diff --git a/content/consulting/security.mdx b/content/consulting/security.mdx
index 615182d91f..fc66c1889d 100644
--- a/content/consulting/security.mdx
+++ b/content/consulting/security.mdx
@@ -3,9 +3,7 @@ type: consulting
description: null
seo:
title: IT Security Consulting | SSW
- description: >-
- Expert security consulting for identity solutions, secure code, and network
- infrastructure to prevent data breaches and enhance user experience.
+ description: 'Expert security consulting for identity solutions, secure code, and network infrastructure to prevent data breaches and enhance user experience.'
canonical: 'https://www.ssw.com.au/consulting/security'
images:
- url: /images/consulting/open-graph/security.jpg
@@ -13,12 +11,8 @@ seo:
height: 629
alt: SSW Security Consulting - Enterprise Software Development
booking:
- title: >-
- Want to avoid embarrassing or expensive
- data breaches?
- subTitle: >-
- Secure your applications, cloud, or network infrastructure by implementing
- the best identity solution
+ title: Want to avoid embarrassing or expensive data breaches?
+ subTitle: 'Secure your applications, cloud, or network infrastructure by implementing the best identity solution'
videoBackground: /images/videos/MVC_background.mp4
solution:
project: security
@@ -36,23 +30,22 @@ benefits:
description: "\U0001F511 IdentityServer, Auth0, and Microsoft Entra ID provide top-tier authentication and authorization services. They offer OAuth 2.0, OpenID Connect, SSO, and customizable user experiences.\n"
- image: /images/benefits/clear-graphics.png
title: CODE AUDITS
- description: >
- We can review your code and audit it against the OWASP top 10. We can
- also offer aggressive **red team** reviews where we actively attempt to
- find security flaws in your code. NOTE This is distinct from penetration
- testing, which we offer via a partner.
+ description: |
+ We can review your code and audit it against the OWASP top 10. We can also offer aggressive **red team** reviews where we actively attempt to find security flaws in your code. NOTE This is distinct from penetration testing, which we offer via a partner.
- image: /images/benefits/speedup_db.png
title: CLOUD SECURITY REVIEW
- description: >
- We can review your cloud architecture to ensure that your design and
- components are best suited to the needs of your business while also
- providing the best security.
+ description: |
+ We can review your cloud architecture to ensure that your design and components are best suited to the needs of your business while also providing the best security.
- image: /images/benefits/implementation.png
title: NETWORK AND INFRASTRUCTURE REVIEWS
- description: >
- We can audit your network and systems architecture to ensure you are
- aligned with best practices and that common vulnerabilities are
- protected.
+ description: |
+ We can audit your network and systems architecture to ensure you are aligned with best practices and that common vulnerabilities are protected.
+ - image: /images/benefits/security.png
+ title: PASSWORD MANAGERS
+ description: |
+ We can help you securely generate, store and manage strong unique passwords following best practices with Enterprise grade password managers like [Keeper](https://www.keepersecurity.com/).
+ linkName: Learn more
+ linkURL: 'https://www.ssw.com.au/rules/password-manager/'
rule:
- name: SSW Rules to Better Security
url: 'https://www.ssw.com.au/rules/rules-to-better-security/'