[et_pb_section fb_built=”1″ module_class=”top-banner” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0.4)” background_color_gradient_end=”rgba(0,0,0,0.29)” background_color_gradient_overlays_image=”on” background_image=”https://www.zagtech.com/wp-content/uploads/2020/03/cover-it-security-consulting-30.jpg” custom_padding=”90px||70px||false|false” hover_enabled=”0″ custom_padding_last_edited=”on|phone” sticky_enabled=”0″ custom_padding_tablet=”50px||25px||false|false”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||0px|||”][et_pb_column type=”4_4″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” header_text_color=”#ffffff” header_4_line_height=”1.3em” width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||8px||false|false” hover_enabled=”0″ header_font_size=”50px” header_font_size_last_edited=”on|tablet” sticky_enabled=”0″ header_font_size_tablet=”35px”]
IT Security Consulting
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” header_4_font=”Proxima Nova – Regular||||||||” header_4_text_color=”#ffffff” header_4_font_size=”22px” width=”100%” custom_margin=”||||false|false” hover_enabled=”0″ sticky_enabled=”0″]
Defend Against Cybercriminals & Attacks
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/bavkground-gray.jpg” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px||false|false” hover_enabled=”0″ background_last_edited=”on|desktop” background_enable_image_tablet=”off” custom_padding_last_edited=”on|phone” sticky_enabled=”0″ custom_padding_tablet=”50px||80px||false|false”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”off|desktop” _builder_version=”4.7.0″ _module_preset=”default” custom_margin=”||||false|false” custom_margin_tablet=”||-25px||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”1px||1px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”50px||20px||false|false” hover_enabled=”0″ sticky_enabled=”0″][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” width=”99%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” hover_enabled=”0″ header_2_font_size=”36px” sticky_enabled=”0″]
Some Considerations
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ disabled_on=”off|off|off” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/12/it-security-image-3.jpg” hover_enabled=”0″ box_shadow_style=”preset2″ box_shadow_spread=”-7px” sticky_enabled=”0″][et_pb_divider show_divider=”off” _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”150px||150px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][/et_pb_divider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ background_enable_image=”off” custom_margin=”||||true|false” custom_margin_tablet=”0px||70px||false|false” custom_margin_last_edited=”off|desktop” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”” hover_enabled=”0″ background_last_edited=”on|desktop” background_enable_image_tablet=”off” sticky_enabled=”0″][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”on|desktop” _builder_version=”4.7.0″ _module_preset=”default” custom_margin=”||||false|false” custom_margin_tablet=”||-25px||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”||20px||false|false”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” width=”99%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||0px||false|false” custom_padding=”||0px|||”]
IT Security Strategy
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” header_4_text_color=”#1DC68F” width=”95%” width_tablet=”100%” width_phone=”” width_last_edited=”on|tablet”]
ZAG understands how to implement IT Security strategies that are designed to help secure your data and prevent Malicious Attacks. Successful security strategies include: Intrusion Detection or Protection Systems (IPS), website vulnerability protection, web security gateway solutions, and mobile device monitoring throughout the network.
ZAG builds resilient systems designed to quickly recovery from attack or equipment failure.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” width=”99%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||0px||false|false” custom_padding=”||0px|||”]
ZAG can help your business:
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” ul_line_height=”2em” quote_font_size=”18px” header_4_text_color=”#1DC68F” width=”99%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone”]
- Conduct an audit to test networks, applications, and mobile devices and thoroughly assess vulnerabilities
- Develop a strategy that fits your organization’s requirements
- Assess the security of your cloud application services
- Implement multi-layered security technology and protocols on all your devices and end points
- Create and enforce security policies for mobile devices
- Educate employees about security best practices
- Encrypt your data
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#ffffff” custom_margin=”||||false|false” custom_padding=”70px||70px||false|” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”” hover_enabled=”0″ sticky_enabled=”0″][et_pb_row custom_padding_last_edited=”on|tablet” _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||20px||false|false” custom_padding_tablet=”” custom_padding_phone=””][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_2_text_align=”center” header_3_text_align=”center” header_3_text_color=”#1DC68F” header_3_font_size=”20px” width=”96%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||0px||false|false” hover_enabled=”0″ header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” header_2_text_align_tablet=”left” header_2_text_align_last_edited=”off|desktop” header_3_text_align_tablet=”left” header_3_text_align_phone=”left” header_3_text_align_last_edited=”off|desktop” header_3_font_size_last_edited=”off|desktop” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” header_2_font_size=”36px” sticky_enabled=”0″]
Data Breaches
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.7.0″ _module_preset=”default” max_width=”850px” custom_margin=”|auto||auto|false|false” custom_padding=”0px||0px|||”][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb image=”https://www.zagtech.com/wp-content/uploads/2020/12/human-error-icon.png” image_max_width=”120px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”center” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ body_font_size=”16px” body_line_height=”2em” width=”105%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||-5px||false|false” custom_padding=”||1px|||” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|desktop” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”][/et_pb_blurb][et_pb_number_counter title=”Human Error” number=”25″ _builder_version=”4.7.0″ _module_preset=”default” title_font=”Neue Haas Unica||||||||” title_text_color=”#333333″ title_line_height=”1.5em” number_font=”Proxima Nova – Regular||||||||” number_text_color=”#1DC68F” number_font_size=”50px” custom_css_number_counter_title=”margin-top:-25px”][/et_pb_number_counter][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb image=”https://www.zagtech.com/wp-content/uploads/2020/12/systems-glitch-icon.png” image_max_width=”120px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”center” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ body_font_size=”16px” body_line_height=”2em” width=”105%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||-5px||false|false” custom_padding=”||1px|||” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|desktop” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”][/et_pb_blurb][et_pb_number_counter title=”Systems Glitch” number=”29″ _builder_version=”4.7.0″ _module_preset=”default” title_font=”Neue Haas Unica||||||||” title_text_color=”#333333″ title_line_height=”1.5em” number_font=”Proxima Nova – Regular||||||||” number_text_color=”#1DC68F” number_font_size=”50px” custom_css_number_counter_title=”margin-top:-25px”][/et_pb_number_counter][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb image=”https://www.zagtech.com/wp-content/uploads/2020/12/malicious-attacks-icon.png” image_max_width=”120px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”center” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ body_font_size=”16px” body_line_height=”2em” width=”105%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||-5px||false|false” custom_padding=”||1px|||” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|desktop” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”][/et_pb_blurb][et_pb_number_counter title=”Malicious Attacks” number=”47″ _builder_version=”4.7.0″ _module_preset=”default” title_font=”Neue Haas Unica||||||||” title_text_color=”#333333″ title_line_height=”1.5em” number_font=”Proxima Nova – Regular||||||||” number_text_color=”#1DC68F” number_font_size=”50px” custom_css_number_counter_title=”margin-top:-25px;||width:90%;||margin-left:auto;||margin-right:auto;”][/et_pb_number_counter][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ max_width=”1920px” module_alignment=”center” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false”][et_pb_row column_structure=”3_5,2_5″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_enable_color=”off” width=”100%” width_tablet=”80%” width_phone=”” width_last_edited=”on|phone” max_width=”none” custom_padding=”0px||0px||false|false” custom_padding_tablet=”70px||50px||false|false” custom_padding_phone=”||50px||false|false” hover_enabled=”0″ sticky_enabled=”0″][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”120px||120px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”0px||0px||false|false” custom_padding_last_edited=”on|phone” hover_enabled=”0″ custom_css_main_element_last_edited=”on|phone” custom_css_main_element_phone=”padding-top:0px!important;” sticky_enabled=”0″][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” header_4_line_height=”1.3em” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”right” custom_margin=”||40px||false|false” hover_enabled=”0″ module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone” header_2_font_size=”36px” sticky_enabled=”0″]
About IT Security
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”right” custom_margin=”-42px||25px||false|false” header_4_text_align_tablet=”” header_4_text_align_phone=”” header_4_text_align_last_edited=”on|tablet” header_4_font_size_tablet=”” header_4_font_size_phone=”” header_4_font_size_last_edited=”on|desktop” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone”]
Understanding the Threat
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” link_font=”Neue Haas Unica|||on|||||” link_text_color=”#ffffff” header_4_line_height=”1.3em” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|tablet” module_alignment=”right” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”||50px||false|false” custom_margin_last_edited=”off|desktop” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|tablet”]Discuss Security With ZAG[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ disabled_on=”on|on|off” _builder_version=”4.7.0″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/12/it-security-cta.png” alt=”Careers” title_text=”it-security-cta” align=”right” _builder_version=”4.7.0″ _module_preset=”default” position_origin_a=”center_left” width=”324px” custom_margin=”-86px||-1px||false|false” custom_padding=”||0px||false|false”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/background-gray-v2.jpg” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px||true|false” hover_enabled=”0″ background_last_edited=”on|desktop” background_enable_image_tablet=”off” custom_padding_last_edited=”on|phone” sticky_enabled=”0″ custom_padding_tablet=”50px||50px||true|false”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”off|desktop” _builder_version=”4.7.0″ _module_preset=”default” custom_margin=”||||false|false” custom_margin_tablet=”||-25px||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”1px||1px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”50px||20px||false|false”][et_pb_column type=”1_2″ disabled_on=”off|off|off” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/12/it-security-image-2.1.jpg” background_position=”center_right” box_shadow_style=”preset2″ box_shadow_spread=”-7px”][et_pb_divider show_divider=”off” _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”150px||150px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][/et_pb_divider][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” width=”99%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” hover_enabled=”0″ header_2_font_size=”36px” sticky_enabled=”0″]
IT Security Threats
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|tablet” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/bavkground-gray.jpg” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”20px||||false|false” hover_enabled=”0″ background_last_edited=”on|desktop” background_enable_image_tablet=”off” sticky_enabled=”0″][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”off|desktop” module_class=”reverse” _builder_version=”4.7.0″ _module_preset=”default” custom_margin=”||||false|false” custom_margin_tablet=”||-25px||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”1px||1px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”50px||20px||false|false”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”30px||||false|false” custom_padding_phone=”” custom_padding_last_edited=”on|tablet”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” width=”102%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” hover_enabled=”0″ header_2_font_size=”36px” sticky_enabled=”0″]
Who is at risk?
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ disabled_on=”off|off|off” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/12/it-security-image-2.jpg” background_position=”center_right” box_shadow_style=”preset2″ box_shadow_spread=”-7px”][et_pb_divider show_divider=”off” _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”150px||150px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][/et_pb_divider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ custom_padding=”70px||70px||true|” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”” hover_enabled=”0″ sticky_enabled=”0″][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||0px|||”][et_pb_column type=”4_4″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” header_2_text_align=”center” text_orientation=”center” width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” module_alignment=”center” custom_margin=”||5px||false|false” hover_enabled=”0″ header_2_text_align_tablet=”left” header_2_text_align_last_edited=”off|desktop” header_2_font_size=”36px” sticky_enabled=”0″]
Basic Cyber Security Measures
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” header_2_text_align=”center” text_orientation=”center” width=”55%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” module_alignment=”center” header_2_text_align_tablet=”left” header_2_text_align_last_edited=”off|desktop”]
Learn how criminals attempt to infiltrate your company’s IT systems and the minimal steps your business should take to defend against potential threats. ZAG recommends that all companies use each of these 9 Basic Cyber Security Measures to prevent a security breach.
[/et_pb_text][et_pb_video src=”https://www.youtube.com/watch?v=23yJXAzKFS4&feature=youtu.be” _builder_version=”4.7.0″ _module_preset=”default” width=”50%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” module_alignment=”center”][/et_pb_video][et_pb_button button_url=”/resources/guides/data-center-solutions-guide/” button_text=”DISCUSS SECURITY” button_alignment=”center” button_text_tablet=”” button_text_phone=”DISCUSS SECURITY WITH ZAG” button_text_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” custom_button=”on” button_text_size=”15px” button_text_color=”#ffffff” button_bg_color=”#1dc690″ button_border_color=”#1dc690″ button_border_radius=”0px” button_font=”Proxima Nova – Regular|500||on|||||” button_use_icon=”off” custom_margin=”-2px|||||” custom_padding=”10px|38px|10px|38px|true|true” custom_css_main_element=”text-align:center;” button_bg_color__hover_enabled=”on|desktop” button_bg_color__hover=”#145da1″ button_bg_enable_color__hover=”on” button_border_color__hover_enabled=”on|desktop” button_border_color__hover=”#145da1″ custom_css_main_element_last_edited=”on|desktop”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_color=”#ffffff” max_width=”100%” module_alignment=”center” custom_margin=”0px||||false|false” custom_margin_tablet=”70px||||false|false” custom_margin_last_edited=”off|desktop” custom_padding=”0px||0px||false|false”][et_pb_row column_structure=”2_5,3_5″ custom_padding_last_edited=”on|desktop” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#ffffff” width=”100%” width_tablet=”80%” width_phone=”” width_last_edited=”on|phone” max_width=”none” custom_padding=”0px||0px||false|false” custom_padding_tablet=”70px||70px||false|false” custom_padding_phone=”||70px||false|false” hover_enabled=”0″ sticky_enabled=”0″][et_pb_column type=”2_5″ disabled_on=”on|on|off” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/11/critical-incident-cta-1.png” alt=”Careers” title_text=”critical-incident-cta” _builder_version=”4.7.0″ _module_preset=”default” position_origin_a=”center_left” width=”324px” custom_margin=”-117px||-1px||false|false” custom_padding=”||0px||false|false”][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”108px||108px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”0px||0px||false|false” custom_padding_last_edited=”on|phone” hover_enabled=”0″ custom_css_main_element_last_edited=”off|phone” sticky_enabled=”0″][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” header_4_line_height=”1.3em” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”left” custom_margin=”||40px||false|false” hover_enabled=”0″ module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone” header_2_font_size=”36px” sticky_enabled=”0″]
Critical Incident?
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” header_4_text_color=”#1dc690″ width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”left” custom_margin=”-42px||25px||false|false” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone”]
Call Our Team Now for Immediate Assistance
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” link_font=”Neue Haas Unica|||on|||||” link_text_color=”#ffffff” header_4_line_height=”1.3em” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|tablet” module_alignment=”left” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”||50px||false|false” custom_margin_last_edited=”off|desktop” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|tablet”]
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]