{"id":11,"date":"2024-09-14T11:56:07","date_gmt":"2024-09-14T11:56:07","guid":{"rendered":"https:\/\/ohv.hsk.mybluehost.me\/website_0e04dfae\/about\/"},"modified":"2024-11-18T08:37:13","modified_gmt":"2024-11-18T08:37:13","slug":"about","status":"publish","type":"page","link":"https:\/\/cyberriskpartners.net\/en_gb\/about\/","title":{"rendered":"About Us"},"content":{"rendered":"\n<div class=\"nfd-container nfd-p-md nfd-theme-white nfd-bg-surface is-style-nfd-theme-white wp-block-group is-layout-constrained wp-container-core-group-is-layout-19e250f3 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-6894eabb wp-block-columns-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"nfd-text-xl md:nfd-text-left nfd-text-primary nfd-text-balance wp-block-heading has-text-align-right\">Our primary focus is our clients<\/h3>\n<\/div>\n\n\n\n<div class=\"nfd-normalize-gap wp-block-column is-vertically-aligned-center is-layout-flow wp-container-core-column-is-layout-c3c25319 wp-block-column-is-layout-flow\" style=\"border-left-width:2px;padding-left:32px\">\n<div class=\"nfd-text-balance nfd-text-md wp-block-group is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-43b76d90 wp-block-group-is-layout-constrained\" style=\"padding-top:6px;padding-bottom:6px\">\n<p class=\"\">We provide a range of cyber security services, tailored to fit our clients&#8217; needs.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-container nfd-p-lg nfd-theme-white nfd-bg-surface is-style-nfd-theme-white wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"nfd-gap-y-2xl wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-12beab2d wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-container-core-column-is-layout-22223934 wp-block-column-is-layout-flow\">\n<figure class=\"nfd-rounded-full wp-block-image aligncenter size-large is-resized has-custom-border\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/i0.wp.com\/ohv.hsk.mybluehost.me\/website_0e04dfae\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2-1024x683.png?resize=1024%2C683&#038;ssl=1\" alt=\"\" class=\"has-border-color wp-image-43\" style=\"border-color:#0000001a;border-width:1px;aspect-ratio:1;object-fit:cover;width:96px\" srcset=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2.png?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2.png?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2.png?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2.png?resize=2048%2C1366&amp;ssl=1 2048w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Nick-Thatcher-2.png?w=3000&amp;ssl=1 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div class=\"nfd-gap-0 wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-353c4f5a wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-md has-text-align-center\"><strong>Nick Thatcher<\/strong><\/p>\n\n\n\n<p class=\"nfd-text-base nfd-text-faded has-text-align-center\">Managing Director<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-container nfd-p-lg nfd-theme-darker nfd-bg-surface is-style-nfd-theme-darker wp-block-group nfd-bg-effect-dots is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"nfd-text-base nfd-gap-md nfd-gap-y-xl wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\" style=\"border-width:1px\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">01<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Comprehensive<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Our comprehensive services address the unique cyber security challenges faced by organizations.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">02<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Tailored Approach<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">We take a tailored approach to cyber security, understanding the specific needs and requirements of each client<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\" style=\"border-width:1px\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">03<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Industry<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">With our industry expertise and deep knowledge of cybersecurity best practices, we help organizations navigate the complex landscape.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-text-base nfd-gap-md nfd-gap-y-xl wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">04<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Flexible<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">From full-time support, to occasional needs, we can adjust the level of engagement.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\" style=\"border-width:1px\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">05<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Our Expert Team<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Our team consists of highly skilled cyber security professionals with extensive experience.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">06<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Global Reach<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">We serve clients worldwide, offering our expertise in cyber security to businesses of all sizes.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-container wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"nfd-p-0 nfd-rounded-lg wp-block-cover has-custom-content-position is-position-center-left\" style=\"min-height:50vw;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim wp-block-cover__gradient-background has-background-gradient\" style=\"background:linear-gradient(90deg,rgba(0,0,0,0.9) 50%,rgba(0,0,0,0.1) 50%)\"><\/span><img decoding=\"async\" class=\"wp-block-cover__image-background\" alt=\"\" src=\"https:\/\/images.unsplash.com\/photo-1487017159836-4e23ece2e4cf?ixlib=rb-4.0.3&amp;ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&amp;auto=format&amp;fit=crop&amp;w=1374&amp;q=80&amp;w=1500&amp;h=&amp;crop=\" data-object-fit=\"cover\"\/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"nfd-gap-2xl nfd-p-card-square-lg nfd-bg-surface nfd-theme-darker is-style-nfd-theme-darker wp-block-group has-background is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-58227553 wp-block-group-is-layout-flex\" style=\"background-color:#00000000\">\n<h2 class=\"nfd-text-giga nfd-text-contrast wp-block-heading has-text-align-left\"><span class=\"highlight\">Drive business growth with peace of mind.<\/span><\/h2>\n\n\n\n<div class=\"md:nfd-items-start nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<div class=\"nfd-text-md wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fc4fd283 wp-block-buttons-is-layout-flex\">\n<div class=\"nfd-btn-xl wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">We can take the worry out of cyber security, by assessing where you are and where you want to be, with respect to cyber risk.<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Our primary focus is our clients We provide a range of cyber security services, tailored to fit our clients&#8217; needs. Nick Thatcher Managing Director 01 Comprehensive Our comprehensive services address the unique cyber security challenges faced by organizations. 02 Tailored Approach We take a tailored approach to cyber security, understanding the specific needs and requirements [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"no-title","meta":{"nf_dc_page":"about","footnotes":""},"class_list":["post-11","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":3,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":144,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/11\/revisions\/144"}],"wp:attachment":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}