{"id":6625,"date":"2018-01-25T10:33:59","date_gmt":"2018-01-25T08:33:59","guid":{"rendered":"https:\/\/www.inline.gr\/asfalia-dedomenon\/"},"modified":"2018-02-06T12:53:00","modified_gmt":"2018-02-06T10:53:00","slug":"data-protection-security","status":"publish","type":"page","link":"https:\/\/www.inline.gr\/en\/data-protection-security","title":{"rendered":"Data Protection &#038; Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; full_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1516969718654{background-image: url(https:\/\/www.inline.gr\/wp-content\/uploads\/security-hero.jpg?id=6429) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1516968952377{padding-right: 20px !important;padding-bottom: 40px !important;padding-left: 20px !important;background-color: rgba(33,83,120,0.75) !important;*background-color: rgb(33,83,120) !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_custom_heading source=&#8221;post_title&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;pgtitle-new&#8221;][vc_column_text el_class=&#8221;text-center&#8221;]<\/p>\n<p class=\"lead colr-wht\">Safeguard your data, your customers&#8217; confidence and protect the reputation of your business.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1516876122096{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<p class=\"txt-bigger\">Every business in the world is starting small. However, even small businesses face serious threats. A comprehensive plan for cyber-security and disaster recovery should be a top priority for your company, even if it has only a few employees.<\/p>\n<p>[\/vc_column_text][vc_column_text]<strong>We are here to help you get started<\/strong>. Firstly, we will help determine where your company stands in the preparations for disaster and cybersecurity. Then, we will follow best practices to develop an effective strategy for your technology infrastructure and business activities.<\/p>\n<p>Not enough stuff? No worries! <strong>INLINE<\/strong>&#8216;s team is here to help your business.[\/vc_column_text][\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1516897439612{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #efefef !important;}&#8221;][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1516893313687{margin-top: 0px !important;margin-bottom: 35px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<h2 class=\"text-center\">Backup &amp; Disaster Recovery<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;3\/4&#8243;][vc_column_text]Backup of your files is extremely important for the continuous operation of your business. With a properly designed backup process you can be sure that you can restore your files in the event of a deletion, human error, or hardware failure.<\/p>\n<p>Also with the Backup process you can archive documents and files that you do not use in your daily work but remain important to your business.<\/p>\n<p class=\"txt-bigger inlinetc\"><strong>Inline<\/strong> implements Cloud and Hybrid Backup and Archiving solutions that ensure reliability, availability and security.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]An internet outage or inaccessible systems can cost your company a lot of money every day, even if your business is small. That\u2019s why it\u2019s incredibly important to prepare for the worst, whether it\u2019s a security threat, a natural disaster, or a power outage.<\/p>\n<p class=\"txt-bigger inlinetc\"><strong>Inline<\/strong> implements Disaster Recovery solutions for the enterprise&#8217;s technology infrasture utilizing cloud technologies that help you get ready for the worst.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1516897452261{margin-top: 40px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1516895426046{margin-bottom: 10px !important;border-bottom-width: 1px !important;border-bottom-color: #b2b2b2 !important;border-bottom-style: solid !important;}&#8221;]<\/p>\n<h4 class=\"text-center colr-orng\">AZURE SITE RECOVERY<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1517911851207{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221; el_class=&#8221;text-center&#8221;]Cloud based Disaster Recovery service for Hyper-V virtual machines, VMware virtual machines and physical servers[\/vc_column_text][vc_icon icon_fontawesome=&#8221;fa fa-angle-right&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-outline&#8221; background_color=&#8221;custom&#8221; size=&#8221;sm&#8221; align=&#8221;center&#8221; custom_color=&#8221;#e97f23&#8243; link=&#8221;url:https%3A%2F%2Fwww.inline.gr%2Flisis-it%2Fmicrosoft-azure%2Fazure-site-recovery%2F|||&#8221; custom_background_color=&#8221;#e97f23&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1516896596707{margin-bottom: 10px !important;border-bottom-width: 1px !important;border-bottom-color: #b2b2b2 !important;border-bottom-style: solid !important;}&#8221;]<\/p>\n<h4 class=\"text-center colr-orng\">DATASAFE CLOUD BACKUP<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1517912386367{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221; el_class=&#8221;text-center&#8221;]Store and keep encrypted backups of your files, folders, and virtual machines on premises and in the Cloud[\/vc_column_text][vc_icon icon_fontawesome=&#8221;fa fa-angle-right&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-outline&#8221; background_color=&#8221;custom&#8221; size=&#8221;sm&#8221; align=&#8221;center&#8221; custom_color=&#8221;#e97f23&#8243; link=&#8221;url:https%3A%2F%2Fwww.inline.gr%2Flisis-it%2Fmicrosoft-azure%2Fcloud-backup%2F|||&#8221; custom_background_color=&#8221;#e97f23&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1516897359072{margin-bottom: 10px !important;border-bottom-width: 1px !important;border-bottom-color: #b2b2b2 !important;border-bottom-style: solid !important;}&#8221;]<\/p>\n<h4 class=\"text-center colr-orng\">365SAFE Office 365 BACKUP<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1517912456973{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221; el_class=&#8221;text-center&#8221;]Protect your data from accidentally or intentionally deletion in Exchange online, SharePoint online and OneDrive for Business.[\/vc_column_text][vc_icon icon_fontawesome=&#8221;fa fa-angle-right&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-outline&#8221; background_color=&#8221;custom&#8221; size=&#8221;sm&#8221; align=&#8221;center&#8221; custom_color=&#8221;#e97f23&#8243; link=&#8221;url:https%3A%2F%2Fwww.inline.gr%2Flisis-it%2Foffice-365%2F365safe-office-365-backup%2F|||&#8221; custom_background_color=&#8221;#e97f23&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1517502208144{padding-top: 20px !important;padding-bottom: 20px !important;background-color: #e97f23 !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243; css=&#8221;.vc_custom_1517502545264{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1517502355173{border-right-width: 4px !important;padding-right: 20px !important;border-right-color: #d1d1d1 !important;border-right-style: solid !important;}&#8221;][vc_column_inner width=&#8221;1\/4&#8243; offset=&#8221;vc_col-xs-2&#8243; css=&#8221;.vc_custom_1517502453353{padding-top: 0px !important;}&#8221;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-error_outline&#8221; color=&#8221;white&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243; offset=&#8221;vc_col-xs-10&#8243; css=&#8221;.vc_custom_1517502445410{padding-top: 0px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeIn&#8221; el_class=&#8221;colr-wht text-right&#8221; css=&#8221;.vc_custom_1517911750836{margin-bottom: 15px !important;}&#8221;]<\/p>\n<p class=\"blq\">The No. 1 cause of data loss is hardware failures (31%). Followed by human errors (29%) and malware, ransomware (29%),<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;text-right colr-wht&#8221; css=&#8221;.vc_custom_1517502159937{margin-bottom: 0px !important;}&#8221;]<em>&#8211; STORAGECRAFT<\/em>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1516897724353{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221;][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1517913418844{margin-top: 0px !important;margin-bottom: 35px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<h2 class=\"text-center\">Protection against cyber attacks, malware &amp; device theft<\/h2>\n<p>[\/vc_column_text][vc_column_text]Cybercrime is a modern reality. Businesses want to take advantage of the benefits of modern technology, so they are increasingly using the Internet to reach customers, to work with vendors, to communicate and operate. Thus, their exposure to cyber threats and the need for increased levels of security are increasing.<\/p>\n<p>Effectively protect and secure your business data with an integrated security plan that has to be made up of three pillars:[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;6472&#8243; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;6472&#8243; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6479&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1516955305339{margin-bottom: 0px !important;}&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1517912691606{margin-bottom: 10px !important;}&#8221;]<\/p>\n<h3 class=\"strong inlinetc\">Protection<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;small colr-orng&#8221; css=&#8221;.vc_custom_1517912673447{margin-bottom: 10px !important;}&#8221;]Securing identities, data, applications, devices, and infrastructure \u2013 both on-premises and in the cloud.[\/vc_column_text][vc_column_text]This is the most important place to start. No matter what kind of business you have, you have valuable data and assets that cybercriminals want. By taking steps to protect your business from a data breach, you\u2019re also protecting your greatest assets\u2014your customers\u2019 trust and the reputation of your brand. [\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6477&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1516957944186{margin-bottom: 0px !important;}&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1517912720821{margin-bottom: 10px !important;}&#8221;]<\/p>\n<h3 class=\"strong inlinetc\">Detection<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;small colr-orng&#8221; css=&#8221;.vc_custom_1517912743040{margin-bottom: 10px !important;}&#8221;]Recognizing known threats and tracking emerging risks [\/vc_column_text][vc_column_text]As data becomes increasingly valuable, hackers are becoming more sophisticated. Being aware of common threats and ways to respond can help you avoid problems.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6472&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1516958464968{margin-bottom: 0px !important;}&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1517912788592{margin-bottom: 10px !important;}&#8221;]<\/p>\n<h3 class=\"strong inlinetc\">Response<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;small colr-orng&#8221; css=&#8221;.vc_custom_1517912780751{margin-bottom: 10px !important;}&#8221;]Being prepared to mitigate and report damage and notify and reassure customers[\/vc_column_text][vc_column_text]The cost of a data breach can be very high \u2014 getting hacked can force a small company out of business. The stakes are high, but there are steps you can take to respond to incidents rapidly and appropriately, and do your best to manage the situation and mitigate damage.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p class=\"txt-bigger inlinetc\">INLINE designs and implements solutions to protect your business data by integrating hardware and software from leading manufacturers.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1516897452261{margin-top: 40px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1517912908552{margin-bottom: 10px !important;border-bottom-width: 1px !important;border-bottom-color: #b2b2b2 !important;border-bottom-style: solid !important;}&#8221;]<\/p>\n<h4 class=\"text-center colr-orng\">NETWORK &amp; ENDPOINT PROTECTION<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1517912974908{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221; el_class=&#8221;text-center&#8221;]Firewall software and appliances to protect your network from attacks and Antivirus software to protect computers and mobile devices from viruses, ransomware and malware.[\/vc_column_text][vc_icon icon_fontawesome=&#8221;fa fa-angle-right&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-outline&#8221; background_color=&#8221;custom&#8221; size=&#8221;sm&#8221; align=&#8221;center&#8221; custom_color=&#8221;#e97f23&#8243; link=&#8221;url:https%3A%2F%2Fwww.inline.gr%2Fasfalia-dedomenon%2Fasfalia-diktyou-ypologiston%2F|||&#8221; custom_background_color=&#8221;#e97f23&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1517914283766{margin-bottom: 10px !important;border-bottom-width: 1px !important;border-bottom-color: #b2b2b2 !important;border-bottom-style: solid !important;}&#8221;]<\/p>\n<h4 class=\"text-center colr-orng\">ACCESS &amp; IDENTITY MANAGEMENT<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1517913185125{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221; el_class=&#8221;text-center&#8221;]Identity protection, user authentication and access control solutions for data and applications on premises and in the cloud[\/vc_column_text][vc_icon icon_fontawesome=&#8221;fa fa-angle-right&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-outline&#8221; background_color=&#8221;custom&#8221; size=&#8221;sm&#8221; align=&#8221;center&#8221; custom_color=&#8221;#e97f23&#8243; link=&#8221;url:https%3A%2F%2Fwww.inline.gr%2Flisis-it%2Ftaftopiisi-prosvasi%2F|||&#8221; custom_background_color=&#8221;#e97f23&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1517913001636{margin-bottom: 10px !important;border-bottom-width: 1px !important;border-bottom-color: #b2b2b2 !important;border-bottom-style: solid !important;}&#8221;]<\/p>\n<h4 class=\"text-center colr-orng\">MOBILE DEVICE MANAGEMENT<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1517913055657{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221; el_class=&#8221;text-center&#8221;]Manage and control mobile phones, tablets, notebooks to protect corporate data in case of loss or theft[\/vc_column_text][vc_icon icon_fontawesome=&#8221;fa fa-angle-right&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-outline&#8221; background_color=&#8221;custom&#8221; size=&#8221;sm&#8221; align=&#8221;center&#8221; custom_color=&#8221;#e97f23&#8243; link=&#8221;url:https%3A%2F%2Fwww.inline.gr%2Flisis-it%2Fdiachirisi-foriton-siskevon%2F|||&#8221; custom_background_color=&#8221;#e97f23&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;5345&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;5346&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;5339&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;5337&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;5342&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1509361259654{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 40px !important;padding-bottom: 40px !important;background-color: #f4f4f4 !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_column_text]<\/p>\n<h4>Start today<\/h4>\n<p>Contact Inline today to discuss your needs and help you implement a comprehensive plan to protect your business data and operations.[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_column_text]<\/p>\n<h4>Contact us<\/h4>\n<p>[\/vc_column_text]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1107-o1\" lang=\"el\" dir=\"ltr\" data-wpcf7-id=\"1107\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/6625#wpcf7-f1107-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"\u03a6\u03cc\u03c1\u03bc\u03b1 \u03b5\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03af\u03b1\u03c2\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1107\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"el\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1107-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"form\">\n\t\n<!-- CF7 Modules -->\n<div style='display:none;'><input type=\"hidden\" class=\"wpcf7-form-control wpcf7-hidden\" name=\"hidden-201\" placeholder=\"\" value=\"Data Protection &amp; Security\" \/>\n\t<\/div>\n<!-- End CF7 Modules -->\n\n\t<div class=\"form-group\">\n\t\t<p><label>\u038c\u03bd\u03bf\u03bc\u03b1 & \u0395\u03c0\u03ce\u03bd\u03c5\u03bc\u03bf<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-group\">\n\t\t<p><label>Email<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-group\">\n\t\t<p><label>\u0395\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"your-company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text form-control\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-company\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-group\">\n\t\t<p><label>\u03a4\u03b7\u03bb\u03ad\u03c6\u03c9\u03bd\u03bf<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text form-control\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-group\">\n\t\t<p><label>\u0391\u03c1\u03b9\u03b8\u03bc\u03cc\u03c2 \u0398\u03ad\u03c3\u03b5\u03c9\u03bd \u0395\u03c1\u03b3\u03b1\u03c3\u03af\u03b1\u03c2<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"pc-number\"><select class=\"wpcf7-form-control wpcf7-select form-control\" aria-invalid=\"false\" name=\"pc-number\"><option value=\"1-5\">1-5<\/option><option value=\"6-20\">6-20<\/option><option value=\"21-50\">21-50<\/option><option value=\"51 \u03ba\u03b1\u03b9 \u03ac\u03bd\u03c9\">51 \u03ba\u03b1\u03b9 \u03ac\u03bd\u03c9<\/option><\/select><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"checkbox\">\n\t\t<p><label><span class=\"wpcf7-form-control-wrap\" data-name=\"accepttoc\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"accepttoc\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">\u0391\u03c0\u03bf\u03b4\u03ad\u03c7\u03bf\u03bc\u03b1\u03b9 \u03c4\u03bf\u03c5\u03c2 <a href=\"https:\/\/www.inline.gr\/terms-conditions\/\" target=\"_blank\">\u038c\u03c1\u03bf\u03c5\u03c2 \u03a7\u03c1\u03ae\u03c3\u03b7\u03c2<\/a> & \u03c4\u03b7\u03bd <a href=\"https:\/\/www.inline.gr\/eteria\/politiki-prostasias-aporritou\/\" target=\"_blank\">\u03a0\u03bf\u03bb\u03b9\u03c4\u03b9\u03ba\u03ae \u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2 \u0391\u03c0\u03bf\u03c1\u03c1\u03ae\u03c4\u03bf\u03c5<\/a>.<\/span><\/label><\/span><\/span><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<p><small class=\"help-block\">\u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03b5\u03c4\u03b1\u03b9 \u03bc\u03b5 Google reCAPTCHA <a href=\"https:\/\/policies.google.com\/privacy\" rel=\"nofollow\">\u03a0\u03bf\u03bb\u03b9\u03c4\u03b9\u03ba\u03ae \u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2 \u0391\u03c0\u03bf\u03c1\u03c1\u03ae\u03c4\u03bf\u03c5<\/a> | <a href=\"https:\/\/policies.google.com\/terms\" rel=\"nofollow\">\u038c\u03c1\u03bf\u03b9 \u03a7\u03c1\u03ae\u03c3\u03b7\u03c2<\/a>.<\/small>\n\t<\/p>\n\t<div class=\"form-group\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner btn btn-primary btn-lg center-block\" type=\"submit\" value=\"\u0391\u03c0\u03bf\u03c3\u03c4\u03bf\u03bb\u03ae\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; full_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1516969718654{background-image: url(https:\/\/www.inline.gr\/wp-content\/uploads\/security-hero.jpg?id=6429) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1516968952377{padding-right: 20px !important;padding-bottom: 40px !important;padding-left: 20px !important;background-color: rgba(33,83,120,0.75) !important;*background-color: rgb(33,83,120) !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_custom_heading source=&#8221;post_title&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;pgtitle-new&#8221;][vc_column_text el_class=&#8221;text-center&#8221;] Safeguard your data, your customers&#8217; confidence and protect the reputation of your business. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1516876122096{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221;][vc_column][vc_column_text] Every business in the world [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6625","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Backup, Disaster Recovery, Data Protection - Inline T.C.<\/title>\n<meta name=\"description\" content=\"Inline provides comprehensive solutions, by combining hardware, software and services from leading manufacturers, that help businesses protect themselves and deal with cyber attacks and recover fast in the event of a disaster.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inline.gr\/en\/data-protection-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup, Disaster Recovery, Data Protection - Inline T.C.\" \/>\n<meta property=\"og:description\" content=\"Inline provides comprehensive solutions, by combining hardware, software and services from leading manufacturers, that help businesses protect themselves and deal with cyber attacks and recover fast in the event of a disaster.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inline.gr\/en\/data-protection-security\" \/>\n<meta property=\"og:site_name\" content=\"Inline Technology Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inlinetc\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-06T10:53:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inline.gr\/wp-content\/uploads\/security-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.inline.gr\/wp-content\/uploads\/security-hero.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@inlinetc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inline.gr\\\/en\\\/data-protection-security\",\"url\":\"https:\\\/\\\/www.inline.gr\\\/en\\\/data-protection-security\",\"name\":\"Backup, Disaster Recovery, Data Protection - Inline T.C.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inline.gr\\\/#website\"},\"datePublished\":\"2018-01-25T08:33:59+00:00\",\"dateModified\":\"2018-02-06T10:53:00+00:00\",\"description\":\"Inline provides comprehensive solutions, by combining hardware, software and services from leading manufacturers, that help businesses protect themselves and deal with cyber attacks and recover fast in the event of a disaster.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inline.gr\\\/en\\\/data-protection-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inline.gr\\\/en\\\/data-protection-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inline.gr\\\/en\\\/data-protection-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inline.gr\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Protection &#038; Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inline.gr\\\/#website\",\"url\":\"https:\\\/\\\/www.inline.gr\\\/\",\"name\":\"Inline Technology Consultants\",\"description\":\"\u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03ba\u03b1\u03b9 \u0395\u03be\u03bf\u03c0\u03bb\u03b9\u03c3\u03bc\u03cc\u03c2 \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2 \u03b3\u03b9\u03b1 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b5\u03c2 &amp; \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd\u03c2\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.inline.gr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inline.gr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.inline.gr\\\/#organization\",\"name\":\"Inline T.C. Ltd.\",\"url\":\"https:\\\/\\\/www.inline.gr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inline.gr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.inline.gr\\\/wp-content\\\/uploads\\\/new-logo-inline.png\",\"contentUrl\":\"https:\\\/\\\/www.inline.gr\\\/wp-content\\\/uploads\\\/new-logo-inline.png\",\"width\":2141,\"height\":1151,\"caption\":\"Inline T.C. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inline.gr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/inlinetc\",\"https:\\\/\\\/x.com\\\/inlinetc\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backup, Disaster Recovery, Data Protection - Inline T.C.","description":"Inline provides comprehensive solutions, by combining hardware, software and services from leading manufacturers, that help businesses protect themselves and deal with cyber attacks and recover fast in the event of a disaster.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inline.gr\/en\/data-protection-security","og_locale":"en_US","og_type":"article","og_title":"Backup, Disaster Recovery, Data Protection - Inline T.C.","og_description":"Inline provides comprehensive solutions, by combining hardware, software and services from leading manufacturers, that help businesses protect themselves and deal with cyber attacks and recover fast in the event of a disaster.","og_url":"https:\/\/www.inline.gr\/en\/data-protection-security","og_site_name":"Inline Technology Consultants","article_publisher":"https:\/\/www.facebook.com\/inlinetc","article_modified_time":"2018-02-06T10:53:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.inline.gr\/wp-content\/uploads\/security-hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/www.inline.gr\/wp-content\/uploads\/security-hero.jpg","twitter_site":"@inlinetc","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inline.gr\/en\/data-protection-security","url":"https:\/\/www.inline.gr\/en\/data-protection-security","name":"Backup, Disaster Recovery, Data Protection - Inline T.C.","isPartOf":{"@id":"https:\/\/www.inline.gr\/#website"},"datePublished":"2018-01-25T08:33:59+00:00","dateModified":"2018-02-06T10:53:00+00:00","description":"Inline provides comprehensive solutions, by combining hardware, software and services from leading manufacturers, that help businesses protect themselves and deal with cyber attacks and recover fast in the event of a disaster.","breadcrumb":{"@id":"https:\/\/www.inline.gr\/en\/data-protection-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inline.gr\/en\/data-protection-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inline.gr\/en\/data-protection-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inline.gr\/en"},{"@type":"ListItem","position":2,"name":"Data Protection &#038; Security"}]},{"@type":"WebSite","@id":"https:\/\/www.inline.gr\/#website","url":"https:\/\/www.inline.gr\/","name":"Inline Technology Consultants","description":"\u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03ba\u03b1\u03b9 \u0395\u03be\u03bf\u03c0\u03bb\u03b9\u03c3\u03bc\u03cc\u03c2 \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2 \u03b3\u03b9\u03b1 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b5\u03c2 &amp; \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd\u03c2","publisher":{"@id":"https:\/\/www.inline.gr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inline.gr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inline.gr\/#organization","name":"Inline T.C. Ltd.","url":"https:\/\/www.inline.gr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inline.gr\/#\/schema\/logo\/image\/","url":"https:\/\/www.inline.gr\/wp-content\/uploads\/new-logo-inline.png","contentUrl":"https:\/\/www.inline.gr\/wp-content\/uploads\/new-logo-inline.png","width":2141,"height":1151,"caption":"Inline T.C. Ltd."},"image":{"@id":"https:\/\/www.inline.gr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inlinetc","https:\/\/x.com\/inlinetc"]}]}},"_links":{"self":[{"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/pages\/6625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/comments?post=6625"}],"version-history":[{"count":0,"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/pages\/6625\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inline.gr\/en\/wp-json\/wp\/v2\/media?parent=6625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}