{"id":8,"date":"2019-11-27T14:16:12","date_gmt":"2019-11-27T19:16:12","guid":{"rendered":"https:\/\/greersecurity.com\/?page_id=8"},"modified":"2022-11-30T21:05:58","modified_gmt":"2022-12-01T02:05:58","slug":"mesmerize","status":"publish","type":"page","link":"https:\/\/greersecurity.com\/","title":{"rendered":"Front Page"},"content":{"rendered":"<div  id=\"about-1\" style=\"background-color: #f5fafd;\" data-label=\"About\" data-id=\"about-images-right-section-mc\" data-export-id=\"about-images-right-section-mc\" data-bullets-visibility=\"true\" data-category=\"about\" class=\"about-images-right-section-mc content-section content-section-spacing\"><div  class=\"gridContainer\"> <div  class=\"row middle-sm text-center\"><div  class=\"col-sm-5 content-left-sm\" data-type=\"column\"> <h5  class=\"\">WHAT WE DO<\/h5> <h2  class=\"\">We deliver cybersecurity&nbsp;<br ><span  style=\"font-family: Playfair Display,sans-serif; font-weight: 700; font-style: italic;\" href=\"#\">strategy<\/span> for businesses of all sizes.<\/h2> <p  class=\"\">Our focus is on security profiling and strategy, incident response and tabletop exercises, and third-party risk management<\/p> <a class=\"button color1\" href=\"#contact-1\" target=\"_self\" data-cp-link=\"1\" rel=\"noopener noreferrer\">CONTACT US TODAY<\/a><\/div> <div  class=\"col-sm-7 space-bottom-xs\"><div  class=\"image-group-side-3-img\"> <img decoding=\"async\"  class=\"topimg shadow-large\" src=\"https:\/\/greersecurity.com\/wp-content\/uploads\/2019\/11\/cropped-pic1-1-scaled-1.jpg\" alt=\"\" title=\"cropped-pic1-1-scaled-1.jpg\"> <img decoding=\"async\"  class=\"rightimg shadow-large\" src=\"https:\/\/greersecurity.com\/wp-content\/uploads\/2019\/11\/cropped-pic3-scaled.jpg\" alt=\"\" title=\"cropped-pic3-scaled.jpg\"> <div  class=\"leftimg\"> <img decoding=\"async\"  class=\"shadow-large\" src=\"https:\/\/greersecurity.com\/wp-content\/uploads\/2019\/11\/cropped-pic2-scaled-1.jpg\" alt=\"\" title=\"cropped-pic2-scaled-1.jpg\"><\/div> <\/div><\/div> <\/div><\/div> <\/div><div  id=\"contact-1\" style=\"background-color: rgb(255, 255, 255); background-image: url(&quot;https:\/\/greersecurity.com\/wp-content\/uploads\/2019\/11\/pic5-scaled.jpg&quot;); background-size: cover; background-position: center top;\" data-label=\"Contact\" data-id=\"contact-1-mc\" data-export-id=\"contact-1-mc\" data-bullets-visibility=\"true\" data-category=\"contact\" class=\"contact-1-mc content-section content-section-spacing white-text\" data-parallax-depth=\"20\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\">  <h2  class=\"\">Connect with us<\/h2> <p  class=\"lead\">Are you looking for qualified professionals to assess your cybersecurity risk?<\/p><\/div> <\/div> <div  class=\"row text-center\"> <div  class=\"col-xs-12 col-sm-8 col-sm-offset-2 contact-form-wrapper inline-info\"> <div  class=\"card large-padding\"> <div  class=\"\" data-content-shortcode=\"mesmerize_contact_form shortcode=&quot;contact-form-7 id=&amp;amp;quot;43&amp;amp;quot; title=&amp;amp;quot;Contact form 1&amp;amp;quot;&quot;\" data-editable=\"true\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f43-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F8#wpcf7-f43-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"43\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.8\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f43-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<p><label> Your Name (required)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your Email (required)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Subject<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your Message<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div><\/div> <\/div><\/div> <\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>WHAT WE DO We deliver cybersecurity&nbsp;strategy for businesses of all sizes. Our focus is on security profiling and strategy, incident response and tabletop exercises, and third-party risk management CONTACT US TODAY Connect with us Are you looking for qualified professionals to assess your cybersecurity risk?<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/homepage.php","meta":{"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/greersecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greersecurity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greersecurity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greersecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greersecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8"}],"version-history":[{"count":15,"href":"https:\/\/greersecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":78,"href":"https:\/\/greersecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/8\/revisions\/78"}],"wp:attachment":[{"href":"https:\/\/greersecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}