{"id":1985,"date":"2022-02-21T05:14:06","date_gmt":"2022-02-21T05:14:06","guid":{"rendered":"https:\/\/elicon-group.com\/?page_id=1985"},"modified":"2022-03-03T10:10:16","modified_gmt":"2022-03-03T10:10:16","slug":"it-infrastructure-cyber-security","status":"publish","type":"page","link":"https:\/\/elicon-group.com\/ja\/it-infrastructure-cyber-security\/","title":{"rendered":"IT Infrastructure &#038; Cyber Security"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"has-text-align-left has-cyan-bluish-gray-background-color has-background wp-block-heading\" id=\"elicon-is-providing\" style=\"font-size:15px\"><strong>As we believe innovation in fleet IT technology can yield a wide range of financial and operational benefits. Also, fleet operators are in a race to operationalize fleet management for substantial business benefit, security, control and functionality.<br><br>However, with the rise of cyber-attacks for all scale of corporations, Elicon is dedicated to safeguard the your data and the integrity of information.<\/strong><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-style-default is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Elicon is providing:<\/strong><\/p><p><\/p><p><strong>&#8211; A comprehensive IT Solution<\/strong><\/p><p><strong>&#8211; A trustful 3rd party outsourcing partner for IT Solution onboard<\/strong><\/p><p><strong>&#8211; IT Internal Audit<\/strong><\/p><p><strong>&#8211; Assist for IMO Cybersecurity Regulation<\/strong><\/p><\/blockquote>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-1024x1024.jpg\" alt=\"\" class=\"wp-image-2106\" width=\"507\" height=\"507\" srcset=\"https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-1024x1024.jpg 1024w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-300x300.jpg 300w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-150x150.jpg 150w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-768x768.jpg 768w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-1536x1536.jpg 1536w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-2048x2048.jpg 2048w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Total-IT-Infrastructure-Solution-01-12x12.jpg 12w\" sizes=\"auto, (max-width: 507px) 100vw, 507px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Cybersecurity-02.jpg\" alt=\"\" class=\"wp-image-2111\" width=\"399\" height=\"411\" srcset=\"https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Cybersecurity-02.jpg 856w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Cybersecurity-02-291x300.jpg 291w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Cybersecurity-02-768x790.jpg 768w, https:\/\/elicon-group.com\/wp-content\/uploads\/2022\/02\/Cybersecurity-02-12x12.jpg 12w\" sizes=\"auto, (max-width: 399px) 100vw, 399px\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\" id=\"cyber-security-what-elicon-asks\"><strong>Cyber Security<\/strong><br><strong>&#8211; What Elicon asks?<\/strong><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\" id=\"block-b18c6043-6658-4861-a39f-6d5928124850\"><p><strong>&#8211; Inventory and monitoring?<\/strong><\/p><p><strong>&#8211; Data Security Policy?<\/strong><\/p><p><strong>&#8211; Protection?<\/strong><\/p><p><strong>&#8211; Backup Plan?<\/strong><\/p><p><strong>&#8211; Recovery Plan?<\/strong><\/p><p><strong>&#8211; Contingency Plan?<\/strong><\/p><p><strong>&#8211; Software\/Hardware Upgrade Plan?<\/strong><\/p><p><strong>&#8211; Review and Reassessment Procedure?<\/strong><\/p><\/blockquote>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>As we believe innovation in fleet IT technology can yield a wide range of financial and operational benefits. Also, fleet operators are in a race to operationalize fleet management for substantial business benefit, security, control and functionality. However, with the rise of cyber-attacks for all scale of corporations, Elicon is&#8230;<\/p>","protected":false},"author":4,"featured_media":2181,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-1985","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/pages\/1985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/comments?post=1985"}],"version-history":[{"count":33,"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/pages\/1985\/revisions"}],"predecessor-version":[{"id":2340,"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/pages\/1985\/revisions\/2340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/media\/2181"}],"wp:attachment":[{"href":"https:\/\/elicon-group.com\/ja\/wp-json\/wp\/v2\/media?parent=1985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}