{"id":31713,"date":"2021-02-23T19:27:43","date_gmt":"2021-02-23T19:27:43","guid":{"rendered":"http:\/\/thelogicgroup.com\/?page_id=31713"},"modified":"2021-06-11T16:16:22","modified_gmt":"2021-06-11T16:16:22","slug":"risk-assessments","status":"publish","type":"page","link":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/","title":{"rendered":"Risk Assessments"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jkjmqted-1a63765623bc59fd4c858aaa45b537c0\">\n.avia-section.av-jkjmqted-1a63765623bc59fd4c858aaa45b537c0 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-jkjmqted-1a63765623bc59fd4c858aaa45b537c0 .av-section-color-overlay{\nopacity:0.6;\nbackground-color:#000000;\n}\n<\/style>\n<div id='amg-diagonal-overlay'  class='avia-section av-jkjmqted-1a63765623bc59fd4c858aaa45b537c0 header_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active av-minimum-height av-minimum-height-50 av-height-50  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='50' data-av_min_height_opt='50'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner header_color avia-full-stretch'><\/div><\/div><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31713'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1xzgnjg-1902772b399c44fce51bfbf75088774d\">\n.flex_column.av-1xzgnjg-1902772b399c44fce51bfbf75088774d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1xzgnjg-1902772b399c44fce51bfbf75088774d av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kpsj1trr-774b9cefa4fd4eb4a046080e2185fb20\">\n#top .av-special-heading.av-kpsj1trr-774b9cefa4fd4eb4a046080e2185fb20{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-kpsj1trr-774b9cefa4fd4eb4a046080e2185fb20 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kpsj1trr-774b9cefa4fd4eb4a046080e2185fb20 .av-subheading{\nfont-size:23px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kpsj1trr-774b9cefa4fd4eb4a046080e2185fb20 .av-special-heading-tag{\nfont-size:46px;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kpsj1trr-774b9cefa4fd4eb4a046080e2185fb20 av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Cybersecurity Risk Assessments<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531\">\n#top .av_textblock_section.av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock amg-subtext av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">Our risk assessment process finds the vulnerabilities in your network and evaluates their risks. These assessments keep your network safe.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-julddnw5-73053ac3ecf39ba99c62054000b37426-wrap avia-button-center  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last '><a href='https:\/\/thelogicgroup.com\/contact\/'  class='avia-button av-julddnw5-73053ac3ecf39ba99c62054000b37426 av-link-btn avia-icon_select-no avia-size-large avia-position-center avia-color-light'   aria-label=\"Protect Your Network\"><span class='avia_iconbox_title' >Protect Your Network<\/span><\/a><\/div><\/p><\/div><\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaiqobqr-a839a6f0fe8c7fae779db5223cd48f8d\">\n.avia-section.av-kaiqobqr-a839a6f0fe8c7fae779db5223cd48f8d{\nbackground-color:#00476b;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-kaiqobqr-a839a6f0fe8c7fae779db5223cd48f8d main_color avia-section-default avia-no-border-styling  avia-builder-el-5  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31713'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531\">\n#top .av_textblock_section.av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock amg-subtext av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">What is a cyber risk assessment? It\u2019s an assessment that looks for vulnerabilities and risks in your business network. At The Logic Group, we perform risk assessments to show you where your network\u2019s biggest hazards and risks lie. Then we work with you to resolve those vulnerabilities through our risk management process.<\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-35maq0c-63a534ac5003292273aaea1cb3ac0513\">\n.avia-section.av-35maq0c-63a534ac5003292273aaea1cb3ac0513 .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#ffffff;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-35maq0c-63a534ac5003292273aaea1cb3ac0513 main_color avia-section-large avia-no-border-styling  avia-builder-el-7  el_after_av_section  el_before_av_section  avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  ><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31713'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1k807-9f4bff51af53ee4c969fdc8a4006b73a\">\n.flex_column.av-1k807-9f4bff51af53ee4c969fdc8a4006b73a{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1k807-9f4bff51af53ee4c969fdc8a4006b73a av_one_full  avia-builder-el-8  avia-builder-el-no-sibling  first av-break-at-tablet flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-35ecb3e7856efa6817b27ab5026ec981\">\n#top .av-special-heading.av-av_heading-35ecb3e7856efa6817b27ab5026ec981{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-35ecb3e7856efa6817b27ab5026ec981 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-35ecb3e7856efa6817b27ab5026ec981 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-35ecb3e7856efa6817b27ab5026ec981 av-special-heading-h2 blockquote modern-quote  avia-builder-el-9  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >What Do Our Risk Assessments Look For?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-jkmanyih-c8d4eafcdde3577a5e7fa1e54445b06a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p>Our risk assessments check to see if you have the security controls in place to protect your network users and data from cyberattacks. We ensure your information systems don\u2019t have any holes that cyberthreats can exploit. We also verify that none of your network\u2019s sensitive data is exposed or easily accessible.<\/p>\n<p>Additionally, we run checks to see if your employees can identify phishing emails. We create phishing simulations to see how many employees open the email and click through the link. All the cybersecurity measures in the world can\u2019t undo human error, so we have to check that your workforce can avoid phishing attempts and other social engineering attacks.<\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jun7g20j-a8017a217c13a360d65416b804fe23ea\">\n.avia-section.av-jun7g20j-a8017a217c13a360d65416b804fe23ea{\nbackground-color:#3f3f3f;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-jun7g20j-a8017a217c13a360d65416b804fe23ea main_color avia-section-large avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31713'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jvmmre23-2b77d2c2626749412303a1be4c2e1e7b\">\n.flex_column.av-jvmmre23-2b77d2c2626749412303a1be4c2e1e7b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-jvmmre23-2b77d2c2626749412303a1be4c2e1e7b av_one_full  avia-builder-el-12  avia-builder-el-no-sibling  first flex_column_div av-animated-generic pop-up av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km3ugjlc-65446788cdde4e7c66465a4243d2f51f\">\n#top .av-special-heading.av-km3ugjlc-65446788cdde4e7c66465a4243d2f51f{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#ffffff;\n}\nbody .av-special-heading.av-km3ugjlc-65446788cdde4e7c66465a4243d2f51f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-km3ugjlc-65446788cdde4e7c66465a4243d2f51f .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-km3ugjlc-65446788cdde4e7c66465a4243d2f51f .av-subheading{\nfont-size:23px;\n}\n<\/style>\n<div  class='av-special-heading av-km3ugjlc-65446788cdde4e7c66465a4243d2f51f av-special-heading-h2 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-13  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Schedule a Risk Assessment for Your Network<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531\">\n#top .av_textblock_section.av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-juk5nwr2-80fabbb9f29fd6ecbf239cae08866531 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock amg-subtext av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">Locate and reduce your network\u2019s risks and vulnerabilities with a risk assessment from The Logic Group.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jkjvrpjm-c2b9733f4062e361d4a8fffe221a4a9e\">\n#top .hr.av-jkjvrpjm-c2b9733f4062e361d4a8fffe221a4a9e{\nmargin-top:5px;\nmargin-bottom:20px;\n}\n.hr.av-jkjvrpjm-c2b9733f4062e361d4a8fffe221a4a9e .hr-inner{\nwidth:80px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-jkjvrpjm-c2b9733f4062e361d4a8fffe221a4a9e hr-custom  avia-builder-el-15  el_after_av_textblock  el_before_av_button  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-julddnw5-6767e3b6b3e090b69edaed99c22dcf21-wrap avia-button-center  avia-builder-el-16  el_after_av_hr  avia-builder-el-last '><a href='https:\/\/thelogicgroup.com\/contact\/'  class='avia-button av-julddnw5-6767e3b6b3e090b69edaed99c22dcf21 av-link-btn avia-icon_select-no avia-size-large avia-position-center avia-color-light'   aria-label=\"Schedule an Assessment\"><span class='avia_iconbox_title' >Schedule an Assessment<\/span><\/a><\/div><\/p><\/div>\n<\/p>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_5'  class='avia-section av-cmxmvy-efd7c7ec461bf657862ab425a87e9d37 main_color avia-section-large avia-no-border-styling  avia-builder-el-17  el_after_av_section  el_before_av_layout_row  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31713'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1k807-3000f7a5767a50e32c011715bc19e7d2\">\n.flex_column.av-1k807-3000f7a5767a50e32c011715bc19e7d2{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1k807-3000f7a5767a50e32c011715bc19e7d2 av_three_fifth  avia-builder-el-18  el_before_av_two_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kpsj4tf2-89c562fb11e3a2cf70b58cd82ac327f4\">\n#top .av-special-heading.av-kpsj4tf2-89c562fb11e3a2cf70b58cd82ac327f4{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-kpsj4tf2-89c562fb11e3a2cf70b58cd82ac327f4 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kpsj4tf2-89c562fb11e3a2cf70b58cd82ac327f4 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-kpsj4tf2-89c562fb11e3a2cf70b58cd82ac327f4 av-special-heading-h2 blockquote modern-quote  avia-builder-el-19  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >How Do Risk Assessments Prevent Cyberattacks?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-jkmanyih-c8d4eafcdde3577a5e7fa1e54445b06a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Risk assessments prevent cyberattacks by showing you where they could occur within your network. Once we show you where those attacks could happen, we help you put control measures in place that stop those attacks from accessing your network. For example, if you have a problem with employees falling for phishing scams, we send out simulated phishing emails to check which employees fall for those scams. After we assess their reactions to phishing emails, we can hold security awareness training sessions to improve their ability to identify phishing emails. Risk assessments protect your network from cyberattacks by showing you where you can improve your security measures.<\/p>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1k807-c1ded7035dede33add777d54bb3cf7ab\">\n.flex_column.av-1k807-c1ded7035dede33add777d54bb3cf7ab{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1k807-c1ded7035dede33add777d54bb3cf7ab av_two_fifth  avia-builder-el-21  el_after_av_three_fifth  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jun27anb-a0e62ccdec38fafef5ca1b2f09b8c738\">\n.avia-image-container.av-jun27anb-a0e62ccdec38fafef5ca1b2f09b8c738 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-jun27anb-a0e62ccdec38fafef5ca1b2f09b8c738 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-jun27anb-a0e62ccdec38fafef5ca1b2f09b8c738 av-styling- avia-align-center  avia-builder-el-22  avia-builder-el-no-sibling  amg-image-shadow'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-31860 avia-img-lazy-loading-not-31860 avia_image ' src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Two-IT-speciailist-reviewing-code-845x684.jpg\" alt='' title='Two IT speciailist reviewing code'  height=\"684\" width=\"845\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Two-IT-speciailist-reviewing-code-845x684.jpg 845w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Two-IT-speciailist-reviewing-code-495x400.jpg 495w\" sizes=\"(max-width: 845px) 100vw, 845px\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av-layout-grid-1'  class='av-layout-grid-container av-korrka-a1a6d7460a97b5fe778a9f765ede6091 entry-content-wrapper main_color av-flex-cells av-break-at-tablet  avia-builder-el-23  el_after_av_section  el_before_av_section  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juu1na00-509001bbba59a4fa3e0dcfc036cece33\">\n.flex_cell.av-juu1na00-509001bbba59a4fa3e0dcfc036cece33{\nvertical-align:middle;\nbackground:url(https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/case_study_img4.jpg) 50% 50% no-repeat scroll #266696;\n}\n.responsive #top #wrap_all .flex_cell.av-juu1na00-509001bbba59a4fa3e0dcfc036cece33{\npadding:75px 100px 75px 100px !important;\n}\n<\/style>\n<div class='flex_cell av-juu1na00-509001bbba59a4fa3e0dcfc036cece33 av-gridrow-cell av_one_half no_margin  avia-builder-el-24  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle avia-full-stretch'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-c6c24ba2222d735ce79d579c7f3e1bbe\">\n#top .av-special-heading.av-av_heading-c6c24ba2222d735ce79d579c7f3e1bbe{\npadding-bottom:10px;\ncolor:#ffffff;\n}\nbody .av-special-heading.av-av_heading-c6c24ba2222d735ce79d579c7f3e1bbe .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-c6c24ba2222d735ce79d579c7f3e1bbe .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-av_heading-c6c24ba2222d735ce79d579c7f3e1bbe .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-c6c24ba2222d735ce79d579c7f3e1bbe av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-25  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Locate Your Network\u2019s Risks With The Logic Group<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jkmanyih-b30a124c8567844607b94f75784c3736\">\n#top .av_textblock_section.av-jkmanyih-b30a124c8567844607b94f75784c3736 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jkmanyih-b30a124c8567844607b94f75784c3736 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: left;\">If you want to improve your network security with a risk assessment, reach out to us today. Our risk assessments and risk management processes ensure your network\u2019s safety by showing you where to improve your security controls and measures. Let us perform an assessment, and we\u2019ll show you how to tighten your cybersecurity. We can also show you how your workforce responds to social engineering attacks and train them to identify phishing emails. We\u2019re here to protect your network by preventing cyberattacks from happening.<\/p>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juu1lw83-c4556e57db903ba25cb74bcc672bbb4a\">\n.flex_cell.av-juu1lw83-c4556e57db903ba25cb74bcc672bbb4a{\nvertical-align:middle;\nbackground:url(https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/case_study_img1.jpg) 50% 0% no-repeat scroll #183e59;\n}\n.responsive #top #wrap_all .flex_cell.av-juu1lw83-c4556e57db903ba25cb74bcc672bbb4a{\npadding:75px 100px 75px 100px !important;\n}\n<\/style>\n<div class='flex_cell av-juu1lw83-c4556e57db903ba25cb74bcc672bbb4a av-gridrow-cell av_one_half no_margin  avia-builder-el-27  el_after_av_cell_one_half  avia-builder-el-last  amg-grid-row-overlay content-align-middle avia-full-stretch'  ><div class='flex_cell_inner'><div class='flex_column_table av-jvmndsui-7d8eb9d560ab01f4ab8e59bcffcaa32b sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jvmndsui-7d8eb9d560ab01f4ab8e59bcffcaa32b\">\n.flex_column.av-jvmndsui-7d8eb9d560ab01f4ab8e59bcffcaa32b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-jvmndsui-7d8eb9d560ab01f4ab8e59bcffcaa32b av_one_full  avia-builder-el-28  avia-builder-el-no-sibling  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic pop-up av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jr8jv3lj-457a921b67aad00240095f86599cc2db\">\n#top .av_textblock_section.av-jr8jv3lj-457a921b67aad00240095f86599cc2db .avia_textblock{\nfont-size:25px;\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jr8jv3lj-457a921b67aad00240095f86599cc2db '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock amg-secondary-cta av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">Discover Our Security Awareness Training Program<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jr8jv3lj-ec2802730722a4a9b575be8911440d29\">\n#top .av_textblock_section.av-jr8jv3lj-ec2802730722a4a9b575be8911440d29 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jr8jv3lj-ec2802730722a4a9b575be8911440d29 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">We provide security awareness training to teach your employees how to avoid social engineering attacks and other cyberthreats.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jrshgahz-ed6f5882dd689a9b839c998fba139b97\">\n#top .hr.hr-invisible.av-jrshgahz-ed6f5882dd689a9b839c998fba139b97{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-jrshgahz-ed6f5882dd689a9b839c998fba139b97 hr-invisible  avia-builder-el-31  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-jqgreecl-3436d5d47eb2f6aa2f730afa60baac29-wrap avia-button-center  avia-builder-el-32  el_after_av_hr  avia-builder-el-last '><a href='https:\/\/thelogicgroup.com\/cyber-security-services\/security-awareness-training\/'  class='avia-button av-jqgreecl-3436d5d47eb2f6aa2f730afa60baac29 av-link-btn avia-icon_select-no avia-size-large avia-position-center avia-color-light'   aria-label=\"Train Your Employees\"><span class='avia_iconbox_title' >Train Your Employees<\/span><\/a><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<\/div><\/div><\/div><div id='av_section_6'  class='avia-section av-jun4ug8q-c79c1c24e2f7277633e213bbc21389f6 main_color avia-section-large avia-no-border-styling  avia-builder-el-33  el_after_av_layout_row  avia-builder-el-last  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31713'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-2qmgz-63654fbb076e0fb22fda39b697ebbd18 sc-av_two_fifth av-break-at-tablet-flextable av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2qmgz-63654fbb076e0fb22fda39b697ebbd18\">\n.flex_column.av-2qmgz-63654fbb076e0fb22fda39b697ebbd18{\nborder-radius:0px 0px 0px 0px;\npadding:25px 25px 25px 25px;\n}\n<\/style>\n<div  class='flex_column av-2qmgz-63654fbb076e0fb22fda39b697ebbd18 av_two_fifth  avia-builder-el-34  el_before_av_three_fifth  avia-builder-el-first  amg-sitewide-form first av-break-at-tablet flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jund1vwd-d6246a881212a7eda497691e8b741608\">\n.avia-image-container.av-jund1vwd-d6246a881212a7eda497691e8b741608 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-jund1vwd-d6246a881212a7eda497691e8b741608 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-jund1vwd-d6246a881212a7eda497691e8b741608 av-styling- avia-align-center  avia-builder-el-35  el_before_av_heading  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-31654 avia-img-lazy-loading-not-31654 avia_image ' src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-300x300.png\" alt='' title='logic_group_contact_icon'  height=\"300\" width=\"300\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-300x300.png 300w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-80x80.png 80w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-36x36.png 36w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-180x180.png 180w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-120x120.png 120w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon-450x450.png 450w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/01\/logic_group_contact_icon.png 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km3uk3gm-38380a6cbfc6fcf2d12b29d9e52c6d20\">\n#top .av-special-heading.av-km3uk3gm-38380a6cbfc6fcf2d12b29d9e52c6d20{\nmargin:0px 0px 0px 0px;\npadding-bottom:10px;\n}\nbody .av-special-heading.av-km3uk3gm-38380a6cbfc6fcf2d12b29d9e52c6d20 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-km3uk3gm-38380a6cbfc6fcf2d12b29d9e52c6d20 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-km3uk3gm-38380a6cbfc6fcf2d12b29d9e52c6d20 av-special-heading-h2 blockquote modern-quote modern-centered  avia-builder-el-36  el_after_av_image  el_before_av_hr  av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Talk With Us<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jkjvrpjm-61c4c48bd206f63546c5e57aebe2e6c1\">\n#top .hr.av-jkjvrpjm-61c4c48bd206f63546c5e57aebe2e6c1{\nmargin-top:15px;\nmargin-bottom:15px;\n}\n.hr.av-jkjvrpjm-61c4c48bd206f63546c5e57aebe2e6c1 .hr-inner{\nwidth:80px;\n}\n<\/style>\n<div  class='hr av-jkjvrpjm-61c4c48bd206f63546c5e57aebe2e6c1 hr-custom  avia-builder-el-37  el_after_av_heading  el_before_av_textblock  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-juk5nwr2-c6097c893d39125218f354f614caa0c3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock amg-subtext'  itemprop=\"text\" ><p style=\"text-align: center;\">Connect with us today to learn more about our risk assessment services.<\/p>\n<\/div><\/section><\/p><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2qmgz-4efe8fe1f4739a9efcec242229bdca60\">\n.flex_column.av-2qmgz-4efe8fe1f4739a9efcec242229bdca60{\nborder-radius:0px 0px 0px 0px;\npadding:25px 25px 25px 25px;\n}\n<\/style>\n<div  class='flex_column av-2qmgz-4efe8fe1f4739a9efcec242229bdca60 av_three_fifth  avia-builder-el-39  el_after_av_two_fifth  avia-builder-el-last  amg-sitewide-form av-break-at-tablet flex_column_table_cell av-equal-height-column av-align-top av-animated-generic pop-up  '     ><section  class='av_textblock_section av-js3ebgxq-b74429f8382cdaffa26df5a0dbb7b9e3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n\/* ]]> *\/\n<\/script>\n\n                <div class='gf_browser_unknown gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_4' ><form method='post' enctype='multipart\/form-data'  id='gform_4'  action='\/wp-json\/wp\/v2\/pages\/31713' data-formid='4' novalidate><div class='gf_invisible ginput_recaptchav3' data-sitekey='6LfnNrEeAAAAADhe3BgQ3mQkLyAINm5q60ua_ZcH' data-tabindex='0'><input id=\"input_35be03f21148cf7daf00d9edcddf7231\" class=\"gfield_recaptcha_response\" type=\"hidden\" name=\"input_35be03f21148cf7daf00d9edcddf7231\" value=\"\"\/><\/div>\n                        <div class='gform-body gform_body'><ul id='gform_fields_4' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id=\"field_4_1\" class=\"gfield gfield--type-text gf_left_third gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_1'>First Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_4_1' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_2\" class=\"gfield gfield--type-text gf_middle_third gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_2'>Last Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_2' id='input_4_2' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_3\" class=\"gfield gfield--type-text gf_right_third field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_3'>Company<\/label><div class='ginput_container ginput_container_text'><input name='input_3' id='input_4_3' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_13\" class=\"gfield gfield--type-phone gfield--width-full gf_left_third gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_13'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_13' id='input_4_13' type='tel' value='' class='large'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_4\" class=\"gfield gfield--type-text gf_left_third gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_hidden\"  ><div class=\"admin-hidden-markup\"><i class=\"gform-icon gform-icon--hidden\" aria-hidden=\"true\" title=\"This field is hidden when viewing the form\"><\/i><span>This field is hidden when viewing the form<\/span><\/div><label class='gfield_label gform-field-label' for='input_4_4'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_4' id='input_4_4' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_14\" class=\"gfield gfield--type-email gfield--width-full gf_middle_third gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_14'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_14' id='input_4_14' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/li><li id=\"field_4_5\" class=\"gfield gfield--type-text gf_middle_third field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_hidden\"  ><div class=\"admin-hidden-markup\"><i class=\"gform-icon gform-icon--hidden\" aria-hidden=\"true\" title=\"This field is hidden when viewing the form\"><\/i><span>This field is hidden when viewing the form<\/span><\/div><label class='gfield_label gform-field-label' for='input_4_5'>Email<\/label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_4_5' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_6\" class=\"gfield gfield--type-select gf_right_third field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_6'>Preferred Contact Method<\/label><div class='ginput_container ginput_container_select'><select name='input_6' id='input_4_6' class='large gfield_select'     aria-invalid=\"false\" ><option value='Phone' >Phone<\/option><option value='Email' >Email<\/option><\/select><\/div><\/li><li id=\"field_4_7\" class=\"gfield gfield--type-text field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_7'>Zip Code<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_4_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_4_8\" class=\"gfield gfield--type-textarea field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_4_8'>Message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_4_8' class='textarea small'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/li><li id=\"field_4_10\" class=\"gfield gfield--type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_10' id='input_4_10' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='012A0000000T0js' \/><\/div><\/li><li id=\"field_4_11\" class=\"gfield gfield--type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_11' id='input_4_11' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='Contact Us' \/><\/div><\/li><li id=\"field_4_12\" class=\"gfield gfield--type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_12' id='input_4_12' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='0014A00002XG4GIQA1' \/><\/div><\/li><\/ul><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_4' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_4' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_4' id='gform_theme_4' value='legacy' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_4' id='gform_style_settings_4' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_4' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='4' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='VbUYw++5Tmrn8cSKCYAFnwTaLkfcw31EcEZRFvX\/ik5jQc+yVHV6pxsc2v81zTY\/ih29HqE0+oCFaWR+t2QcQLGsHKh1Du7CM88ivPjv8z5GwEg=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_4' value='WyJbXSIsImNiYjY4NmQwMDIxN2I1YTliMWZkOTdkNDFhMjJlMzJiIl0=' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_4' id='gform_target_page_number_4' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_4' id='gform_source_page_number_4' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n gform.initializeOnLoaded( function() {gformInitSpinner( 4, 'https:\/\/thelogicgroup.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_4').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_4');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_4').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_4').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_4').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_4').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_4').val();gformInitSpinner( 4, 'https:\/\/thelogicgroup.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [4, current_page]);window['gf_submitting_4'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_4').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [4]);window['gf_submitting_4'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_4').text());}else{jQuery('#gform_4').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"4\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_4\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_4\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_4\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 4, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); \n\/* ]]> *\/\n<\/script>\n\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":31673,"parent":31685,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31713","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Discover Our Cybersecurity Risk Assessments | The Logic Group<\/title>\n<meta name=\"description\" content=\"Cybersecurity risk assessments show you the vulnerabilities in your network so you can reduce them and increase your network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discover Our Cybersecurity Risk Assessments | The Logic Group\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity risk assessments show you the vulnerabilities in your network so you can reduce them and increase your network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-11T16:16:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/\",\"url\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/\",\"name\":\"Discover Our Cybersecurity Risk Assessments | The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg\",\"datePublished\":\"2021-02-23T19:27:43+00:00\",\"dateModified\":\"2021-06-11T16:16:22+00:00\",\"description\":\"Cybersecurity risk assessments show you the vulnerabilities in your network so you can reduce them and increase your network security.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg\",\"width\":2000,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Services\",\"item\":\"https:\/\/thelogicgroup.com\/cyber-security-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Risk Assessments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discover Our Cybersecurity Risk Assessments | The Logic Group","description":"Cybersecurity risk assessments show you the vulnerabilities in your network so you can reduce them and increase your network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/","og_locale":"en_US","og_type":"article","og_title":"Discover Our Cybersecurity Risk Assessments | The Logic Group","og_description":"Cybersecurity risk assessments show you the vulnerabilities in your network so you can reduce them and increase your network security.","og_url":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/","og_site_name":"The Logic Group","article_modified_time":"2021-06-11T16:16:22+00:00","og_image":[{"width":2000,"height":1250,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/","url":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/","name":"Discover Our Cybersecurity Risk Assessments | The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg","datePublished":"2021-02-23T19:27:43+00:00","dateModified":"2021-06-11T16:16:22+00:00","description":"Cybersecurity risk assessments show you the vulnerabilities in your network so you can reduce them and increase your network security.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Man-looking-at-phone-while-working-on-laptop.jpg","width":2000,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/cyber-security-services\/risk-assessments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Services","item":"https:\/\/thelogicgroup.com\/cyber-security-services\/"},{"@type":"ListItem","position":3,"name":"Risk Assessments"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages\/31713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=31713"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages\/31713\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages\/31685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/31673"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=31713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}