{"id":38,"date":"2023-09-30T06:18:58","date_gmt":"2023-09-30T06:18:58","guid":{"rendered":"https:\/\/cloudu.gr\/?page_id=38"},"modified":"2024-02-08T09:31:21","modified_gmt":"2024-02-08T09:31:21","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/cloudu.gr\/en\/cyber-security\/","title":{"rendered":"CYBER SECURITY"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"38\" class=\"elementor elementor-38\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fdd4c98 e-con-full e-flex e-con e-parent\" data-id=\"7fdd4c98\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fefb822 e-flex e-con-boxed e-con e-parent\" data-id=\"5fefb822\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9c34037 e-flex e-con-boxed e-con e-child\" data-id=\"9c34037\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64239ae3 elementor-widget elementor-widget-spacer\" data-id=\"64239ae3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b60fcfc elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5b60fcfc\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle-notch\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cyber Security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5920e5ec e-flex e-con-boxed e-con e-parent\" data-id=\"5920e5ec\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b2bb05f elementor-widget elementor-widget-text-editor\" data-id=\"7b2bb05f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\"><b>Cyber security<\/b> is one of the most important and timely fields in information technology, as threats and attacks on the internet are constantly increasing. Protecting data, systems, and users from cybercriminals is a challenge that requires modern and effective solutions.<\/p><p class=\"translation-block\"><b>Cloud U<\/b> has carefully invested in the field of cyber security, offering services and products that meet the needs and expectations of its customers with reputable and internationally acclaimed solutions from manufacturers and a range of carefully designed services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-685732b2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"685732b2\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ed75b0 e-flex e-con-boxed e-con e-parent\" data-id=\"9ed75b0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d1f6e9d e-flex e-con-boxed e-con e-child\" data-id=\"5d1f6e9d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a082bd5 elementor-widget elementor-widget-text-editor\" data-id=\"7a082bd5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">With a <b>team of specialized and experienced professionals<\/b> and scientists, Cloud U creates solutions based on the use of Cloud Computing, artificial intelligence, encryption, and other innovative technologies.<\/p><p class=\"translation-block\">Our goal is to provide our customers with a <b>secure, reliable, and user-friendly online experience<\/b>, protecting them from all kinds of cyber risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38ad74b4 e-flex e-con-boxed e-con e-child\" data-id=\"38ad74b4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b09e2d9 elementor-view-framed elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"b09e2d9\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-users\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3014044 elementor-view-framed elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"3014044\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hands-helping\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2af2f0ea elementor-view-framed elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"2af2f0ea\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9883ef7 e-flex e-con-boxed e-con e-parent\" data-id=\"9883ef7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0990f3a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0990f3a\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4292346 elementor-widget elementor-widget-text-editor\" data-id=\"4292346\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We will be happy to guide you through our available solutions and services and to collaborate with you to design the next day in protecting your network, systems, and users from increasingly frequent cyber-attacks, ensuring a functional and healthy infrastructure environment.<\/p><p><strong>Select one of the subcategories below:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78eb12e4 e-flex e-con-boxed e-con e-parent\" data-id=\"78eb12e4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5f043666 e-con-full e-flex e-con e-child\" data-id=\"5f043666\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bec08a6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"bec08a6\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/cloud-security\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/cloud-security-qfcx3tz0oewuc2jsqm8hpfvd55ztgszi6hvu6sd6yw.jpeg\" title=\"cloud-security\" alt=\"cloud-security\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/cloud-security\/\">Cloud Security<\/a><\/h3><p class=\"elementor-image-box-description\">Cloud security is one of the most important, dynamically and continuously evolving services<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12647457 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"12647457\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d24ec2a e-con-full e-flex e-con e-child\" data-id=\"7d24ec2a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db2ef1e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"db2ef1e\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/network-security\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/lock-1-qfcyz1flbywwgcxeao26zhbu6yqltpslf53nh0pu2w.jpg\" title=\"lock\" alt=\"lock\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/network-security\/\">Network Security<\/a><\/h3><p class=\"elementor-image-box-description\">Network Security is a crucial factor for a company's operation<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e77a2e4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4e77a2e4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7cdea56e e-con-full e-flex e-con e-child\" data-id=\"7cdea56e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6762ec23 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6762ec23\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/users-access-security\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/user-security-qfcz4ysyfd0znubgoqai7hhh1fixd0bnwh6vetxgug.jpg\" title=\"user-security\" alt=\"user-security\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/users-access-security\/\">Users &amp; Access Security<\/a><\/h3><p class=\"elementor-image-box-description\">Users and their access to business applications and data are the main targets of cybercriminals<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ab599bf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7ab599bf\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c196bc0 e-con-full e-flex e-con e-child\" data-id=\"6c196bc0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fd09367 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6fd09367\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/ai-powered-prevention\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/artificial-intelligence-qfd04eby1jj3aouosjn8p1lz5aw0i9zf3ugrnbe8aw.jpg\" title=\"artificial-intelligence\" alt=\"artificial-intelligence\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/ai-powered-prevention\/\">AI - Powered Prevention<\/a><\/h3><p class=\"elementor-image-box-description\">AI powered protection is a new and innovative security solution offered by Cloud U<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc52c37 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fc52c37\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a307522 e-con-full e-flex e-con e-child\" data-id=\"2a307522\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe9269f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"4fe9269f\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/thread-intelligence\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/thread-intelligence-qg0nw1tj51rbhy6plktbvofs7jndizk3yu1pjw3bew.jpeg\" title=\"Gui,(graphical,User,Interface),Concept.\" alt=\"GUI (Graphical User Interface) concept.\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/thread-intelligence\/\">Thread Intelligence<\/a><\/h3><p class=\"elementor-image-box-description\">SOCRadar's Thread Intelligence solution offers a unique discovery, logging and continuous monitoring experience.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-450203ca elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"450203ca\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bbb3b7 e-con-full e-flex e-con e-child\" data-id=\"0bbb3b7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e15603 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6e15603\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/penetration-test\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/penetration-test-header-qgndi9cn4mz02fcshodg9241vi6fntbu4n6f0dp30o.jpg\" title=\"penetration-test-header\" alt=\"penetration-test-header\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/penetration-test\/\">Penetration Test<\/a><\/h3><p class=\"elementor-image-box-description\">A penetration test is a process that evaluates the security of a system or a network...<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65bf840 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"65bf840\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a01713b e-con-full e-flex e-con e-child\" data-id=\"a01713b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cefcee0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"cefcee0\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cyber-security\/security-operations\/\" tabindex=\"-1\"><img decoding=\"async\" src=\"https:\/\/cloudu.gr\/wp-content\/uploads\/elementor\/thumbs\/security-operations-1-qfczkqjh3am6gbesljp61i7vu5smi6xjej859yjog8.jpg\" title=\"security-operations\" alt=\"security-operations\" loading=\"lazy\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"\/en\/cyber-security\/security-operations\/\">Security Operations<\/a><\/h3><p class=\"elementor-image-box-description\">Cloud U recently announced its partnership with Ridge Global, one of the world's leading cybersecurity companies.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bda240 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6bda240\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30008c71 e-flex e-con-boxed e-con e-parent\" data-id=\"30008c71\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32b3b1f4 elementor-widget elementor-widget-spacer\" data-id=\"32b3b1f4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber Security \u03a4\u03bf cyber security \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1\u03c2 \u03b1\u03c0\u03cc \u03c4\u03bf\u03c5\u03c2 \u03c0\u03b9\u03bf \u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03bf\u03cd\u03c2 \u03ba\u03b1\u03b9 \u03b5\u03c0\u03af\u03ba\u03b1\u03b9\u03c1\u03bf\u03c5\u03c2 \u03c4\u03bf\u03bc\u03b5\u03af\u03c2 \u03c4\u03b7\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2, \u03ba\u03b1\u03b8\u03ce\u03c2 \u03bf\u03b9 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c3\u03c4\u03bf \u03b4\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf \u03b1\u03c5\u03be\u03ac\u03bd\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c5\u03bd\u03b5\u03c7\u03ce\u03c2. \u0397 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03c4\u03c9\u03bd \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd, \u03c4\u03c9\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03ba\u03b1\u03b9 \u03c4\u03c9\u03bd \u03c7\u03c1\u03b7\u03c3\u03c4\u03ce\u03bd \u03b1\u03c0\u03cc \u03c4\u03bf\u03c5\u03c2 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf-\u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03b9\u03b1 \u03c0\u03c1\u03cc\u03ba\u03bb\u03b7\u03c3\u03b7 \u03c0\u03bf\u03c5 \u03b1\u03c0\u03b1\u03b9\u03c4\u03b5\u03af \u03c3\u03cd\u03b3\u03c7\u03c1\u03bf\u03bd\u03b5\u03c2 \u03ba\u03b1\u03b9 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03c3\u03bc\u03b1\u03c4\u03b9\u03ba\u03ad\u03c2 \u03bb\u03cd\u03c3\u03b5\u03b9\u03c2. \u0397 Cloud U \u03ad\u03c7\u03b5\u03b9 \u03b5\u03c0\u03b5\u03bd\u03b4\u03cd\u03c3\u03b5\u03b9 \u03c0\u03c1\u03bf\u03c3\u03b5\u03ba\u03c4\u03b9\u03ba\u03ac \u03c3\u03c4\u03bf\u03bd \u03c4\u03bf\u03bc\u03ad\u03b1 [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-38","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":37,"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":2425,"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/pages\/38\/revisions\/2425"}],"wp:attachment":[{"href":"https:\/\/cloudu.gr\/en\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}