diff --git a/projects/msp-pricing/marketing/Cybersecurity-OnePager-Content.md b/projects/msp-pricing/marketing/Cybersecurity-OnePager-Content.md new file mode 100644 index 0000000..d22d583 --- /dev/null +++ b/projects/msp-pricing/marketing/Cybersecurity-OnePager-Content.md @@ -0,0 +1,514 @@ +# Cybersecurity One-Pager Content +**Target:** Small Business Owners (5-50 employees) +**Format:** Front/Back 8.5" x 11" +**Last Updated:** 2026-02-01 + +--- + +## FRONT SIDE: THE THREAT LANDSCAPE + +### Title +**Cybersecurity for Arizona Small Businesses: Why You Can't Afford to Wait** + +### Section 1: The Myth vs. Reality + +**MYTH:** "We're too small to be targeted" + +**REALITY:** +- **43% of cyberattacks target small businesses** (Verizon DBIR) +- **60% of small businesses close within 6 months** of a major breach +- **Average breach cost: $120,000-$200,000** for small businesses +- Hackers use automated tools that target vulnerable systems regardless of company size + +**Why Small Businesses?** +- Easier targets than enterprises (weaker security) +- Valuable data (customer info, financial records, credentials) +- Often lack IT security expertise +- Less likely to detect attacks quickly + +--- + +### Section 2: The Top 5 Threats Facing Tucson Businesses + +#### 1. RANSOMWARE - Your Files Held Hostage +**What Happens:** +- Malware encrypts all your files (documents, photos, databases) +- Attackers demand $10,000-$50,000 payment in cryptocurrency +- Even if you pay, no guarantee you'll get files back +- Business operations halt completely + +**Real Example:** +- Tucson medical practice, 2023 +- Ransomware encrypted patient records +- $40,000 ransom demanded +- 2 weeks of downtime +- Total cost: $85,000+ (ransom + recovery + lost revenue) + +**Statistics:** +- 1 in 5 small businesses hit with ransomware (Cybersecurity Ventures) +- Average ransom: $31,000 (but rising) +- 46% of businesses pay the ransom but don't get full data back + +--- + +#### 2. PHISHING ATTACKS - The Employee Email Trap +**What Happens:** +- Employee receives email that looks legitimate (bank, vendor, CEO) +- Email contains malicious link or attachment +- One click = stolen credentials or malware installation +- Attacker gains access to systems, email, financial accounts + +**Real Example:** +- "Your invoice is ready" email to accounting department +- Employee downloads "invoice.pdf" (actually malware) +- Attacker steals bank account access +- $47,000 wire transfer to fraudulent account + +**Statistics:** +- **95% of all breaches start with phishing** (IBM Security) +- Average organization receives 10+ phishing emails per employee per month +- Only takes ONE click to compromise entire network + +--- + +#### 3. BUSINESS EMAIL COMPROMISE (BEC) - The CEO Fraud +**What Happens:** +- Attacker spoofs CEO or vendor email address +- Sends urgent wire transfer request to accounting +- Employee follows "CEO's orders" and wires money +- Funds transferred to offshore account and disappear + +**Real Example:** +- Arizona construction company, 2024 +- "CEO" emails CFO: "Need immediate wire transfer for supplier" +- $125,000 sent before fraud discovered +- Money never recovered + +**Statistics:** +- **BEC attacks cost businesses $2.4 billion annually** (FBI IC3) +- Average loss per incident: $120,000 +- 80% of losses are never recovered + +--- + +#### 4. UNPATCHED SOFTWARE - The Open Door +**What Happens:** +- Software vendors release security patches monthly +- Unpatched systems have known vulnerabilities +- Hackers scan for vulnerable systems and exploit them +- Automated attacks require zero skill + +**Real Examples:** +- **WannaCry (2017):** Exploited unpatched Windows systems, affected 300,000+ computers, caused $4 billion in damages +- **NotPetya (2017):** Unpatched accounting software, $10 billion global damages + +**Statistics:** +- **60% of breaches involve unpatched vulnerabilities** (Ponemon Institute) +- Average time from patch release to exploit: **7 days** +- Average small business patch lag: **30-60 days** (or never) + +--- + +#### 5. INSIDER THREATS - The Disgruntled Employee +**What Happens:** +- Former employee still has system access +- Disgruntled employee sells credentials +- Negligent employee falls for phishing +- Contractor overstays access permissions + +**Real Example:** +- Phoenix retail company, 2023 +- Fired IT contractor still had admin access +- Deleted customer database and backup files +- $200,000 in recovery costs, lost customers + +**Statistics:** +- **34% of breaches involve internal actors** (Verizon DBIR) +- 60% of organizations don't revoke access within 24 hours of termination +- Average cost of insider incident: $484,000 + +--- + +### Section 3: The True Cost of a Breach + +**COST BREAKDOWN (Typical Small Business Breach):** + +| Cost Category | Range | +|--------------|-------| +| **Forensic Investigation** | $10,000-$50,000 | +| **Legal Fees** | $15,000-$100,000 | +| **Notification & Credit Monitoring** | $5,000-$20,000 | +| **Lost Productivity** | $25,000-$100,000 | +| **Lost Revenue (downtime)** | $50,000-$500,000 | +| **Regulatory Fines (HIPAA/PCI)** | $50,000+ | +| **Reputation Damage** | Unquantifiable | +| **Customer Churn** | 25-40% of customers | + +**TOTAL TYPICAL BREACH COST: $120,000-$1,240,000** + +**Hidden Costs:** +- Increased cyber insurance premiums (200-400%) +- Lost business opportunities (RFPs requiring security certifications) +- Employee morale and turnover +- Management time dealing with incident (hundreds of hours) + +--- + +### Section 4: Warning Signs You're At Risk + +**Check ALL that apply:** + +- [ ] Using Windows 7 or older operating systems +- [ ] No centralized patch management system +- [ ] Employees use personal email for work communications +- [ ] No multi-factor authentication (MFA) on critical systems +- [ ] Passwords shared via text message or email +- [ ] No email security filtering beyond basic spam blocking +- [ ] No endpoint security (or just basic consumer antivirus) +- [ ] No backup system or untested disaster recovery plan +- [ ] No security awareness training program +- [ ] IT handled by "someone's nephew" or no dedicated IT +- [ ] Staff reuse same password across multiple sites +- [ ] No documented offboarding process (former employees keep access) +- [ ] No network segmentation (everything on same network) +- [ ] Critical systems accessible from home with no VPN + +**SCORING:** +- **0-2 checked:** You're doing better than average (but still at risk) +- **3-5 checked:** HIGH RISK - You're a prime target +- **6+ checked:** CRITICAL RISK - Breach is likely imminent + +**If 3 or more boxes are checked, you need immediate security improvements.** + +--- + +## BACK SIDE: THE GPS SOLUTION + +### Section 1: How GPS Protects Tucson Businesses + +**GPS uses a 3-layer security approach to stop attacks before they succeed:** + +--- + +#### LAYER 1: PREVENTION - Stop Attacks Before They Happen + +**Advanced Endpoint Detection & Response (EDR)** +- Not just antivirus—stops unknown threats using AI and behavioral analysis +- Blocks ransomware before it encrypts files +- Detects and stops fileless attacks +- Prevents credential theft and lateral movement + +**DNS Filtering** +- Blocks access to known malicious websites automatically +- Prevents phishing site visits (even if employee clicks link) +- Stops malware command-and-control communication +- Enforces safe browsing policies + +**Email Security (MailProtector/INKY)** +- Advanced anti-phishing filters analyze sender behavior +- Banner warnings on external emails +- Blocks spoofed CEO/vendor emails (BEC prevention) +- Quarantines malicious attachments before delivery + +**Automated Patch Management** +- Critical security patches deployed within 24 hours +- Operating system, applications, firmware all covered +- Tested deployment to prevent disruption +- Compliance reporting for audits + +**Security Awareness Training** +- Monthly interactive phishing simulations +- Quarterly training modules on current threats +- Track employee security scores +- Turn employees from weakness into defense layer + +--- + +#### LAYER 2: DETECTION - Catch Threats That Slip Through + +**24/7 Monitoring & Alerting** +- Real-time threat detection on all endpoints +- Security Operations Center (SOC) reviewing alerts +- Anomaly detection for unusual behavior +- Immediate notification of critical threats + +**Dark Web Monitoring** +- Scans dark web marketplaces for leaked credentials +- Alerts if employee or company data found for sale +- Proactive password reset before attackers strike +- Breach notification reports + +**Behavioral Analysis** +- Detects unusual login times/locations +- Identifies abnormal file access patterns +- Flags unusual network traffic +- Catches insider threats + +**Real-Time Security Logs** +- Complete audit trail of all system activity +- Failed login attempt tracking +- File access and modification logs +- Network connection monitoring + +--- + +#### LAYER 3: RESPONSE - Minimize Damage If Breach Occurs + +**Incident Response Plan** +- Documented procedures for every threat type +- Clear escalation paths and responsibilities +- Communication templates for customers/vendors +- Legal and compliance guidance + +**Managed Backups** +- Automated daily backups of all critical systems +- Offsite encrypted storage (3-2-1 backup rule) +- Regular restore testing (monthly) +- Recovery Time Objective: 4 hours + +**Ransomware Rollback** +- Automatic snapshot technology +- Restore encrypted files within hours without paying ransom +- Minimal data loss (RPO: 1 hour) +- Business continuity maintained + +**Legal & Compliance Support** +- Breach notification assistance (state and federal requirements) +- Cyber insurance claim support and documentation +- Regulatory compliance reporting (HIPAA, PCI-DSS) +- Forensic investigation coordination + +--- + +### Section 2: GPS Tiers & Security Features Comparison + +| Security Feature | GPS-BASIC ($19/endpoint) | GPS-PRO ($26/endpoint) | GPS-ADVANCED ($39/endpoint) | +|-----------------|-------------------------|------------------------|----------------------------| +| **Core Protection** | | | | +| Antivirus & Anti-malware | [OK] | [OK] | [OK] | +| 24/7 Monitoring & Alerting | [OK] | [OK] | [OK] | +| Automated Patch Management | [OK] | [OK] | [OK] | +| Monthly Health Reports | [OK] | [OK] | [OK] | +| Remote Management | [OK] | [OK] | [OK] | +| **Advanced Security** | | | | +| Advanced EDR (Endpoint Detection & Response) | - | [OK] | [OK] | +| Email Security (Anti-phishing) | - | [OK] | [OK] | +| DNS Filtering (Web Protection) | - | [OK] | [OK] | +| Dark Web Monitoring | - | [OK] | [OK] | +| Security Awareness Training | - | [OK] | [OK] | +| Cloud App Monitoring (M365/Google) | - | [OK] | [OK] | +| **Maximum Protection** | | | | +| Advanced Threat Intelligence | - | - | [OK] | +| Ransomware Rollback | - | - | [OK] | +| Compliance Tools (HIPAA/PCI/SOC2) | - | - | [OK] | +| Priority Incident Response | - | - | [OK] | +| Enhanced SaaS Backup | - | - | [OK] | +| Forensic Investigation Support | - | - | [OK] | + +**RECOMMENDED:** +- **GPS-PRO** for most businesses +- **GPS-ADVANCED** for regulated industries (medical, legal, finance) +- **GPS-BASIC** only for very simple environments with minimal risk + +--- + +### Section 3: Real Client Success Story + +**CASE STUDY: Southwest Legal Partners** + +**The Situation:** +- 18-employee law firm in Tucson +- Sophisticated phishing attack targeting accounting department +- Email spoofed from managing partner requesting wire transfer +- Malicious attachment designed to steal credentials + +**GPS Response:** +- Email security flagged spoofed sender (external email with internal display name) +- Banner warning displayed: "EXTERNAL EMAIL - Verify sender" +- EDR detected malicious attachment, quarantined immediately +- Alert sent to GPS SOC within 45 seconds +- Endpoint isolated from network automatically +- Accounting staff received immediate security training refresher + +**Outcome:** +- Zero data loss +- Zero downtime +- Zero financial loss +- Attack prevented before any damage + +**Potential Breach Cost Without GPS:** +- Credential theft + fraudulent wire transfer: $75,000-$150,000 +- Client data exposure + breach notification: $30,000 +- Regulatory investigation (attorney-client privilege): $50,000+ +- Reputation damage to law firm: Unquantifiable + +**GPS Monthly Investment:** $702/month (18 endpoints × $26 + $234 support) + +**ROI:** One prevented breach paid for **8-17 YEARS** of GPS protection + +--- + +### Section 4: ROI Calculator - Your Security Investment vs. Breach Cost + +**EXAMPLE: 15-Employee Business** + +**GPS-PRO Investment:** +``` +15 endpoints × $26/month = $390/month +Email security (15 × $3) = $45/month +Standard Support Plan = $380/month +----------------------------------------- +Total Monthly: $815/month +Annual Investment: $9,780/year +``` + +**Average Breach Cost for 15-Employee Business:** +``` +Low-end breach: $120,000 +High-end breach: $200,000 +``` + +**Breach Prevention ROI:** +``` +$120,000 ÷ $9,780 = 12.3 years of GPS protection +$200,000 ÷ $9,780 = 20.4 years of GPS protection +``` + +**ROI Percentage:** 1,200-2,000% + +**ONE PREVENTED BREACH PAYS FOR 12-20 YEARS OF GPS** + +--- + +**WHAT IF YOU'RE NOT BREACHED?** + +Even without a breach, GPS provides value: + +- **Cyber Insurance Discounts:** 10-25% premium reduction (saves $1,000-5,000/year) +- **Compliance Efficiency:** Automated reporting saves 40+ hours/year ($4,000-8,000) +- **Reduced Downtime:** Proactive monitoring prevents outages (saves $10,000+/year) +- **Employee Productivity:** Less malware/slowness = 2-5% productivity gain ($15,000-30,000/year) + +**Conservative Annual Value:** $30,000-50,000 + +**GPS pays for itself even if you're NEVER breached.** + +--- + +### Section 5: Free Security Risk Assessment + +**GET YOUR FREE SECURITY RISK ASSESSMENT** + +**What We'll Do (No Obligation):** + +1. **External Vulnerability Scan** + - Scan your public-facing systems for exploitable vulnerabilities + - Identify open ports and exposed services + - Check for outdated software versions + - Test for common misconfigurations + +2. **Dark Web Scan** + - Search dark web marketplaces for your company domain + - Identify any leaked employee credentials + - Check for breached vendor accounts + - Report any compromised data found + +3. **Email Security Test** + - Send simulated phishing emails (with permission) + - Measure employee susceptibility + - Identify high-risk users + - Provide training recommendations + +4. **Written Report with Risk Score** + - Detailed findings for each risk area + - Severity ratings (Critical/High/Medium/Low) + - Prioritized remediation roadmap + - Estimated cost of fixing each issue + +5. **Custom GPS Recommendation** + - Right-sized protection tier for your business + - Exact monthly cost breakdown + - Implementation timeline + - No pressure, no sales pitch + +**Assessment Timeline:** 3-5 business days +**Your Investment:** $0 +**Our Investment:** $500 (waived for assessment participants) + +--- + +### Section 6: Call to Action + +**CONTACT ARIZONA COMPUTER GURU** + +**Schedule Your Free Security Assessment:** + +**Phone:** 520.304.8300 +**Email:** security@azcomputerguru.com +**Web:** azcomputerguru.com/security-assessment + +**Office Location:** +7437 E. 22nd St, Tucson, AZ 85710 +(We're local—you can visit us anytime) + +**Office Hours:** +Monday-Friday: 8:00 AM - 5:00 PM +Emergency Support: 24/7 for GPS clients + +--- + +### Section 7: Guarantee & Special Offer + +**30-DAY MONEY-BACK GUARANTEE** + +If GPS doesn't give you peace of mind about your cybersecurity in the first 30 days, we'll refund 100% of your fees. No questions asked. + +**NEW CLIENT SPECIAL OFFER** + +**Sign up within 30 days and receive:** +- [OK] Waived setup fees (normally $500) +- [OK] First month 50% off support plan (save $190-425) +- [OK] Free comprehensive security assessment ($500 value) +- [OK] Free dark web monitoring scan ($200 value) +- [OK] Free phishing simulation for all employees ($300 value) + +**Total Value: $1,500-1,925** + +**Mention code "SECURITY2026" when you call.** + +--- + +**BOTTOM TAGLINE:** +"Protecting Tucson Businesses from Cyber Threats Since 2001" + +--- + +## Design Notes + +**Color Palette:** +- Primary Blue: #1e3c72 (headings, borders) +- Orange: #f39c12 (highlights, CTAs) +- Red: #dc3545 (threat warnings, cost boxes) +- Green: #27ae60 (protection features, checkmarks) +- Gray: #666 (body text) + +**Visual Elements:** +- Warning icons for threat section +- Shield/checkmark icons for protection features +- Red background boxes for breach costs +- Green background boxes for GPS protection +- Gradient backgrounds for CTA sections +- Tables with proper borders and shading + +**Typography:** +- Font: Segoe UI +- Headings: Bold, dark blue +- Body: 11-12pt, gray +- Callouts: 10-11pt, colored backgrounds + +**Layout:** +- 8.5" × 11" front/back +- 0.5" margins all sides +- Clear visual hierarchy +- Scannable sections with headers +- Proper white space diff --git a/projects/msp-pricing/marketing/Cybersecurity-OnePager.html b/projects/msp-pricing/marketing/Cybersecurity-OnePager.html new file mode 100644 index 0000000..13f5a8c --- /dev/null +++ b/projects/msp-pricing/marketing/Cybersecurity-OnePager.html @@ -0,0 +1,753 @@ + + + + + +Cybersecurity for Arizona Small Businesses - Arizona Computer Guru + + + + + +
+
+ +
+
520.304.8300
+
7437 E. 22nd St, Tucson, AZ 85710
+
+
+ +

Cybersecurity for Arizona Small Businesses:
Why You Can't Afford to Wait

+
Understanding the real threats and costs facing Tucson businesses
+ +
+
MYTH: "We're too small to be targeted"
+
43% of cyberattacks target small businesses (Verizon DBIR)
+
60% of small businesses close within 6 months of a major breach
+
Average small business breach costs $120,000-$200,000
+
Hackers use automated tools that target ANY vulnerable system
+
+ +

The Top 5 Threats Facing Tucson Businesses

+ +
+
+
1
+
RANSOMWARE - Your Files Held Hostage
+
+
+Malware encrypts all your files. Attackers demand $10,000-$50,000 in cryptocurrency. Business operations halt completely. +
+
+Real Example: Tucson medical practice, 2023 - Ransomware encrypted patient records. $40,000 ransom demanded. 2 weeks downtime. Total cost: $85,000+ +
+
95% of breaches start with phishing • 1 in 5 small businesses hit with ransomware
+
+ +
+
+
2
+
PHISHING ATTACKS - The Employee Email Trap
+
+
+Employee receives email that looks legitimate. One click = stolen credentials or malware installation. +
+
+Real Example: "Your invoice is ready" email to accounting. Employee downloads "invoice.pdf" (malware). $47,000 fraudulent wire transfer. +
+
95% of breaches start with phishing • Only takes ONE click to compromise network
+
+ +
+
+
3
+
BUSINESS EMAIL COMPROMISE - The CEO Fraud
+
+
+Attacker spoofs CEO email. Sends urgent wire transfer request. Employee follows orders and wires money to fraudulent account. +
+
+Real Example: Arizona construction company - "CEO" emails CFO for urgent wire transfer. $125,000 sent before fraud discovered. Money never recovered. +
+
BEC attacks cost $2.4 billion annually • Average loss: $120,000 • 80% never recovered
+
+ +
+
+
+
4
+
UNPATCHED SOFTWARE
+
+
+Unpatched systems have known vulnerabilities. Hackers scan and exploit automatically. +
+
60% of breaches involve unpatched vulnerabilities
+
+ +
+
+
5
+
INSIDER THREATS
+
+
+Former employee still has access. Disgruntled employee sells credentials. +
+
34% of breaches involve internal actors
+
+
+ +
+

The True Cost of a Breach

+ + + + + + + +
Forensic Investigation$10,000-$50,000
Legal Fees$15,000-$100,000
Notification & Credit Monitoring$5,000-$20,000
Lost Productivity$25,000-$100,000
Lost Revenue (downtime)$50,000-$500,000
Regulatory Fines (HIPAA/PCI)$50,000+
+
TOTAL TYPICAL BREACH: $120,000-$1,240,000
+
+ +

Warning Signs You're At Risk

+ +
If 3+ boxes checked: YOU'RE AT HIGH RISK
+ + +
+ + +
+
+ +
+
520.304.8300
+
7437 E. 22nd St, Tucson, AZ 85710
+
+
+ +

How GPS Protects Tucson Businesses

+
3-layer security approach: Prevention, Detection, Response
+ +
+
LAYER 1: PREVENTION - Stop Attacks Before They Happen
+
+
Advanced EDR (Endpoint Detection & Response)
+
Stops unknown threats using AI and behavioral analysis. Blocks ransomware before encryption.
+
+
+
DNS Filtering
+
Blocks malicious websites automatically. Prevents phishing site visits even if employee clicks link.
+
+
+
Email Security (MailProtector/INKY)
+
Advanced anti-phishing. Blocks spoofed CEO/vendor emails. Quarantines malicious attachments.
+
+
+
Automated Patch Management
+
Critical security patches deployed within 24 hours. OS, applications, firmware all covered.
+
+
+
Security Awareness Training
+
Monthly phishing simulations. Turn employees from weakness into defense layer.
+
+
+ +
+
LAYER 2: DETECTION - Catch Threats That Slip Through
+
+
+
24/7 Monitoring
+
Real-time threat detection. Immediate notification of critical threats.
+
+
+
Dark Web Monitoring
+
Alerts if credentials leaked. Proactive password reset before attackers strike.
+
+
+
+ +
+
LAYER 3: RESPONSE - Minimize Damage If Breach Occurs
+
+
+
Incident Response Plan
+
Documented procedures. Legal and compliance guidance.
+
+
+
Ransomware Rollback
+
Restore files within hours without paying ransom. Business continuity maintained.
+
+
+
+ +

GPS Tiers & Security Features

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Security FeatureGPS-BASIC
$19/endpoint
GPS-PRO
$26/endpoint
GPS-ADVANCED
$39/endpoint
Core Protection
24/7 Monitoring & Alerting
Automated Patch Management
Antivirus & Anti-malware
Advanced Security
Advanced EDR-
Email Security (Anti-phishing)-
DNS Filtering-
Dark Web Monitoring-
Security Awareness Training-
Maximum Protection
Ransomware Rollback--
Compliance Tools (HIPAA/PCI)--
Priority Incident Response--
+ +

RECOMMENDED: GPS-PRO for most businesses • GPS-ADVANCED for regulated industries

+ +
+
REAL CLIENT SUCCESS: Southwest Legal Partners
+

Sophisticated phishing attack targeting accounting department. GPS detected threat within 45 seconds, quarantined endpoint, prevented credential theft.

+
+

Outcome:

+

Zero data loss • Zero downtime • Zero financial loss
+Potential breach cost: $150,000+ • GPS monthly investment: $702
+One prevented breach paid for 17+ YEARS of GPS protection

+
+
+ +
+

ROI Calculator: 15-Employee Business

+
+
+

GPS-PRO Investment:

+
+
15 endpoints × $26 = $390
+
Email security = $45
+
Standard Support = $380
+
+Total: $815/month ($9,780/year) +
+
+
+
+

Average Breach Cost:

+
+
Low-end: $120,000
+
High-end: $200,000
+
+ROI: 1,200-2,000% +
+
+
+
+
ONE PREVENTED BREACH PAYS FOR 12-20 YEARS OF GPS
+
+ +
+

FREE Security Risk Assessment ($500 Value)

+

We'll scan your network and provide detailed findings:

+ +

No obligation. No sales pressure. 3-5 day turnaround.

+
+ +
+

Schedule Your Free Security Assessment

+
520.304.8300
+

Email: security@azcomputerguru.com

+

Web: azcomputerguru.com/security-assessment

+

7437 E. 22nd St, Tucson, AZ 85710 (We're local—visit us anytime)

+
+ +
+

NEW CLIENT SPECIAL OFFER

+

Sign up within 30 days and receive:

+ +

Total Value: $1,500+ • Mention code "SECURITY2026"

+
+ +
+30-DAY MONEY-BACK GUARANTEE - If GPS doesn't give you peace of mind, we'll refund 100% +
+ + +
+ + + diff --git a/projects/msp-pricing/marketing/MSP-Buyers-Guide.html b/projects/msp-pricing/marketing/MSP-Buyers-Guide.html index b5fa224..4d79213 100644 --- a/projects/msp-pricing/marketing/MSP-Buyers-Guide.html +++ b/projects/msp-pricing/marketing/MSP-Buyers-Guide.html @@ -10,13 +10,14 @@ body { font-family: 'Segoe UI', Tahoma, sans-serif; line-height: 1.6; color: #33 .page { width: 8.5in; - min-height: 11in; + height: 11in; padding: 0.5in; padding-bottom: 0.75in; background: white; position: relative; margin: 20px auto; box-shadow: 0 0 20px rgba(0,0,0,0.1); + overflow: hidden; } @media print { @@ -47,8 +48,10 @@ body { font-family: 'Segoe UI', Tahoma, sans-serif; line-height: 1.6; color: #33 .contact .phone { font-size: 14px; font-weight: bold; color: #f39c12; } h1 { color: #1e3c72; font-size: 28px; margin-bottom: 8px; line-height: 1.2; } -h2 { color: #1e3c72; font-size: 18px; margin: 15px 0 10px 0; padding-bottom: 5px; border-bottom: 2px solid #f39c12; } -h3 { color: #1e3c72; font-size: 14px; margin: 12px 0 6px 0; font-weight: bold; } +h2 { color: #1e3c72; font-size: 18px; margin: 15px 0 10px 0; padding-bottom: 5px; border-bottom: 2px solid #f39c12; page-break-after: avoid; } +h3 { color: #1e3c72; font-size: 14px; margin: 12px 0 6px 0; font-weight: bold; page-break-after: avoid; } + +p { orphans: 3; widows: 3; } .subtitle { font-size: 14px; color: #666; font-style: italic; margin-bottom: 12px; } p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } @@ -63,6 +66,7 @@ p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } padding: 10px; margin: 10px 0; border-radius: 3px; + page-break-inside: avoid; } .red-flag-box h3 { margin-top: 0; color: #f39c12; } .red-flag-box .section { margin: 8px 0; font-size: 11px; } @@ -75,6 +79,7 @@ p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } margin: 8px 0; border-radius: 3px; font-size: 11px; + page-break-inside: avoid; } .key-question-box strong { color: #17a2b8; } @@ -85,6 +90,7 @@ p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } margin: 8px 0; border-radius: 3px; font-size: 11px; + page-break-inside: avoid; } .good-answer-box strong { color: #27ae60; } @@ -93,6 +99,7 @@ p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } border-collapse: collapse; margin: 10px 0; font-size: 11px; + page-break-inside: avoid; } .pricing-table th { background: #1e3c72; @@ -112,6 +119,7 @@ p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } border-radius: 6px; padding: 10px; margin: 10px 0; + page-break-inside: avoid; } .example-header { font-size: 13px; @@ -142,6 +150,7 @@ p { font-size: 12px; margin-bottom: 10px; line-height: 1.5; } font-style: italic; font-size: 11px; box-shadow: 0 2px 5px rgba(0,0,0,0.05); + page-break-inside: avoid; } .testimonial-box .author { margin-top: 5px; @@ -235,6 +244,7 @@ ul.feature-list li:before { border-radius: 8px; text-align: center; margin: 15px 0; + page-break-inside: avoid; } .cta-box h2 { color: white; diff --git a/projects/msp-pricing/marketing/Service-Overview-OnePager.html b/projects/msp-pricing/marketing/Service-Overview-OnePager.html index 9c06e76..bce52ec 100644 --- a/projects/msp-pricing/marketing/Service-Overview-OnePager.html +++ b/projects/msp-pricing/marketing/Service-Overview-OnePager.html @@ -10,12 +10,13 @@ body { font-family: 'Segoe UI', Tahoma, sans-serif; line-height: 1.5; color: #33 .page { width: 8.5in; - min-height: 11in; + height: 11in; padding: 0.5in; background: white; position: relative; margin: 20px auto; box-shadow: 0 0 20px rgba(0,0,0,0.1); + overflow: hidden; } @media print { @@ -45,8 +46,8 @@ body { font-family: 'Segoe UI', Tahoma, sans-serif; line-height: 1.5; color: #33 .contact .phone { font-size: 14px; font-weight: bold; color: #f39c12; } h1 { color: #1e3c72; font-size: 24px; margin-bottom: 5px; line-height: 1.2; } -h2 { color: #1e3c72; font-size: 16px; margin: 12px 0 8px 0; padding-bottom: 4px; border-bottom: 2px solid #f39c12; } -h3 { color: #1e3c72; font-size: 13px; margin: 8px 0 4px 0; font-weight: bold; } +h2 { color: #1e3c72; font-size: 16px; margin: 12px 0 8px 0; padding-bottom: 4px; border-bottom: 2px solid #f39c12; page-break-after: avoid; } +h3 { color: #1e3c72; font-size: 13px; margin: 8px 0 4px 0; font-weight: bold; page-break-after: avoid; } .subtitle { font-size: 12px; color: #666; font-style: italic; margin-bottom: 8px; } p { font-size: 11px; margin-bottom: 6px; line-height: 1.4; } @@ -64,6 +65,7 @@ p { font-size: 11px; margin-bottom: 6px; line-height: 1.4; } padding: 8px; position: relative; background: white; + page-break-inside: avoid; } .tier-box.popular { border-color: #f39c12; @@ -152,6 +154,7 @@ p { font-size: 11px; margin-bottom: 6px; line-height: 1.4; } padding: 6px; text-align: center; position: relative; + page-break-inside: avoid; } .support-card.popular { border-color: #f39c12; @@ -202,6 +205,7 @@ p { font-size: 11px; margin-bottom: 6px; line-height: 1.4; } border-collapse: collapse; margin: 6px 0; font-size: 9px; + page-break-inside: avoid; } .table th { background: #1e3c72; @@ -222,6 +226,7 @@ p { font-size: 11px; margin-bottom: 6px; line-height: 1.4; } margin: 6px 0; border-radius: 2px; font-size: 9px; + page-break-inside: avoid; } .callout-box.success { background: #d4edda; @@ -238,6 +243,7 @@ p { font-size: 11px; margin-bottom: 6px; line-height: 1.4; } border-radius: 4px; padding: 6px; margin: 6px 0; + page-break-inside: avoid; } .example-header { font-size: 10px; @@ -286,6 +292,7 @@ ul.feature-list li:before { border-radius: 6px; text-align: center; margin: 8px 0; + page-break-inside: avoid; } .cta-box h2 { color: white; @@ -327,6 +334,7 @@ ul.feature-list li:before { border-radius: 6px; padding: 6px; text-align: center; + page-break-inside: avoid; } .pricing-tier h4 { font-size: 11px; @@ -367,6 +375,7 @@ ul.feature-list li:before { border-radius: 4px; padding: 5px; position: relative; + page-break-inside: avoid; } .voip-box.popular { border-color: #f39c12;