{"id":84,"date":"2024-04-20T22:36:50","date_gmt":"2024-04-21T02:36:50","guid":{"rendered":"https:\/\/keystonecyberdivision.com\/?page_id=84"},"modified":"2025-07-01T14:47:56","modified_gmt":"2025-07-01T18:47:56","slug":"home","status":"publish","type":"page","link":"https:\/\/keystonecyberdivision.com\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/keystonecyberdivision.com\/wp-content\/uploads\/2025\/06\/KCD-logo.png\" alt=\"\" class=\"wp-image-634\" style=\"width:399px;height:auto\" srcset=\"https:\/\/keystonecyberdivision.com\/wp-content\/uploads\/2025\/06\/KCD-logo.png 1000w, https:\/\/keystonecyberdivision.com\/wp-content\/uploads\/2025\/06\/KCD-logo-300x300.png 300w, https:\/\/keystonecyberdivision.com\/wp-content\/uploads\/2025\/06\/KCD-logo-150x150.png 150w, https:\/\/keystonecyberdivision.com\/wp-content\/uploads\/2025\/06\/KCD-logo-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p><strong>Keystone Cyber Division<\/strong>, located in Erie, PA, is a boutique cyber security consulting firm specializing in providing tailored solutions for small to medium-sized businesses (SMBs). With a dedicated team of experts, we offer comprehensive services. Our approach is centered on understanding the unique challenges and priorities of each client, allowing us to deliver personalized strategies to mitigate cyber threats effectively. At Keystone Cyber Division, we are committed to building lasting partnerships with our customers, empowering them to navigate the digital landscape securely while focusing on their core business objectives.<\/p>\n\n\n\n<div class=\"wp-block-group our-services\" style=\"margin-top:0px;margin-bottom:0px\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-contrast-color has-text-color has-link-color has-extra-large-font-size wp-elements-e9fa744d57a8af3f3cc8eab7f3b4aca9\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">Custom Services For Your Business<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column service-box wow swing has-base-color has-contrast-2-background-color has-text-color has-background has-link-color wp-elements-7bed45470fc12a687e49a25e4a5cdb61 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h5 class=\"wp-block-heading has-contrast-color has-text-color has-link-color wp-elements-ad38485666f87b6dc0efe1bdbb40530f\"><a href=\"https:\/\/keystonecyberdivision.com\/?page_id=107#Network-Security-Assessment\">Network Security Assessment<\/a><\/h5>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-1f5eb1af958249de5fa2ec5450a327a7\">Network security encompasses the technologies, policies and practices dedicated to detecting and preventing malicious and unauthorized attempts to penetrate and compromise your network infrastructure.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column service-box wow swing has-base-color has-contrast-2-background-color has-text-color has-background has-link-color wp-elements-df47b897e14d817923bf1b759907f918 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h5 class=\"wp-block-heading has-contrast-color has-text-color has-link-color wp-elements-b63dfc79ed39995ee0e52e9346242cfb\"><a href=\"https:\/\/keystonecyberdivision.com\/?page_id=107#Penetration-Testing\" data-type=\"link\" data-id=\"https:\/\/keystonecyberdivision.com\/?page_id=107#\">Penetration Testing<\/a><\/h5>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-355cfa1feec9c58f087b55f9bc2a485c\">Pen testing finds vulnerabilities, known and unknown, but just finding them isn\u2019t the story. The <em>real<\/em> value is what they teach us and how our red teamers can inform your risk calculations down the road.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column service-box wow swing has-base-color has-contrast-2-background-color has-text-color has-background has-link-color wp-elements-1f9a2354bcba8d00d80dd151b09d79ea is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h5 class=\"wp-block-heading has-contrast-color has-text-color has-link-color wp-elements-9ff81069cb6de5a2f2057e3cd9fd5b4e\"><a href=\"https:\/\/keystonecyberdivision.com\/?page_id=107#Cloud-Security-Consulting\" data-type=\"page\" data-id=\"107\">Cloud Security Consulting<\/a><\/h5>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-cd22d1837fe685006b1283a2044185d6\">Cloud deployments are critical components of digital transformation strategies. Successful transformation requires you to execute your cloud strategy with security in mind.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Keystone Cyber Division, located in Erie, PA, is a boutique cyber security consulting firm specializing in providing tailored solutions for small to medium-sized businesses (SMBs). With a dedicated team of experts, we offer comprehensive services. Our approach is centered on understanding the unique challenges and priorities of each client, allowing us to deliver personalized strategies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-84","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=\/wp\/v2\/pages\/84","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=84"}],"version-history":[{"count":16,"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=\/wp\/v2\/pages\/84\/revisions"}],"predecessor-version":[{"id":636,"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=\/wp\/v2\/pages\/84\/revisions\/636"}],"wp:attachment":[{"href":"https:\/\/keystonecyberdivision.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}