:07:12","modified_gmt":"2016-03-15T18:37:12","slug":"about-us","status":"publish","type":"page","link":"http:\/\/cyberconsultingservices.com\/wordpress\/about-us\/","title":{"rendered":"About Us"},"content":{"rendered":"<p style=\"text-align: justify;\">Cyber world representing internet is getting integrated into everybody\u2019s life in one way or another. It varies from basic email usage to business critical financial transaction and confidential document management.<\/p>\n<p style=\"text-align: justify;\">Many times it is not even realized that internet has been included in one\u2019s life because some of its usage are so common that they are transparent to users, IP Telephony and air ticket booking by an agent are such examples. On the other hand, online shopping, flight ticket booking, chatting, video conferencing, utility bill payment, banking statement and fund transactions etc. are common activities over internet.<\/p>\n<p style=\"text-align: justify;\">Cyber world ease the life of users as it brings global world together and facilitate faster flow of not only information but also money and documents. To your surprise, it also facilitate of faster goods delivery; not only by improving processes around it but actual goods* are also being delivered through internet.<\/p>\n<p>While cyber world resulting in tremendous improvement of process and turnaround time, it is imposed with a huge security risk!<\/p>\n<p style=\"text-align: justify;\">Cyber world is nothing but a set of very large number of computers connected together and anyone can have internet connection for few bucks and enter into cyber world. As we have bad guys and thieves in real world, so they are there in cyber world. Studies show<\/p>\n<p>&#8230;<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Cycoos delivers consulting services around cyber world. Many legal advisors, IT Security experts and business consultants are associated to assist you in following but not limited to:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Proactive Action &#8211; planning to bring your business online, reviewing business plan, improve online business, IT plan and IT security control, legal compliance<\/li>\n<li style=\"text-align: justify;\">Reactive Action \u2013 legal disputes, case reviews, security assessment review and forensics<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Cycoos is committed to serve global community to improve general awareness about cyber security, cyber development and cyber crime free of cost.<\/p>\n<p>&nbsp;<\/p>\n<table border=\"0\">\n<tbody>\n<!--\n\n<tr>\n\n\n<td width=\"150\"><strong>Group companies<\/strong>\n\n\n<ol>\n\t\n\n<li><a href=\"http:\/\/www.absms.in\">ABS Multi Services<\/a><\/li>\n\n\n\t\n\n<li><a href=\"http:\/\/www.kvcindia.com\">KVC Info Pvt. Ltd.<\/a><\/li>\n\n\n\t\n\n<li><a href=\"http:\/\/www.shanq.net\">Shanq Web<\/a><\/li>\n\n\n<\/ol>\n\n\n<\/td>\n\n\n\n\n<td><span style=\"color: #ffffff;\">user-friendly document management software company New Delhi India, document scanning and document imaging software New delhi India. With document management software applications centralized repository of electronic and paper documents Scanning software Delhi, Document Imaging software India, Document storage management India, Email management company experts Delhi India,\u00a0Document management software East Delhi India, Document management experts India, File management softwares India<\/span><\/td>\n\n\n<\/tr>\n\n\n\n\n<tr>\n\n\n<td colspan=\"2\"><strong>Some of our esteemed customer<\/strong><img loading=\"lazy\" class=\"alignnone size-full wp-image-164\" title=\"clients-small\" src=\"http:\/\/cyberconsultingservices.com\/wordpress\/wp-content\/uploads\/2012\/05\/clients-small.gif\" alt=\"\" width=\"586\" height=\"55\" srcset=\"http:\/\/cyberconsultingservices.com\/wordpress\/wp-content\/uploads\/2012\/05\/clients-small.gif 586w, http:\/\/cyberconsultingservices.com\/wordpress\/wp-content\/uploads\/2012\/05\/clients-small-300x28.gif 300w, http:\/\/cyberconsultingservices.com\/wordpress\/wp-content\/uploads\/2012\/05\/clients-small-305x28.gif 305w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/td>\n\n\n<\/tr>\n\n--><br \/>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"open","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/pages\/7"}],"collection":[{"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":13,"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":279,"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/pages\/7\/revisions\/279"}],"wp:attachment":[{"href":"http:\/\/cyberconsultingservices.com\/wordpress\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}