{"id":1302,"date":"2024-04-10T10:30:53","date_gmt":"2024-04-10T08:30:53","guid":{"rendered":"https:\/\/savecore.se\/package\/safety-analysis\/"},"modified":"2024-08-08T11:31:04","modified_gmt":"2024-08-08T09:31:04","slug":"safety-analysis","status":"publish","type":"page","link":"https:\/\/savecore.se\/en\/package\/safety-analysis\/","title":{"rendered":"Safety analysis"},"content":{"rendered":"<div class=\"gb-container gb-container-c869e67e\">\n<div class=\"gb-container gb-container-f5c61c25\">\n<div class=\"gb-container gb-container-f61a7176\">\n\n<div class=\"gb-headline gb-headline-beb1d43d gb-headline-text subheader\">Safety analysis<\/div>\n\n\n\n<h1 class=\"gb-headline gb-headline-f8dd00d7 gb-headline-text\">Map your IT security needs<\/h1>\n\n\n\n<a class=\"gb-button gb-button-a790f602 gb-button-text btn btn--primary\" href=\"#offers\">Our packages<\/a>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-08884acc bg-wave\">\n<div class=\"gb-container gb-container-9e238c7c\">\n<div class=\"gb-container gb-container-704325af\">\n\n<p class=\"gb-headline gb-headline-a51ed4c7 gb-headline-text\">Our security analysis focuses on data security and ransomware. The analysis gives you a clear picture of potential risks along with concrete suggestions for improvement. The result is an excellent basis for decision-making on a long-term plan for IT infrastructure and IT security.&nbsp;<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-d96475b8 grid-3\">\n<div class=\"gb-container gb-container-e216eb83\">\n\n<h3 class=\"gb-headline gb-headline-350c442d gb-headline-text subheader\">Step 1<\/h3>\n\n\n\n<p>Gathering information about your IT environment before start-up.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-41008ae4\">\n\n<h3 class=\"gb-headline gb-headline-dcc44256 gb-headline-text subheader\">Step 2<\/h3>\n\n\n\n<p>Start-up meeting where we go through data types (documents, emails, databases, etc.), consequences if data is lost, responsibilities and regulations, policies and incident management.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5ef4aa6e\">\n\n<h3 class=\"gb-headline gb-headline-75d76adc gb-headline-text subheader\">Step 3<\/h3>\n\n\n\n<p>Analysis and preparation, followed by a reporting meeting where we outline potential risks and make concrete suggestions for improvement.  <\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-f3e9695f\" id=\"offers\">\n<div class=\"gb-container gb-container-182c3334\">\n<div class=\"gb-container gb-container-b5426d92\">\n<div class=\"gb-container gb-container-411d4fae\">\n<div class=\"gb-container gb-container-d6e7a42d\">\n\n<p class=\"gb-headline gb-headline-06e1f77a gb-headline-text product-card__tag\">Small<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d468d3d9 gb-headline-text\">0-10 number of employees.&nbsp;<\/p>\n\n\n<div class=\"gb-container gb-container-ca815c45\">\n\n<div class=\"gb-headline gb-headline-97025228 gb-headline-text\">2,995 SEK<\/div>\n\n\n\n<div class=\"gb-headline gb-headline-c1d0bc33 gb-headline-text\">\/ month<\/div>\n\n<\/div>\n\n\n<a class=\"gb-button gb-button-a40081c9 gb-button-text btn btn--hollow\" href=\"https:\/\/savecore.se\/en\/contact-us\/?subject=Intresseanm%C3%A4lan%20S%C3%A4kerhetsanalys%20Liten\">More information<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-678d64d9\">\n\n<p class=\"gb-headline gb-headline-bfccb5db gb-headline-text product-card__tag\">Between<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7d43987e gb-headline-text\">10-100 number of employees.<\/p>\n\n\n<div class=\"gb-container gb-container-d24bea5b\">\n\n<div class=\"gb-headline gb-headline-be67db05 gb-headline-text\">4,995 SEK<\/div>\n\n\n\n<div class=\"gb-headline gb-headline-b7f6639d gb-headline-text\">\/ month<\/div>\n\n<\/div>\n\n\n<a class=\"gb-button gb-button-c4465b6c gb-button-text btn btn--hollow\" href=\"https:\/\/savecore.se\/en\/contact-us\/?subject=Intresseanm%C3%A4lan%20S%C3%A4kerhetsanalys%20Mellan\">More information<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0a6fa70f\">\n\n<p class=\"gb-headline gb-headline-0ec16835 gb-headline-text product-card__tag\">Big<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-dbe51121 gb-headline-text\">100 &gt; number of employees.<\/p>\n\n\n<div class=\"gb-container gb-container-67b99808\">\n\n<div class=\"gb-headline gb-headline-f419e0d1 gb-headline-text\">9,995 SEK<\/div>\n\n\n\n<div class=\"gb-headline gb-headline-a93731ac gb-headline-text\">\/ month<\/div>\n\n<\/div>\n\n\n<a class=\"gb-button gb-button-a9f9e13c gb-button-text btn btn--hollow\" href=\"https:\/\/savecore.se\/en\/contact-us\/?subject=Intresseanm%C3%A4lan%20S%C3%A4kerhetsanalys%20Stor\">More information<\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-05ed5f7f\">\n<div class=\"gb-container gb-container-a2fe2a0c\">\n<div class=\"gb-container gb-container-02b83c0e\">\n\n<h3 class=\"gb-headline gb-headline-eceff774 gb-headline-text\">Ask for help!<\/h3>\n\n\n\n<p>It can be difficult to determine the need for security in all parts of your IT infrastructure. Let us help you get started with a systematic approach to IT security.  <\/p>\n\n\n\n<a class=\"gb-button gb-button-05865cb7 gb-button-text btn btn--hollow\" href=\"#contact\">Contact us<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-87c4bb06\">\n\n<figure class=\"gb-block-image gb-block-image-ba0e8090\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"800\" class=\"gb-image gb-image-ba0e8090\" src=\"https:\/\/savecore.se\/wp-content\/uploads\/2024\/04\/toppbild-1200x800.jpg\" alt=\"\" title=\"top image\" srcset=\"https:\/\/savecore.se\/wp-content\/uploads\/2024\/04\/toppbild-1200x800.jpg 1200w, https:\/\/savecore.se\/wp-content\/uploads\/2024\/04\/toppbild-600x400.jpg 600w, https:\/\/savecore.se\/wp-content\/uploads\/2024\/04\/toppbild-2000x1333.jpg 2000w, https:\/\/savecore.se\/wp-content\/uploads\/2024\/04\/toppbild.jpg 2048w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Safety analysis Map your IT security needs Our security analysis focuses on data security and ransomware. The analysis gives you a clear picture of potential risks along with concrete suggestions for improvement. The result is an excellent basis for decision-making on a long-term plan for IT infrastructure and IT security.&nbsp; Step 1 Gathering information about &#8230; <a title=\"Safety analysis\" class=\"read-more\" href=\"https:\/\/savecore.se\/en\/package\/safety-analysis\/\" aria-label=\"Read more about Safety analysis\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":1184,"parent":1300,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1302","page","type-page","status-publish","has-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/pages\/1302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/comments?post=1302"}],"version-history":[{"count":1,"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/pages\/1302\/revisions"}],"predecessor-version":[{"id":1303,"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/pages\/1302\/revisions\/1303"}],"up":[{"embeddable":true,"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/pages\/1300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/media\/1184"}],"wp:attachment":[{"href":"https:\/\/savecore.se\/en\/wp-json\/wp\/v2\/media?parent=1302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}