{"id":178,"date":"2020-06-24T22:46:53","date_gmt":"2020-06-25T03:46:53","guid":{"rendered":"https:\/\/www.cyburity.tk\/?page_id=178"},"modified":"2023-09-20T17:12:04","modified_gmt":"2023-09-20T21:12:04","slug":"penetration-testing-services-overview","status":"publish","type":"page","link":"https:\/\/dialer.one\/index.php\/penetration-testing-services-overview\/","title":{"rendered":"Cyber Security &#8211; FREE Security Audit!"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Steps to Schedule Your Penetration Test:<\/strong><\/h3>\n\n\n\n<!-- Global site tag (gtag.js) - Google Analytics -->\n<script async=\"\" src=\"https:\/\/www.googletagmanager.com\/gtag\/js?id=UA-173557717-1\"><\/script>\n<script>\n  window.dataLayer = window.dataLayer || [];\n  function gtag(){dataLayer.push(arguments);}\n  gtag('js', new Date());\n\n  gtag('config', 'UA-173557717-1');\n<\/script>\n\n\n\n<p>1.<strong>&nbsp;<\/strong><a href=\"https:\/\/cyburityllc.com\/?p=476\" title=\"Schedule a discovery session\" target=\"_blank\" rel=\"noopener\">Schedule a 30-minute Discovery Session<\/a><br>2. We determine IF and HOW we can help<br>3. We provide a Tailored Proposal<br>4. Together, we review the Proposal<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Penetration Testing Services Highlights:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Highly trained and certified team with the following credentials: CISSP, CSSLP, OSCP, ECSA, LPT (Master), CEH, etc.<\/strong><\/li>\n\n\n\n<li><strong>We dive deeper<\/strong><\/li>\n\n\n\n<li><strong>Proven&nbsp; methodology<\/strong><\/li>\n\n\n\n<li><strong>Includes remediation validation test (RVT) to validate your fix actions<\/strong><\/li>\n\n\n\n<li><strong>Clear &amp; concise reports with prioritized, actionable items<\/strong><\/li>\n\n\n\n<li><strong>Includes Letter of Attestation<\/strong><\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com\/wp-content\/uploads\/2020\/01\/PenetrationTesting-1.jpg\" alt=\"best penetration testing services\" class=\"wp-image-1424\" style=\"width:724px;height:513px\" width=\"724\" height=\"513\" title=\"\"><\/figure>\n<\/div>\n\n\n<p>How secure is your network? When is the last time you tested your cybersecurity defenses? Why not take steps now to protect your systems, your employees, and your clients from a cyberattack? You cannot fix what you do not know. A penetration test strengthens your defenses by revealing your weaknesses and recommending prioritized fix actions.<\/p>\n\n\n\n<p>We offer full-spectrum cybersecurity penetration testing, from testing a single IP address or web application to full-blown Red Team engagements. As ethical hackers (penetration testers), we emulate hackers and cybercriminals by utilizing similar techniques to perform reconnaissance, identify vulnerabilities, and break into your systems. Unlike attackers, however, we play by our agreed upon Rules of Engagement (ROE). We cease the test before exposing sensitive data or doing harm to your environment.<\/p>\n\n\n\n<p>We offer every type of penetration test available. We broadly categorize our testing into two main categories, based on the location they are typically performed from: \u201cRemote\u201d and \u201cOnsite\u201d. Most of our penetration testing services can be performed remotely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Remote Penetration Testing<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>External Black Box (Unauthenticated) Network Penetration Test<\/li>\n\n\n\n<li>External Gray Box (Authenticated) Penetration Test (typically against a web application)<\/li>\n\n\n\n<li>Web Application Penetration Test<\/li>\n\n\n\n<li>Remote Vulnerability Assessment (we ship a device to you)<\/li>\n\n\n\n<li>Remote Internal Black Box Penetration Test (we ship a device to you)<\/li>\n\n\n\n<li>Remote Wireless Security Assessment (we ship a device to you)<\/li>\n\n\n\n<li>Social Engineering\n<ul class=\"wp-block-list\">\n<li>Phishing<\/li>\n\n\n\n<li>Spearphishing<\/li>\n\n\n\n<li>Vishing<\/li>\n\n\n\n<li>Digital Footprint Analysis<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Onsite Penetration Testing<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internal Gray Box (Authenticated) Penetration Test (can be performed remotely)<\/li>\n\n\n\n<li>Internal Black Box (Unauthenticated) Network Penetration Test(can be performed remotely)<\/li>\n\n\n\n<li>White Box Penetration Test (typically on products, such as medical devices)<\/li>\n\n\n\n<li>Wireless Security Assessment (can be performed remotely)<\/li>\n\n\n\n<li>Internal Vulnerability Assessment (can be performed remotely)<\/li>\n\n\n\n<li>Social Engineering\n<ul class=\"wp-block-list\">\n<li>In-Person<\/li>\n\n\n\n<li>Physical Device Plants and Drops<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Physical Penetration Test<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Black Box Penetration Testing<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com\/wp-content\/uploads\/2020\/01\/BestPenetrationTestingCompanyinStLouisArea.jpg\" alt=\"gray box web application penetration testing\" class=\"wp-image-1425\" style=\"width:711px;height:502px\" width=\"711\" height=\"502\" title=\"\"><\/figure>\n<\/div>\n\n\n<p>With&nbsp;<strong>Black Box Penetration Testing<\/strong>&nbsp;we only have unauthenticated access and little prior knowledge, except the IP Address or URL, about the systems in scope. Black Box Penetration Testing can be performed externally, against public-facing systems or internally, simulated a rogue device or insider threat against your internal environment. Black Box Penetration Testing is often called Network Penetration Testing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Gray Box (Authenticated) Penetration Testing<\/strong><\/h2>\n\n\n\n<p>With&nbsp;<strong>Gray Box Penetration Testing<\/strong>&nbsp;we test target systems as an authenticated user with user-level access. For instance, we test a portal on your website by creating an authenticated user account or using credentials that you provide.&nbsp; We attempt to escalate privileges or access-controlled data. The Gray Box Penetration Test ensures users cannot access sensitive data, such as another user\u2019s information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>White Box Penetration Testing<\/strong><\/h2>\n\n\n\n<p><strong>White Box Penetration Testing&nbsp;<\/strong>is designed to assess a system or device with\u201dadministrator\u201d or \u201croot\u201d&nbsp;level access and knowledge. &nbsp;This often includes access to architecture diagrams, design documents, specifications, and source code. &nbsp;White Box Penetration Testing is ideal if you develop your own products or integrate systems into your environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Methodology<\/strong><\/h2>\n\n\n\n<p>We follow a high-level seven phase methodology designed to maximize our efficiency, minimize risk, and provide complete and accurate results. The overarching seven phases of the methodology are:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Planning and Preparation<\/li>\n\n\n\n<li>Reconnaissance \/ Discovery<\/li>\n\n\n\n<li>Vulnerability Enumeration \/ Analysis<\/li>\n\n\n\n<li>Initial Exploitation<\/li>\n\n\n\n<li>Expanding Foothold \/ Deeper Penetration<\/li>\n\n\n\n<li>Cleanup<\/li>\n\n\n\n<li>Report Generation<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Benefits and Features<\/strong><\/h2>\n\n\n\n<p>We think it is better to have an ethical hacker find the holes into your enterprise than an adversary. &nbsp;Our Penetration Testing provides details on exploitable vulnerabilities in a prioritized, tangible manner. &nbsp;Our report allows you to better understand what your environment looks like from an attacker perspective. &nbsp;This helps you prioritize efforts to mitigate risk to reduce breach likelihood or damage.<\/p>\n\n\n\n<p>Not only do our Penetration Testing Services show you what your attack surface looks like to an adversary attacker, but they can be used as a safe way to test your organization\u2019s incident response (IR) capabilities. &nbsp;Our Penetration Testing services can be used to tune and test your security controls, such as your IDS, Firewall, Endpoint Security, Router ACLs, etc.<\/p>\n\n\n\n<p>Our Penetration Testing services also help you meet compliance audit requirements such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HIPAA&nbsp;Penetration&nbsp;Testing<\/li>\n\n\n\n<li>PCI Penetration Testing<\/li>\n\n\n\n<li>SOC 2<\/li>\n\n\n\n<li>FDA<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What You Get \/ Deliverables<\/strong><\/h2>\n\n\n\n<p>You get four items:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Penetration Test Report<\/li>\n\n\n\n<li>Penetration Test Report Findings Review with your team via an online session<\/li>\n\n\n\n<li>Remediation Validation Retest (RVT) after you fix identified problems<\/li>\n\n\n\n<li>Letter of Attestation<\/li>\n<\/ol>\n\n\n\n<p><strong>1. Penetration Test Report<\/strong><\/p>\n\n\n\n<p>The&nbsp;<strong>Penetration Test Report<\/strong>&nbsp;includes IP addresses tested, vulnerabilities discovered, steps taken during the assessment, exploitable areas discovered, and prioritized recommendations. &nbsp;For any systems we are able to exploit, an \u201cAttack Narrative\u201d section is used to discuss step-by-step the process we used to gain access, escalate privileges, etc.<\/p>\n\n\n\n<p>For a sample penetration test report, please contact us or complete the Penetration Test Information Request Form, below.<\/p>\n\n\n\n<p>The report sample below is used as a quick reference to focus remediation and mitigation efforts on. The findings are ranked by risk rating and include recommendations (rec), reference links for mitigation steps, and tester notes.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com\/wp-content\/uploads\/2019\/11\/PenetrationTestingReportSamplefromAlpineSecurityBasedinStLouis.jpg\" alt=\"\" title=\"\"><\/figure>\n\n\n\n<p><strong>2. Penetration Test Report Findings Review<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com\/wp-content\/uploads\/2020\/01\/AThoroughPenetrationTestReviewwithYourTeamisPartofOurProcess.jpg\" alt=\"penetration testing review session\" class=\"wp-image-1429\" style=\"width:684px;height:456px\" width=\"684\" height=\"456\" title=\"\"><\/figure>\n<\/div>\n\n\n<p>We schedule either an in-person of online session with you where we walk through the report with your team and answer any questions about the findings, our methods, or the steps required for remediation. Many competitors deliver a confusing lengthy report at the end of the engagement for you to decipher. Our penetration test report review adds tremendous value because we can clarify findings and remediation steps.<\/p>\n\n\n\n<p><strong>3. Remediation Validation Test (RVT)<\/strong><\/p>\n\n\n\n<p>How do you know the steps you took to fix our penetration test report findings actually worked? Validation removes the guesswork. When you\u2019re ready, after fixing the issues identified in the penetration test report, we offer a deep discount to rerun the same penetration test. This is a crucial and often overlooked step in this process. Validating security controls, patches, and other fix actions are extremely important. We have discovered numerous organizations that thought they fixed a finding we identified, only to discover after a retest that the finding was still there.<\/p>\n\n\n\n<p><strong>4. Letter of Attestation<\/strong><\/p>\n\n\n\n<p>The attestation letter serves as the record of us performing the penetration test. It includes a summary of the findings. Its intent is for external use, outside of your organization, to show proof that a security assessment was performed and to highlight test results.<\/p>\n\n\n\n<p><em><strong>Interested in testing your systems to see how effective your security controls are against an attacker?<\/strong><\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyburity.tk\/?page_id=20\" target=\"_blank\" rel=\"noopener\">Contact Us<\/a> for more information about our Penetration Testing Services or to schedule a Penetration Test.<\/p>\n\n\n\n<!DOCTYPE html>\n<html>\n<head>\n  <style>\n    .chatbox-container {\n      position: fixed;\n      bottom: 20px;\n      left: 20px; \/* Changed right to left *\/\n      z-index: 9999;\n    }\n    .chatbox {\n      display: none;\n      background-color: #f2f2f2;\n      border: 1px solid #ccc;\n      border-radius: 5px;\n      padding: 10px;\n      width: 300px;\n      position: relative; \/* Added to position the close button *\/\n    }\n    .close-button {\n      position: absolute;\n      top: 5px;\n      right: 5px;\n      cursor: pointer;\n    }\n    .chatbox input[type=\"text\"] {\n      width: 100%;\n      padding: 5px;\n      margin-top: 5px;\n    }\n    .chatbox input[type=\"submit\"] {\n      width: 100%;\n      padding: 5px;\n      margin-top: 5px;\n      background-color: #4CAF50;\n      color: white;\n      border: none;\n      cursor: pointer;\n    }\n    .chatlog {\n      height: 200px;\n      overflow-y: scroll;\n    }\n    .support-button {\n      position: fixed;\n      bottom: 20px;\n      left: 20px; \/* Changed right to left *\/\n      background-color: #4CAF50;\n      color: white;\n      border: none;\n      padding: 10px 20px;\n      border-radius: 5px;\n      cursor: pointer;\n      z-index: 9999;\n    }\n  <\/style>\n<\/head>\n<body>\n  <div class=\"chatbox-container\">\n    <button class=\"support-button\" id=\"support-button\">Support<\/button>\n    <div class=\"chatbox\" id=\"chatbox\">\n      <span class=\"close-button\" id=\"close-button\">X<\/span> <!-- Close button (X) -->\n      <div class=\"chatlog\">\n        <!-- Chat messages will be dynamically added here -->\n      <\/div>\n      <input type=\"text\" id=\"message\" placeholder=\"Type your message...\">\n      <input type=\"submit\" value=\"Send\" id=\"send\">\n    <\/div>\n  <\/div>\n\n  <script>\n    \/\/ JavaScript code for chat functionality\n    document.getElementById(\"support-button\").addEventListener(\"click\", function() {\n      var chatbox = document.getElementById(\"chatbox\");\n      chatbox.style.display = \"block\";\n      this.style.display = \"none\";\n    });\n\n    document.addEventListener(\"click\", function(event) {\n      var chatbox = document.getElementById(\"chatbox\");\n      var supportButton = document.getElementById(\"support-button\");\n      \n      if (!chatbox.contains(event.target) && !supportButton.contains(event.target)) {\n        chatbox.style.display = \"none\";\n        supportButton.style.display = \"block\";\n      }\n    });\n\n    \/\/ Close the chatbox and show the support button\n    document.getElementById(\"close-button\").addEventListener(\"click\", function() {\n      var chatbox = document.getElementById(\"chatbox\");\n      var supportButton = document.getElementById(\"support-button\");\n      chatbox.style.display = \"none\";\n      supportButton.style.display = \"block\";\n    });\n\n    document.getElementById(\"send\").addEventListener(\"click\", function() {\n      var messageInput = document.getElementById(\"message\");\n      var message = messageInput.value.trim();\n\n      if (message !== \"\") {\n        var chatlog = document.querySelector(\".chatlog\");\n        var messageElement = document.createElement(\"p\");\n        messageElement.textContent = \"You: \" + message;\n        chatlog.appendChild(messageElement);\n        messageInput.value = \"\";\n        chatlog.scrollTop = chatlog.scrollHeight;\n\n        \/\/ Make request to the ChatGPT API\n        fetch(\"https:\/\/api.openai.com\/v1\/chat\/completions\", {\n          method: \"POST\",\n          headers: {\n            \"Content-Type\": \"application\/json\",\n            \"Authorization\": \"Bearer YOUR_API_KEY\" \/\/ Replace with your actual API key\n          },\n          body: JSON.stringify({\n            \"model\": \"gpt-3.5-turbo\",\n            \"messages\": [\n              { \"role\": \"system\", \"content\": \"You are a customer\" },\n              { \"role\": \"user\", \"content\": message },\n              { \"role\": \"assistant\", \"content\": \"Contact Center Build-Outs\\nHome\\nContact Center Build-Outs\\nCyburDIal\\nContact Center Build-Outs\\nWhy choose us for your Contact Center Build-Out?\\nWe are the only vendor on the planet that has everything under one roof for a complete Contact Center Build-Out.\" } \/\/ Add the reference text here\n            ]\n          })\n        })\n        .then(response => response.json())\n        .then(data => {\n          var reply = data.choices[0].message.content;\n          var replyElement = document.createElement(\"p\");\n          replyElement.textContent = \"ChatGPT: \" + reply;\n          chatlog.appendChild(replyElement);\n          chatlog.scrollTop = chatlog.scrollHeight;\n        })\n        .catch(error => {\n          console.error(\"Error:\", error);\n        });\n      }\n    });\n  <\/script>\n<\/body>\n<\/html>\n\n","protected":false},"excerpt":{"rendered":"<p>Steps to Schedule Your Penetration Test: 1.&nbsp;Schedule a 30-minute Discovery Session2. We determine IF and HOW we can help3. We provide a Tailored Proposal4. Together, we review the Proposal Penetration Testing Services Highlights: How secure is your network? When is the last time you tested your cybersecurity defenses? Why not take steps now to protect [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":916,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-178","page","type-page","status-publish","has-post-thumbnail","hentry"],"jetpack-related-posts":[{"id":17,"url":"https:\/\/dialer.one\/index.php\/services\/","url_meta":{"origin":178,"position":0},"title":"Services","author":"carpenox","date":"May 1, 2020","format":false,"excerpt":"Security Cameras InstallationsRunning\/Terminating the CablesRepairsTroubleshootingSetting up Mobile Access Computer Services Hardware repairVirus\/Malware RemovalUpgradesSoftware installationsOptimization (Speed it up) Web Design Web DesignWeb HostingWebsite MaintenanceWordPress Themes We specialize in setting up any size call center Call Center Dialer Setup Vicidial, GoAutoDial, VicidialNOW Setups or TroubleshootingSetting up Inbound, Outbound, Survey or Press 1\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/home-security-camera-system-2th000.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/home-security-camera-system-2th000.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/home-security-camera-system-2th000.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/home-security-camera-system-2th000.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":280,"url":"https:\/\/dialer.one\/index.php\/customer-chat\/","url_meta":{"origin":178,"position":1},"title":"Customer Chat","author":"carpenox","date":"July 25, 2020","format":false,"excerpt":"Speak to a live representative now directly through any of the channels below Whatsapp Chat on WhatsApp Skype Live Chat Join our live Skype chat 24 hours a day","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/chat1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/chat1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/chat1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/chat1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/chat1.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":20,"url":"https:\/\/dialer.one\/index.php\/contact\/","url_meta":{"origin":178,"position":2},"title":"Contact CyburDial: Your Dialer Solutions Provider","author":"carpenox","date":"May 1, 2020","format":false,"excerpt":"Address: CyburDial, LLC 7901 4th St N., Suite 16260 St. Petersburg, FL 33702 Toll Free: 1-833-DIALER-1 Email: info@cyburdial.org Whatsapp\/US: +19549477572 Chat on WhatsApp Discord: https:\/\/discord.gg\/kJtXDun4qM Email us: info@cybur-dial.com","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"6 years!","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2025\/09\/image.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2025\/09\/image.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2025\/09\/image.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2025\/09\/image.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":226,"url":"https:\/\/dialer.one\/index.php\/home\/","url_meta":{"origin":178,"position":3},"title":"Home &#8211; CyburDial","author":"carpenox","date":"May 1, 2020","format":false,"excerpt":"Welcome to Cyburdial CyburDial - Welcome to CyburDial Vicidial dialer web contact solutions business security center services hosting predictive CyburDial - vicidial hosting","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"CyburDial","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":39,"url":"https:\/\/dialer.one\/","url_meta":{"origin":178,"position":4},"title":"Unlocking Performance with CyburDial&#8217;s Features","author":"carpenox","date":"May 2, 2023","format":false,"excerpt":"Contact Center Build-Outs Why choose us for your Contact Center Build-Out? We are the only vendor on the planet that has everything under one roof for a full Contact Center Build-Out.\u00a0 Providing customer service is basic, yet it is a top priority that directly affects a company\u2019s bottom line. With\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"CyburDial Agent","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/12\/agent.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/12\/agent.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/12\/agent.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/12\/agent.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/12\/agent.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/12\/agent.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":446,"url":"https:\/\/dialer.one\/index.php\/business-solutions-2\/","url_meta":{"origin":178,"position":5},"title":"Business Solutions","author":"carpenox","date":"July 25, 2020","format":false,"excerpt":"Marketing SEO - Search Engine Optimization Email Campaigns SMS Marketing Opt-In\/Lead Generation Graphic Design - Business Card \/ Flyers \/ Logos Branding Niche Markets Consultation Business Plans Corporations \/ LLC's \/ Partnerships \/ Non-Profits Ethical Hacking \/ Cyber Security Network Installation Quotes and Setups Contact Center Setup Quotes - Cubicles,\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/business-plan-e1597968562647.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/business-plan-e1597968562647.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/business-plan-e1597968562647.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2020\/08\/business-plan-e1597968562647.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/pages\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":0,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/pages\/178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/media\/916"}],"wp:attachment":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/media?parent=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}