{"id":228,"date":"2025-07-01T06:37:26","date_gmt":"2025-07-01T06:37:26","guid":{"rendered":"https:\/\/bthrustgrp.com\/custom-software-campaign-dev\/?page_id=228"},"modified":"2025-12-08T11:23:43","modified_gmt":"2025-12-08T11:23:43","slug":"services","status":"publish","type":"page","link":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/","title":{"rendered":"Our Services"},"content":{"rendered":"<h1>Our Services<\/h1>\n<p>Lorem ipsum dolor sit amet consectetur, adipisicing elit. Perspiciatis deserunt velit quisquam aliquid quae iusto quos ipsam eligendi dolorum, nostrum quaerat assumenda architecto, non, earum quidem vel hic consectetur soluta!.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Services Lorem ipsum dolor sit amet consectetur, adipisicing elit. Perspiciatis deserunt velit quisquam aliquid quae iusto quos ipsam eligendi dolorum, nostrum quaerat assumenda architecto, non, earum quidem vel hic consectetur soluta!.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/service-list.php","meta":{"footnotes":""},"class_list":["post-228","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Services of Genic Cyber Security Solutions<\/title>\n<meta name=\"description\" content=\"Protect business with Cyber Security Services. Get 24\/7 monitoring, threat detection, incident response, and compliance support from Genic Solutions experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Services of Genic Cyber Security Solutions\" \/>\n<meta property=\"og:description\" content=\"Protect business with Cyber Security Services. Get 24\/7 monitoring, threat detection, incident response, and compliance support from Genic Solutions experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T11:23:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/\",\"url\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/\",\"name\":\"Key Services of Genic Cyber Security Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website\"},\"datePublished\":\"2025-07-01T06:37:26+00:00\",\"dateModified\":\"2025-12-08T11:23:43+00:00\",\"description\":\"Protect business with Cyber Security Services. Get 24\/7 monitoring, threat detection, incident response, and compliance support from Genic Solutions experts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website\",\"url\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/\",\"name\":\"Cyber Security Solutions\",\"description\":\"Cyber Security Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Services of Genic Cyber Security Solutions","description":"Protect business with Cyber Security Services. Get 24\/7 monitoring, threat detection, incident response, and compliance support from Genic Solutions experts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/","og_locale":"en_US","og_type":"article","og_title":"Key Services of Genic Cyber Security Solutions","og_description":"Protect business with Cyber Security Services. Get 24\/7 monitoring, threat detection, incident response, and compliance support from Genic Solutions experts.","og_url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/","og_site_name":"Cyber Security Solutions","article_modified_time":"2025-12-08T11:23:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/","url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/","name":"Key Services of Genic Cyber Security Solutions","isPartOf":{"@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website"},"datePublished":"2025-07-01T06:37:26+00:00","dateModified":"2025-12-08T11:23:43+00:00","description":"Protect business with Cyber Security Services. Get 24\/7 monitoring, threat detection, incident response, and compliance support from Genic Solutions experts.","breadcrumb":{"@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/"},{"@type":"ListItem","position":2,"name":"Our Services"}]},{"@type":"WebSite","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website","url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/","name":"Cyber Security Solutions","description":"Cyber Security Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":18,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/228\/revisions"}],"predecessor-version":[{"id":1045,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/228\/revisions\/1045"}],"wp:attachment":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/media?parent=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}