Data decryption services; Computer security threat analysis for protecting data; Computer forensic services; Computer services, namely, encrypted data recovery services; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technology support services, namely, help desk services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer security consultancy; Data security consultancy; Monitoring of computer systems to detect cybersecurity incidents; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer programming consultancy in the field of cybersecurity; Technology consultation in the field of cybersecurity; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Development of security systems and contingency planning for information systems; Maintenance of computer software relating to computer security and prevention of computer risks; Cybersecurity services in the nature of restricting unauthorized access to computer systems
Computer and ScientificAnalyzing data in computer databases for criminal activity; Regulatory compliance consulting in the field of data protection; Tracking and monitoring regulatory requirements in the field of information technology and data protection for regulatory compliance purposes; Providing information on the development of privacy, security and data governance law via a website
Personal