{"id":51,"date":"2026-01-18T04:21:52","date_gmt":"2026-01-18T04:21:52","guid":{"rendered":"https:\/\/lfco.us\/?page_id=51"},"modified":"2026-01-26T19:38:49","modified_gmt":"2026-01-26T19:38:49","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/lfco.us\/?page_id=51","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"51\" class=\"elementor elementor-51\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e05bff e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"8e05bff\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13241c4 jltma-glass-effect-no elementor-widget elementor-widget-video\" data-id=\"13241c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/xxreclimationxx_httpss.mj_.runVSDEb5KTosY_animate_this_banner__534463e4-a273-4bba-b715-35def61b2f8a_1.mp4\" autoplay=\"\" loop=\"\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ccb4859 e-flex e-con-boxed jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"ccb4859\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c61dcfc e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible e-con e-child\" data-id=\"c61dcfc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcdb517 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"dcdb517\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LF Companies \u2014 Comprehensive Cybersecurity Solutions <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2683f7e jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"2683f7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h5><span style=\"color: #000000;\"><b>Protecting Saint Paul\u2019s businesses with proactive, cost-effective defense<\/b>\u00a0\u00a0<\/span><\/h5><p><span style=\"color: #000000;\"><b>Who We Are<\/b>\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span style=\"color: #000000;\">Based in Saint Paul, MN, LF Companies delivers dependable IT support and\u00a0<b>customized cybersecurity services<\/b>\u00a0to small and mid-size businesses nationwide.\u00a0<a style=\"color: #000000;\" href=\"https:\/\/saasbrowser.com\/en\/saas\/1011551\/lf-companies\">[saasbrowser.com]<\/a>\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span style=\"color: #000000;\">Proven\u00a0track record\u00a0of\u00a0<b>co-managed IT<\/b>\u00a0and 24\/7\u00a0monitoring: endpoint protection,\u00a0firewall\u00a0management, vulnerability assessments, backups, and disaster recovery.\u00a0<a style=\"color: #000000;\" href=\"https:\/\/saasbrowser.com\/en\/saas\/1011551\/lf-companies\">[saasbrowser.com]<\/a>,\u00a0 <a style=\"color: #000000;\" href=\"https:\/\/underdefense.com\/blog\/best-managed-cybersecurity-services\/\">[underdefense.com]<\/a>\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99fcb45 elementor-align-center jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"99fcb45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lfco.us\/?page_id=42\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e52999b e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"e52999b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9396fa5 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9396fa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"462\" src=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2595897335-1024x591.jpg\" class=\"attachment-large size-large wp-image-471\" alt=\"\" srcset=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2595897335-1024x591.jpg 1024w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2595897335-300x173.jpg 300w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2595897335-768x443.jpg 768w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2595897335-1536x886.jpg 1536w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2595897335-2048x1181.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28a516a e-flex e-con-boxed jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"28a516a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e2b7a30 e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"e2b7a30\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6bbd53 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"d6bbd53\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Cybersecurity Matters for SMBs\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6efe5d0 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"6efe5d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Rising threats<\/span><\/b><span data-contrast=\"auto\">: Malware, ransomware, credential theft, business email compromise, and cloud vulnerabilities\u2014common causes of data loss and downtime.\u00a0<\/span><a href=\"https:\/\/blog.box.com\/cybersecurity-for-small-businesses\"><span data-contrast=\"none\">[blog.box.com]<\/span><\/a><span data-contrast=\"auto\">,\u00a0 <\/span><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/cyber-security-solutions\/\"><span data-contrast=\"none\">[sentinelone.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">SMB adoption gap<\/span><\/b><span data-contrast=\"auto\">: 44% of SMBs mistakenly believe basic antivirus is \u201cgood enough,\u201d leaving them vulnerable.\u00a0<\/span><a href=\"https:\/\/www.cyberdefensemagazine.com\/smb-cybersecurity-trends-that-matter-for-2025\/\"><span data-contrast=\"none\">[cyberdefen\u2026gazine.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">The cost of failure<\/span><\/b><span data-contrast=\"auto\">: Average breach costs reached $4.88 million in 2024.\u00a0<\/span><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/cyber-security-solutions\/\"><span data-contrast=\"none\">[sentinelone.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bd53ce e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"2bd53ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-241021a jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-image\" data-id=\"241021a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2682933969-1024x682.jpg\" class=\"attachment-large size-large wp-image-472\" alt=\"\" srcset=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2682933969-1024x682.jpg 1024w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2682933969-300x200.jpg 300w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2682933969-768x512.jpg 768w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2682933969-1536x1024.jpg 1536w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_2682933969-2048x1365.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a92e5fa e-flex e-con-boxed jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"a92e5fa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8bfb92 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"d8bfb92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Solution Offerings<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6cba0ec e-grid e-con-full jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"6cba0ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-8ca291a jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"8ca291a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">\u00a0Managed Detection &amp; Response (MDR)<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Real-time, AI-driven threat monitoring, hunting, and response\u201424\/7 protection and peace of mind.\u00a0<\/span><a href=\"https:\/\/www.cyberdefensemagazine.com\/smb-cybersecurity-trends-that-matter-for-2025\/\"><span data-contrast=\"none\">[cyberdefen\u2026gazine.com]<\/span><\/a><span data-contrast=\"auto\">,<\/span><a href=\"https:\/\/underdefense.com\/blog\/best-managed-cybersecurity-services\/\"><span data-contrast=\"none\">[underdefense.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-19e9d86 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"19e9d86\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Endpoint &amp; Network Protection<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Deploying commercial-grade suites (e.g., Bitdefender, Avast, Sophos, CrowdStrike) for antivirus, anti-malware, dark web monitoring, XDR.\u00a0<\/span><a href=\"https:\/\/www.pcmag.com\/picks\/the-best-small-business-cybersecurity-suites\"><span data-contrast=\"none\">[pcmag.com]<\/span><\/a><span data-contrast=\"auto\">,\u00a0 <\/span><a href=\"https:\/\/www.channelinsider.com\/security\/managed-services\/security-services-smbs\/\"><span data-contrast=\"none\">[channelinsider.com]<\/span><\/a><span data-ccp-props=\"{}\"> \u00a0<\/span><span data-contrast=\"auto\">Firewall\u00a0configuration, VPN oversight, intrusion detection\/prevention to secure all access points.\u00a0<\/span><a href=\"https:\/\/www.fcc.gov\/communications-business-opportunities\/cybersecurity-small-businesses\"><span data-contrast=\"none\">[fcc.gov]<\/span><\/a><span data-contrast=\"auto\">,\u00a0 \u00a0<\/span><a href=\"https:\/\/www.atlassystems.com\/blog\/managed-security-service-providers\"><span data-contrast=\"none\">[atlassystems.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-85022d0 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"85022d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Email &amp; Communications Security<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Advanced protection against phishing, BEC, spam\u2014integrated with hosted Exchange, Office 365 Teams, and\u00a0MailCow\u00a0deployments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-c3738f7 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"c3738f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">\u00a0Identity, Access &amp; Zero-Trust Controls<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Strong authentication, role-based access, mobile\/device encryption\u2014safe cloud\/SaaS use.\u00a0<\/span><a href=\"https:\/\/blog.box.com\/cybersecurity-for-small-businesses\"><span data-contrast=\"none\">[blog.box.com]<\/span><\/a><span data-contrast=\"auto\">,\u00a0<\/span><a href=\"https:\/\/www.fcc.gov\/communications-business-opportunities\/cybersecurity-small-businesses\"><span data-contrast=\"none\">[fcc.gov]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-b8bb40e jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b8bb40e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">\u00a0Security Awareness &amp; Customized Policies<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Employee training, clean-machine hygiene, device policies, password best practices\u2014aligned with FCC and experts.\u00a0 <\/span><a href=\"https:\/\/www.fcc.gov\/communications-business-opportunities\/cybersecurity-small-businesses\"><span data-contrast=\"none\">[fcc.gov]<\/span><\/a><span data-contrast=\"auto\">,\u00a0<\/span><a href=\"https:\/\/www.defendify.com\/blog\/best-cybersecurity-small-business-guide\/\"><span data-contrast=\"none\">[defendify.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-f5fafc9 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"f5fafc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Compliance &amp; Risk Management<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">PCI, HIPAA, NIST alignment, continuous vulnerability or pentest assessment, and compliance documentation. <\/span><a href=\"https:\/\/www.atlassystems.com\/blog\/managed-security-service-providers\"><span data-contrast=\"none\">[atlassystems.com]<\/span><\/a><span data-contrast=\"auto\">,\u00a0 <\/span><a href=\"https:\/\/underdefense.com\/blog\/best-managed-cybersecurity-services\/\"><span data-contrast=\"none\">[underdefense.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-c7b0e8b jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"c7b0e8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Virtual CISO (vCISO) &amp; Strategic Guidance<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Executive-level security planning, incident readiness, vendor oversight\u2014without full-time staffing.\u00a0 <\/span><a href=\"https:\/\/underdefense.com\/blog\/best-managed-cybersecurity-services\/\"><span data-contrast=\"none\">[underdefense.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-b93a9a1 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b93a9a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Backup &amp; Disaster Recovery<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-contrast=\"auto\">Automated offsite\/cloud backups with fast restoration to ensure operational continuity.\u00a0 <\/span><a href=\"https:\/\/saasbrowser.com\/en\/saas\/1011551\/lf-companies\"><span data-contrast=\"none\">[saasbrowser.com]<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p style=\"text-align: center;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b4c584 e-flex e-con-boxed jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"8b4c584\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c165a5 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"0c165a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW231926030 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231926030 BCX0\">Get Started with LF Companies<\/span><\/span><span class=\"EOP SCXW231926030 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/strong><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-421a628 e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"421a628\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-8633507 e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"8633507\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5aacca3 jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"5aacca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">1<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a9f66d jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"0a9f66d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW50833098 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW50833098 BCX0\">Free Security Assessment<\/span><\/span><\/strong><\/h6><p style=\"text-align: center;\"><span class=\"LineBreakBlob BlobObject DragDrop SCXW50833098 BCX0\"><span class=\"SCXW50833098 BCX0\">\u00a0<\/span><\/span><span class=\"TextRun SCXW50833098 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW50833098 BCX0\">Identify your risks quickly and budget a plan accordingly.<\/span><\/span><span class=\"EOP SCXW50833098 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec4c83c e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"ec4c83c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fec1675 jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"fec1675\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">2<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e836e45 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"e836e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW11168673 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW11168673 BCX0\">Customized Protection Plan<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW11168673 BCX0\"><span class=\"SCXW11168673 BCX0\">\u00a0<\/span><\/span><\/strong><\/h6><p style=\"text-align: center;\"><span class=\"TextRun SCXW11168673 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW11168673 BCX0\">A layered cybersecurity package endpoint, networks, cloud, email fit for your size and budget<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82f2b55 e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"82f2b55\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-227edeb jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"227edeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">3<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63e58c6 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"63e58c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW197949790 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW197949790 BCX0\">Seamless Onboarding<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW197949790 BCX0\"><span class=\"SCXW197949790 BCX0\">\u00a0<\/span><\/span><\/strong><\/h6><p style=\"text-align: center;\"><span class=\"TextRun SCXW197949790 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW197949790 BCX0\">Rapid setup, either co-managed with existing IT or fully outsourced to us.<\/span><\/span><span class=\"EOP SCXW197949790 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0ce88a e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"a0ce88a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b620918 jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"b620918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">4<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c7436 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"06c7436\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW234511066 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW234511066 BCX0\">Ongoing 24\/7 Monitoring &amp; Improvement<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW234511066 BCX0\"><span class=\"SCXW234511066 BCX0\">\u00a0<\/span><\/span><\/strong><\/h6><p style=\"text-align: center;\"><span class=\"TextRun SCXW234511066 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW234511066 BCX0\">Always-on MDR, compliance checks, quarterly reviews, staff training updates<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e516f5 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1e516f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How We Work (Aligned with SMB Needs) <\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c9ed9a e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"1c9ed9a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-0626b1a jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-icon-box\" data-id=\"0626b1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSMB-focused\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tUser-friendly security, clear explanations, optimized investments, and minimal disruption. [defendify.com], [cyberdefen\u2026gazine.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-4eaee45 jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-icon-box\" data-id=\"4eaee45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCollaborative Model\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCo-managed with your IT or existing staff complementing rather than replacing. [saasbrowser.com], [underdefense.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-ff3b720 jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-icon-box\" data-id=\"ff3b720\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tProactive Posture\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tActive defense models SOCaaS, SIEM, MDR designed to detect and neutralize threats before they strike. [sentinelone.com], [underdefense.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div data-eael_scale_effect=\"{&quot;scale_x&quot;:0.9,&quot;scale_y&quot;:0.9}\" data-eael_duration=\"{&quot;transitionDuration&quot;:200}\" data-eael_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" data-eael_hover_duration=\"{&quot;transitionDuration&quot;:1000}\" data-eael_hover_easing=\"{&quot;transitionEasing&quot;:&quot;ease&quot;}\" class=\"eael_hover_effect elementor-element elementor-element-f3c95d1 jltma-glass-effect-no ha-has-bg-overlay elementor-widget elementor-widget-icon-box\" data-id=\"f3c95d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;eael_hover_effect_transform_popover&quot;:&quot;yes&quot;,&quot;eael_hover_effect_general_settings_easing&quot;:&quot;ease&quot;,&quot;eael_hover_effect_general_settings_hover_easing&quot;:&quot;ease&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMulti-layered Architecture\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEndpoint, network, email, cloud, identity, training, and compliance built on Zero Trust and unified response platforms. [cyberdefen gazine.com], [underdefense.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8f753b e-flex e-con-boxed jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"e8f753b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f0b8591 e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"f0b8591\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d595d65 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-image\" data-id=\"d595d65\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomInLeft&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_1921375130-1024x576.jpg\" class=\"attachment-large size-large wp-image-425\" alt=\"\" srcset=\"https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_1921375130-1024x576.jpg 1024w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_1921375130-300x169.jpg 300w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_1921375130-768x432.jpg 768w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_1921375130-1536x864.jpg 1536w, https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/shutterstock_1921375130-2048x1152.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb96ec3 e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"cb96ec3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53ffbb8 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"53ffbb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW245317470 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW245317470 BCX0\">Regional Expertise &amp; Competitive Edge<\/span><\/span><span class=\"EOP SCXW245317470 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b4674d jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"4b4674d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLocally trusted:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t Headquartered in Saint Paul\u2014delivering onsite and remote support across the Twin Cities. [cloudtango.net], [saasbrowser.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a087478 jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"a087478\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTop Minnesota MSP Peer Group\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAlongside Cloud Advisors, Loffler, Corporate Technologies, Arctic Wolf, and NetSPI\u2014LF Companies focuses on tailored service and SMB affordability. [cloudtango.net], [f6s.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39781cf jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"39781cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPersonal Service\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tClear communication\u2014no tech-lingo\u2014transparent solutions, aligned with your business goals. [defendify.com] \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3abbbca e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"3abbbca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-3fdfbce e-con-full e-flex jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"3fdfbce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc311dd jltma-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"fc311dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why LF Companies?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c123a elementor-widget__width-initial jltma-glass-effect-no elementor-widget elementor-widget-ma-table jltma-addon ma-table\" data-id=\"e8c123a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ma-table.default\">\n\t\t\t\t\t\n        <table class=\"jltma-table table table-striped not-responsive\">\n            <thead class=\"jltma-table-header\">\n                <tr>\n                    \n                        <th scope=\"jltma-row\"\n                            class=\"elementor-inline-editing elementor-repeater-item-12dfb8e\"              >\n\n                            \n                            Attribute \n                        <\/th>\n\n                    \n                        <th scope=\"jltma-row\"\n                            class=\"elementor-inline-editing elementor-repeater-item-e13b719\"              >\n\n                            \n                            International Competitors\n                        <\/th>\n\n                    \n                        <th scope=\"jltma-row\"\n                            class=\"elementor-inline-editing elementor-repeater-item-df5bbb5\"              >\n\n                            \n                            LF Companies\n                        <\/th>\n\n                                    <\/tr>\n            <\/thead>\n\n            <tbody class=\"jltma-table-body\">\n                <tr>\n                    \n                        <td data-column=\"Attribute \"                                          class=\"elementor-repeater-item-67b193d\">\n\n                            Scale \n                            \n                        <\/td>\n                        \n                        <td data-column=\"International Competitors\"                                          class=\"elementor-repeater-item-c182820\">\n\n                            Cisco, IBM, Arctic Wolf\n                            \n                        <\/td>\n                        \n                        <td data-column=\"LF Companies\"                                          class=\"elementor-repeater-item-63b6c3f\">\n\n                            Lean, personalized SMB-focused\n                            \n                        <\/td>\n                        <\/tr><tr>\n                        <td data-column=\"Attribute \"                                          class=\"elementor-repeater-item-22c42dd\">\n\n                            Risk Coverage \n                            \n                        <\/td>\n                        \n                        <td data-column=\"International Competitors\"                                          class=\"elementor-repeater-item-638437e\">\n\n                            Broad but generic\n                            \n                        <\/td>\n                        \n                        <td data-column=\"LF Companies\"                                          class=\"elementor-repeater-item-fb837b7\">\n\n                            Targeted to your needs\n                            \n                        <\/td>\n                        <\/tr><tr>\n                        <td data-column=\"Attribute \"                                          class=\"elementor-repeater-item-5af98f4\">\n\n                            Pricing \n                            \n                        <\/td>\n                        \n                        <td data-column=\"International Competitors\"                                          class=\"elementor-repeater-item-c70478d\">\n\n                            High corporate rates\n                            \n                        <\/td>\n                        \n                        <td data-column=\"LF Companies\"                                          class=\"elementor-repeater-item-5d0d3c2\">\n\n                            Cost-effective, predictable monthly\n                            \n                        <\/td>\n                        <\/tr><tr>\n                        <td data-column=\"Attribute \"                                          class=\"elementor-repeater-item-2242107\">\n\n                            Relationship \n                            \n                        <\/td>\n                        \n                        <td data-column=\"International Competitors\"                                          class=\"elementor-repeater-item-1bb7019\">\n\n                            Transactional \n                            \n                        <\/td>\n                        \n                        <td data-column=\"LF Companies\"                                          class=\"elementor-repeater-item-16ae363\">\n\n                            Trusted advisor &#038; partner mindset\n                            \n                        <\/td>\n                        \n                <\/tr>\n            <\/tbody>\n        <\/table>\n\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-008be0c e-flex e-con-boxed jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"008be0c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2001853 elementor-widget__width-initial jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"2001853\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Next Step<\/strong><\/h4><p>Reach out today to speak with a vCISO advisor, book your free security risk assessment, or learn more about our email and communications protection options. LF Companies is ready to build Smart Solutions. Trusted Support. Built for Small Business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aef365 elementor-align-center jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"2aef365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lfco.us\/?page_id=42\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>https:\/\/lfco.us\/wp-content\/uploads\/2026\/01\/xxreclimationxx_httpss.mj_.runVSDEb5KTosY_animate_this_banner__534463e4-a273-4bba-b715-35def61b2f8a_1.mp4 LF Companies \u2014 Comprehensive Cybersecurity Solutions Protecting Saint Paul\u2019s businesses with proactive, cost-effective defense\u00a0\u00a0 Who We Are\u00a0 Based in Saint Paul, MN, LF Companies delivers dependable IT support and\u00a0customized cybersecurity services\u00a0to small and mid-size businesses nationwide.\u00a0[saasbrowser.com]\u00a0 Proven\u00a0track record\u00a0of\u00a0co-managed IT\u00a0and 24\/7\u00a0monitoring: endpoint protection,\u00a0firewall\u00a0management, vulnerability assessments, backups, and disaster recovery.\u00a0[saasbrowser.com],\u00a0 [underdefense.com]\u00a0 Get Started Why Cybersecurity Matters for SMBs\u00a0 Rising threats: Malware, ransomware, credential theft, business email compromise, and cloud vulnerabilities\u2014common causes of data loss and downtime.\u00a0[blog.box.com],\u00a0 [sentinelone.com]\u00a0 SMB adoption gap: 44% of SMBs mistakenly believe basic antivirus is \u201cgood enough,\u201d leaving them vulnerable.\u00a0[cyberdefen\u2026gazine.com]\u00a0 The cost of failure: Average breach costs reached $4.88 million in 2024.\u00a0[sentinelone.com]\u00a0 Our Solution Offerings \u00a0Managed Detection &amp; Response (MDR)\u00a0 Real-time, AI-driven threat monitoring, hunting, and response\u201424\/7 protection and peace of mind.\u00a0[cyberdefen\u2026gazine.com],[underdefense.com]\u00a0 Endpoint &amp; Network Protection\u00a0 Deploying commercial-grade suites (e.g., Bitdefender, Avast, Sophos, CrowdStrike) for antivirus, anti-malware, dark web monitoring, XDR.\u00a0[pcmag.com],\u00a0 [channelinsider.com] \u00a0Firewall\u00a0configuration, VPN oversight, intrusion detection\/prevention to secure all access points.\u00a0[fcc.gov],\u00a0 \u00a0[atlassystems.com]\u00a0 Email &amp; Communications Security\u00a0 Advanced protection against phishing, BEC, spam\u2014integrated with hosted Exchange, Office 365 Teams, and\u00a0MailCow\u00a0deployments.\u00a0 \u00a0Identity, Access &amp; Zero-Trust Controls\u00a0 Strong authentication, role-based access, mobile\/device encryption\u2014safe cloud\/SaaS use.\u00a0[blog.box.com],\u00a0[fcc.gov]\u00a0 \u00a0Security Awareness &amp; Customized Policies\u00a0 Employee training, clean-machine hygiene, device policies, password best practices\u2014aligned with FCC and experts.\u00a0 [fcc.gov],\u00a0[defendify.com]\u00a0 Compliance &amp; Risk Management\u00a0 PCI, HIPAA, NIST alignment, continuous vulnerability or pentest assessment, and compliance documentation. [atlassystems.com],\u00a0 [underdefense.com]\u00a0 Virtual CISO (vCISO) &amp; Strategic Guidance\u00a0 Executive-level security planning, incident readiness, vendor oversight\u2014without full-time staffing.\u00a0 [underdefense.com]\u00a0 Backup &amp; Disaster Recovery\u00a0 Automated offsite\/cloud backups with fast restoration to ensure operational continuity.\u00a0 [saasbrowser.com]\u00a0 \u00a0 Get Started with LF Companies\u00a0 1 Free Security Assessment \u00a0Identify your risks quickly and budget a plan accordingly.\u00a0 2 Customized Protection Plan\u00a0 A layered cybersecurity package endpoint, networks, cloud, email fit for your size and budget 3 Seamless Onboarding\u00a0 Rapid setup, either co-managed with existing IT or fully outsourced to us.\u00a0 4 Ongoing 24\/7 Monitoring &amp; Improvement\u00a0 Always-on MDR, compliance checks, quarterly reviews, staff training updates How We Work (Aligned with SMB Needs) SMB-focused User-friendly security, clear explanations, optimized investments, and minimal disruption. [defendify.com], [cyberdefen\u2026gazine.com] Collaborative Model Co-managed with your IT or existing staff complementing rather than replacing. [saasbrowser.com], [underdefense.com] Proactive Posture Active defense models SOCaaS, SIEM, MDR designed to detect and neutralize threats before they strike. [sentinelone.com], [underdefense.com] Multi-layered Architecture Endpoint, network, email, cloud, identity, training, and compliance built on Zero Trust and unified response platforms. [cyberdefen gazine.com], [underdefense.com] Regional Expertise &amp; Competitive Edge\u00a0 Locally trusted: Headquartered in Saint Paul\u2014delivering onsite and remote support across the Twin Cities. [cloudtango.net], [saasbrowser.com] Top Minnesota MSP Peer Group Alongside Cloud Advisors, Loffler, Corporate Technologies, Arctic Wolf, and NetSPI\u2014LF Companies focuses on tailored service and SMB affordability. [cloudtango.net], [f6s.com] Personal Service Clear communication\u2014no tech-lingo\u2014transparent solutions, aligned with your business goals. [defendify.com] Why LF Companies? Attribute International Competitors LF Companies Scale Cisco, IBM, Arctic Wolf Lean, personalized SMB-focused Risk Coverage Broad but generic Targeted to your needs Pricing High corporate rates Cost-effective, predictable monthly Relationship Transactional Trusted advisor &#038; partner mindset Next Step Reach out today to speak with a vCISO advisor, book your free security risk assessment, or learn more about our email and communications protection options. LF Companies is ready to build Smart Solutions. Trusted Support. Built for Small Business. Get Started<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-51","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/lfco.us\/index.php?rest_route=\/wp\/v2\/pages\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lfco.us\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lfco.us\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lfco.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lfco.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=51"}],"version-history":[{"count":70,"href":"https:\/\/lfco.us\/index.php?rest_route=\/wp\/v2\/pages\/51\/revisions"}],"predecessor-version":[{"id":1086,"href":"https:\/\/lfco.us\/index.php?rest_route=\/wp\/v2\/pages\/51\/revisions\/1086"}],"wp:attachment":[{"href":"https:\/\/lfco.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}