{"id":368143,"date":"2026-02-11T06:12:57","date_gmt":"2026-02-11T05:12:57","guid":{"rendered":"https:\/\/zelly.se\/tjanster\/information-it-security"},"modified":"2026-05-11T14:58:30","modified_gmt":"2026-05-11T12:58:30","slug":"information-it-security","status":"publish","type":"tjanster","link":"https:\/\/zelly.se\/en\/tjanster\/information-it-security","title":{"rendered":"Information &amp; IT security"},"excerpt":{"rendered":"<p>Information &amp; IT security Protect your data and secure the future We help companies secure their information and IT environment, protect against cyber threats and create a security-conscious culture. With the right tools and procedures, you can reduce risks and safely run your business digitally. Information security Implement and maintain policies, controls and systems that [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_acf_changed":false},"utseende":[25],"class_list":["post-368143","tjanster","type-tjanster","status-publish","hentry","utseende-elementor"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\r\n<title>Information &amp; IT security | Aderian Zelly<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/zelly.se\/en\/tjanster\/information-it-security\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Information &amp; IT security\" \/>\r\n<meta property=\"og:description\" content=\"Information &amp; IT security Protect your data and secure the future We help companies secure their information and IT environment, protect against cyber threats and create a security-conscious culture. With the right tools and procedures, you can reduce risks and safely run your business digitally. Information security Implement and maintain policies, controls and systems that [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/zelly.se\/en\/tjanster\/information-it-security\" \/>\r\n<meta property=\"og:site_name\" content=\"Aderian Zelly\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-05-11T12:58:30+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zelly.se\\\/en\\\/tjanster\\\/information-it-security\",\"url\":\"https:\\\/\\\/zelly.se\\\/en\\\/tjanster\\\/information-it-security\",\"name\":\"Information &amp; IT security | Aderian Zelly\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zelly.se\\\/#website\"},\"datePublished\":\"2026-02-11T05:12:57+00:00\",\"dateModified\":\"2026-05-11T12:58:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zelly.se\\\/en\\\/tjanster\\\/information-it-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zelly.se\\\/en\\\/tjanster\\\/information-it-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zelly.se\\\/en\\\/tjanster\\\/information-it-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hem\",\"item\":\"https:\\\/\\\/zelly.se\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information &amp; IT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zelly.se\\\/#website\",\"url\":\"https:\\\/\\\/zelly.se\\\/\",\"name\":\"Aderian Zelly\",\"description\":\"Din helhetsleverant\u00f6r inom cloud\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zelly.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information &amp; IT security | Aderian Zelly","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zelly.se\/en\/tjanster\/information-it-security","og_locale":"en_US","og_type":"article","og_title":"Information &amp; IT security","og_description":"Information &amp; IT security Protect your data and secure the future We help companies secure their information and IT environment, protect against cyber threats and create a security-conscious culture. With the right tools and procedures, you can reduce risks and safely run your business digitally. Information security Implement and maintain policies, controls and systems that [&hellip;]","og_url":"https:\/\/zelly.se\/en\/tjanster\/information-it-security","og_site_name":"Aderian Zelly","article_modified_time":"2026-05-11T12:58:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/zelly.se\/en\/tjanster\/information-it-security","url":"https:\/\/zelly.se\/en\/tjanster\/information-it-security","name":"Information &amp; IT security | Aderian Zelly","isPartOf":{"@id":"https:\/\/zelly.se\/#website"},"datePublished":"2026-02-11T05:12:57+00:00","dateModified":"2026-05-11T12:58:30+00:00","breadcrumb":{"@id":"https:\/\/zelly.se\/en\/tjanster\/information-it-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zelly.se\/en\/tjanster\/information-it-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/zelly.se\/en\/tjanster\/information-it-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hem","item":"https:\/\/zelly.se\/en"},{"@type":"ListItem","position":2,"name":"Information &amp; IT security"}]},{"@type":"WebSite","@id":"https:\/\/zelly.se\/#website","url":"https:\/\/zelly.se\/","name":"Aderian Zelly","description":"Din helhetsleverant\u00f6r inom cloud","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zelly.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/tjanster\/368143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/tjanster"}],"about":[{"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/types\/tjanster"}],"version-history":[{"count":1,"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/tjanster\/368143\/revisions"}],"predecessor-version":[{"id":368155,"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/tjanster\/368143\/revisions\/368155"}],"wp:attachment":[{"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/media?parent=368143"}],"wp:term":[{"taxonomy":"utseende","embeddable":true,"href":"https:\/\/zelly.se\/en\/wp-json\/wp\/v2\/utseende?post=368143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}