Files
claudetools/projects/msp-pricing/marketing/Cybersecurity-OnePager.html
Mike Swanson 59797e667b fix(msp-pricing): Fix page breaks in all marketing HTML files
- Fix MSP-Buyers-Guide.html page overflow issues
- Fix Service-Overview-OnePager.html content breaks
- Add Cybersecurity-OnePager.html with proper page breaks
- Set exact page height (11in) to prevent overflow
- Add page-break-inside: avoid to all content boxes
- Protect tables, callouts, examples from splitting
- Add header/paragraph orphan/widow protection
- All files now print cleanly without content overrun

Changes:
- Page containers: exact 11in height with overflow hidden
- Content boxes: page-break-inside: avoid
- Headers: page-break-after: avoid
- Paragraphs: orphans/widows protection
- Tables: stay together on single pages

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-02-01 17:26:08 -07:00

754 lines
22 KiB
HTML
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cybersecurity for Arizona Small Businesses - Arizona Computer Guru</title>
<style>
* { margin: 0; padding: 0; box-sizing: border-box; }
body { font-family: 'Segoe UI', Tahoma, sans-serif; line-height: 1.5; color: #333; background: #f5f5f5; }
.page {
width: 8.5in;
height: 11in;
padding: 0.5in;
padding-bottom: 0.75in;
background: white;
position: relative;
margin: 20px auto;
box-shadow: 0 0 20px rgba(0,0,0,0.1);
overflow: hidden;
}
@media print {
@page { size: letter; margin: 0; }
body { margin: 0; padding: 0; background: white; }
.page {
width: 100%;
height: 100vh;
margin: 0;
padding: 0.5in;
padding-bottom: 0.75in;
page-break-after: always;
box-shadow: none;
}
.page:last-child { page-break-after: auto; }
}
.header {
display: flex;
justify-content: space-between;
align-items: center;
padding-bottom: 10px;
border-bottom: 3px solid #1e3c72;
margin-bottom: 12px;
}
.logo { font-size: 20px; font-weight: bold; color: #1e3c72; }
.contact { text-align: right; font-size: 10px; color: #666; }
.contact .phone { font-size: 14px; font-weight: bold; color: #f39c12; }
h1 { color: #1e3c72; font-size: 24px; margin-bottom: 6px; line-height: 1.2; }
h2 { color: #1e3c72; font-size: 16px; margin: 12px 0 8px 0; padding-bottom: 5px; border-bottom: 2px solid #f39c12; page-break-after: avoid; }
h3 { color: #1e3c72; font-size: 13px; margin: 10px 0 5px 0; font-weight: bold; page-break-after: avoid; }
h4 { color: #dc3545; font-size: 12px; margin: 8px 0 4px 0; font-weight: bold; page-break-after: avoid; }
p { orphans: 3; widows: 3; }
.subtitle { font-size: 13px; color: #666; font-style: italic; margin-bottom: 10px; }
p { font-size: 11px; margin-bottom: 8px; line-height: 1.5; }
.myth-reality-box {
background: #fff3cd;
border-left: 4px solid #f39c12;
padding: 10px;
margin: 10px 0;
border-radius: 4px;
page-break-inside: avoid;
}
.myth { font-weight: bold; color: #dc3545; font-size: 12px; margin-bottom: 6px; }
.reality { font-size: 11px; margin: 3px 0; padding-left: 15px; position: relative; }
.reality:before { content: "✓"; position: absolute; left: 0; color: #27ae60; font-weight: bold; }
.threat-box {
background: #f8d7da;
border: 2px solid #dc3545;
border-radius: 6px;
padding: 10px;
margin: 10px 0;
page-break-inside: avoid;
}
.threat-header {
display: flex;
align-items: center;
gap: 8px;
margin-bottom: 6px;
}
.threat-icon {
width: 24px;
height: 24px;
background: #dc3545;
color: white;
border-radius: 50%;
display: flex;
align-items: center;
justify-content: center;
font-weight: bold;
font-size: 14px;
}
.threat-title {
font-size: 13px;
font-weight: bold;
color: #dc3545;
}
.threat-content { font-size: 10px; margin: 4px 0; }
.threat-example {
background: rgba(220, 53, 69, 0.1);
padding: 6px;
margin: 6px 0;
border-radius: 3px;
font-size: 10px;
font-style: italic;
}
.threat-stats {
font-size: 10px;
font-weight: bold;
color: #dc3545;
margin-top: 4px;
}
.cost-box {
background: linear-gradient(135deg, #dc3545 0%, #c82333 100%);
color: white;
padding: 12px;
border-radius: 6px;
margin: 10px 0;
page-break-inside: avoid;
}
.cost-box h2 {
color: white;
border-bottom: 2px solid white;
margin-top: 0;
}
.cost-table {
width: 100%;
margin: 8px 0;
border-collapse: collapse;
font-size: 10px;
}
.cost-table td {
padding: 4px;
border-bottom: 1px solid rgba(255,255,255,0.3);
}
.cost-table td:first-child { font-weight: 600; }
.cost-table td:last-child { text-align: right; }
.cost-total {
font-size: 14px;
font-weight: bold;
margin-top: 8px;
padding-top: 8px;
border-top: 2px solid white;
text-align: center;
}
.checklist {
columns: 2;
column-gap: 15px;
list-style: none;
padding: 0;
margin: 8px 0;
page-break-inside: avoid;
}
.checklist li {
padding: 3px 0;
padding-left: 18px;
position: relative;
font-size: 10px;
break-inside: avoid;
}
.checklist li:before {
content: "☐";
position: absolute;
left: 0;
color: #dc3545;
font-size: 12px;
}
.risk-score-box {
background: #dc3545;
color: white;
padding: 8px;
border-radius: 4px;
text-align: center;
font-weight: bold;
font-size: 12px;
margin: 8px 0;
page-break-inside: avoid;
}
.protection-layer {
background: #d4edda;
border-left: 4px solid #27ae60;
padding: 10px;
margin: 10px 0;
border-radius: 4px;
page-break-inside: avoid;
}
.layer-header {
font-size: 13px;
font-weight: bold;
color: #27ae60;
margin-bottom: 6px;
}
.feature-item {
margin: 6px 0;
}
.feature-name {
font-weight: bold;
color: #1e3c72;
font-size: 11px;
}
.feature-desc {
font-size: 10px;
margin-left: 15px;
color: #666;
}
.comparison-table {
width: 100%;
border-collapse: collapse;
margin: 10px 0;
font-size: 9px;
page-break-inside: avoid;
}
.comparison-table th {
background: #1e3c72;
color: white;
padding: 6px 4px;
text-align: center;
font-size: 10px;
border: 1px solid white;
}
.comparison-table td {
padding: 5px 4px;
border: 1px solid #e0e0e0;
text-align: center;
}
.comparison-table td:first-child {
text-align: left;
font-weight: 600;
background: #f8f9fa;
}
.comparison-table .section-header {
background: #e9ecef;
font-weight: bold;
text-align: left;
color: #1e3c72;
}
.checkmark { color: #27ae60; font-weight: bold; font-size: 14px; }
.dash { color: #999; }
.case-study-box {
background: white;
border: 3px solid #27ae60;
border-radius: 8px;
padding: 12px;
margin: 10px 0;
box-shadow: 0 4px 10px rgba(0,0,0,0.1);
page-break-inside: avoid;
}
.case-study-header {
background: #27ae60;
color: white;
padding: 8px;
margin: -12px -12px 10px -12px;
border-radius: 5px 5px 0 0;
font-size: 13px;
font-weight: bold;
}
.case-outcome {
background: #d4edda;
padding: 8px;
border-radius: 4px;
margin: 8px 0;
}
.case-outcome h4 {
color: #27ae60;
margin: 0 0 4px 0;
}
.roi-calculator {
background: linear-gradient(135deg, #1e3c72 0%, #2a5298 100%);
color: white;
padding: 12px;
border-radius: 8px;
margin: 10px 0;
page-break-inside: avoid;
}
.roi-calculator h2 {
color: white;
border-bottom: 2px solid #f39c12;
}
.roi-grid {
display: grid;
grid-template-columns: 1fr 1fr;
gap: 12px;
margin: 10px 0;
}
.roi-card {
background: rgba(255,255,255,0.15);
padding: 10px;
border-radius: 6px;
}
.roi-card h4 {
color: white;
margin: 0 0 6px 0;
font-size: 11px;
}
.roi-breakdown {
font-size: 10px;
font-family: 'Courier New', monospace;
}
.roi-breakdown div {
margin: 2px 0;
}
.roi-total {
font-size: 14px;
font-weight: bold;
margin-top: 8px;
padding-top: 8px;
border-top: 1px solid rgba(255,255,255,0.3);
text-align: center;
}
.assessment-box {
background: #d1ecf1;
border: 2px solid #17a2b8;
border-radius: 8px;
padding: 12px;
margin: 10px 0;
page-break-inside: avoid;
}
.assessment-box h3 {
color: #17a2b8;
margin-top: 0;
}
.assessment-list {
list-style: none;
padding: 0;
margin: 8px 0;
}
.assessment-list li {
padding: 4px 0;
padding-left: 20px;
position: relative;
font-size: 10px;
}
.assessment-list li:before {
content: "✓";
position: absolute;
left: 0;
color: #17a2b8;
font-weight: bold;
font-size: 12px;
}
.cta-box {
background: linear-gradient(135deg, #f39c12 0%, #e67e22 100%);
color: white;
padding: 15px;
border-radius: 8px;
text-align: center;
margin: 12px 0;
page-break-inside: avoid;
}
.cta-box h2 {
color: white;
border: none;
margin: 0 0 8px 0;
font-size: 16px;
}
.phone-large {
font-size: 24px;
font-weight: bold;
margin: 8px 0;
}
.cta-box p {
font-size: 12px;
margin: 5px 0;
}
.guarantee-box {
background: #27ae60;
color: white;
padding: 10px;
border-radius: 6px;
text-align: center;
margin: 10px 0;
font-weight: bold;
font-size: 12px;
page-break-inside: avoid;
}
.offer-box {
background: #fff3cd;
border: 2px solid #f39c12;
border-radius: 8px;
padding: 12px;
margin: 10px 0;
page-break-inside: avoid;
}
.offer-box h3 {
color: #f39c12;
margin-top: 0;
}
.offer-list {
list-style: none;
padding: 0;
margin: 8px 0;
}
.offer-list li {
padding: 3px 0;
padding-left: 20px;
position: relative;
font-size: 11px;
}
.offer-list li:before {
content: "[OK]";
position: absolute;
left: 0;
color: #27ae60;
font-weight: bold;
font-size: 9px;
}
.footer {
position: absolute;
bottom: 0.4in;
left: 0.5in;
right: 0.5in;
text-align: center;
padding-top: 8px;
border-top: 2px solid #1e3c72;
color: #666;
font-size: 9px;
background: white;
}
.two-column {
display: grid;
grid-template-columns: 1fr 1fr;
gap: 12px;
}
ul.bullet-list {
margin: 5px 0;
padding-left: 15px;
font-size: 10px;
}
ul.bullet-list li {
margin: 2px 0;
}
</style>
</head>
<body>
<!-- FRONT SIDE: THE THREAT LANDSCAPE -->
<div class="page">
<div class="header">
<div class="logo">Arizona Computer Guru</div>
<div class="contact">
<div class="phone">520.304.8300</div>
<div>7437 E. 22nd St, Tucson, AZ 85710</div>
</div>
</div>
<h1>Cybersecurity for Arizona Small Businesses:<br>Why You Can't Afford to Wait</h1>
<div class="subtitle">Understanding the real threats and costs facing Tucson businesses</div>
<div class="myth-reality-box">
<div class="myth">MYTH: "We're too small to be targeted"</div>
<div class="reality">43% of cyberattacks target small businesses (Verizon DBIR)</div>
<div class="reality">60% of small businesses close within 6 months of a major breach</div>
<div class="reality">Average small business breach costs $120,000-$200,000</div>
<div class="reality">Hackers use automated tools that target ANY vulnerable system</div>
</div>
<h2>The Top 5 Threats Facing Tucson Businesses</h2>
<div class="threat-box">
<div class="threat-header">
<div class="threat-icon">1</div>
<div class="threat-title">RANSOMWARE - Your Files Held Hostage</div>
</div>
<div class="threat-content">
Malware encrypts all your files. Attackers demand $10,000-$50,000 in cryptocurrency. Business operations halt completely.
</div>
<div class="threat-example">
<strong>Real Example:</strong> Tucson medical practice, 2023 - Ransomware encrypted patient records. $40,000 ransom demanded. 2 weeks downtime. Total cost: $85,000+
</div>
<div class="threat-stats">95% of breaches start with phishing • 1 in 5 small businesses hit with ransomware</div>
</div>
<div class="threat-box">
<div class="threat-header">
<div class="threat-icon">2</div>
<div class="threat-title">PHISHING ATTACKS - The Employee Email Trap</div>
</div>
<div class="threat-content">
Employee receives email that looks legitimate. One click = stolen credentials or malware installation.
</div>
<div class="threat-example">
<strong>Real Example:</strong> "Your invoice is ready" email to accounting. Employee downloads "invoice.pdf" (malware). $47,000 fraudulent wire transfer.
</div>
<div class="threat-stats">95% of breaches start with phishing • Only takes ONE click to compromise network</div>
</div>
<div class="threat-box">
<div class="threat-header">
<div class="threat-icon">3</div>
<div class="threat-title">BUSINESS EMAIL COMPROMISE - The CEO Fraud</div>
</div>
<div class="threat-content">
Attacker spoofs CEO email. Sends urgent wire transfer request. Employee follows orders and wires money to fraudulent account.
</div>
<div class="threat-example">
<strong>Real Example:</strong> Arizona construction company - "CEO" emails CFO for urgent wire transfer. $125,000 sent before fraud discovered. Money never recovered.
</div>
<div class="threat-stats">BEC attacks cost $2.4 billion annually • Average loss: $120,000 • 80% never recovered</div>
</div>
<div class="two-column" style="margin-top: 10px;">
<div class="threat-box" style="margin: 0;">
<div class="threat-header">
<div class="threat-icon">4</div>
<div class="threat-title" style="font-size: 11px;">UNPATCHED SOFTWARE</div>
</div>
<div class="threat-content">
Unpatched systems have known vulnerabilities. Hackers scan and exploit automatically.
</div>
<div class="threat-stats" style="font-size: 9px;">60% of breaches involve unpatched vulnerabilities</div>
</div>
<div class="threat-box" style="margin: 0;">
<div class="threat-header">
<div class="threat-icon">5</div>
<div class="threat-title" style="font-size: 11px;">INSIDER THREATS</div>
</div>
<div class="threat-content">
Former employee still has access. Disgruntled employee sells credentials.
</div>
<div class="threat-stats" style="font-size: 9px;">34% of breaches involve internal actors</div>
</div>
</div>
<div class="cost-box">
<h2>The True Cost of a Breach</h2>
<table class="cost-table">
<tr><td>Forensic Investigation</td><td>$10,000-$50,000</td></tr>
<tr><td>Legal Fees</td><td>$15,000-$100,000</td></tr>
<tr><td>Notification & Credit Monitoring</td><td>$5,000-$20,000</td></tr>
<tr><td>Lost Productivity</td><td>$25,000-$100,000</td></tr>
<tr><td>Lost Revenue (downtime)</td><td>$50,000-$500,000</td></tr>
<tr><td>Regulatory Fines (HIPAA/PCI)</td><td>$50,000+</td></tr>
</table>
<div class="cost-total">TOTAL TYPICAL BREACH: $120,000-$1,240,000</div>
</div>
<h2>Warning Signs You're At Risk</h2>
<ul class="checklist">
<li>Using Windows 7 or older systems</li>
<li>No centralized patch management</li>
<li>Employees use personal email for work</li>
<li>No multi-factor authentication (MFA)</li>
<li>Passwords shared via text/email</li>
<li>No email security filtering</li>
<li>No endpoint security (or just basic antivirus)</li>
<li>No backup or disaster recovery plan</li>
<li>No security awareness training</li>
<li>IT handled by "someone's nephew"</li>
</ul>
<div class="risk-score-box">If 3+ boxes checked: YOU'RE AT HIGH RISK</div>
<div class="footer">Protecting Tucson Businesses Since 2001 | Turn over to see how GPS protects your business</div>
</div>
<!-- BACK SIDE: THE GPS SOLUTION -->
<div class="page">
<div class="header">
<div class="logo">Arizona Computer Guru</div>
<div class="contact">
<div class="phone">520.304.8300</div>
<div>7437 E. 22nd St, Tucson, AZ 85710</div>
</div>
</div>
<h1>How GPS Protects Tucson Businesses</h1>
<div class="subtitle">3-layer security approach: Prevention, Detection, Response</div>
<div class="protection-layer">
<div class="layer-header">LAYER 1: PREVENTION - Stop Attacks Before They Happen</div>
<div class="feature-item">
<div class="feature-name">Advanced EDR (Endpoint Detection & Response)</div>
<div class="feature-desc">Stops unknown threats using AI and behavioral analysis. Blocks ransomware before encryption.</div>
</div>
<div class="feature-item">
<div class="feature-name">DNS Filtering</div>
<div class="feature-desc">Blocks malicious websites automatically. Prevents phishing site visits even if employee clicks link.</div>
</div>
<div class="feature-item">
<div class="feature-name">Email Security (MailProtector/INKY)</div>
<div class="feature-desc">Advanced anti-phishing. Blocks spoofed CEO/vendor emails. Quarantines malicious attachments.</div>
</div>
<div class="feature-item">
<div class="feature-name">Automated Patch Management</div>
<div class="feature-desc">Critical security patches deployed within 24 hours. OS, applications, firmware all covered.</div>
</div>
<div class="feature-item">
<div class="feature-name">Security Awareness Training</div>
<div class="feature-desc">Monthly phishing simulations. Turn employees from weakness into defense layer.</div>
</div>
</div>
<div class="protection-layer">
<div class="layer-header">LAYER 2: DETECTION - Catch Threats That Slip Through</div>
<div class="two-column" style="gap: 8px;">
<div>
<div class="feature-name">24/7 Monitoring</div>
<div class="feature-desc">Real-time threat detection. Immediate notification of critical threats.</div>
</div>
<div>
<div class="feature-name">Dark Web Monitoring</div>
<div class="feature-desc">Alerts if credentials leaked. Proactive password reset before attackers strike.</div>
</div>
</div>
</div>
<div class="protection-layer">
<div class="layer-header">LAYER 3: RESPONSE - Minimize Damage If Breach Occurs</div>
<div class="two-column" style="gap: 8px;">
<div>
<div class="feature-name">Incident Response Plan</div>
<div class="feature-desc">Documented procedures. Legal and compliance guidance.</div>
</div>
<div>
<div class="feature-name">Ransomware Rollback</div>
<div class="feature-desc">Restore files within hours without paying ransom. Business continuity maintained.</div>
</div>
</div>
</div>
<h2>GPS Tiers & Security Features</h2>
<table class="comparison-table">
<tr>
<th>Security Feature</th>
<th>GPS-BASIC<br>$19/endpoint</th>
<th>GPS-PRO<br>$26/endpoint</th>
<th>GPS-ADVANCED<br>$39/endpoint</th>
</tr>
<tr class="section-header">
<td colspan="4">Core Protection</td>
</tr>
<tr><td>24/7 Monitoring & Alerting</td><td class="checkmark"></td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr><td>Automated Patch Management</td><td class="checkmark"></td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr><td>Antivirus & Anti-malware</td><td class="checkmark"></td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr class="section-header">
<td colspan="4">Advanced Security</td>
</tr>
<tr><td>Advanced EDR</td><td class="dash">-</td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr><td>Email Security (Anti-phishing)</td><td class="dash">-</td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr><td>DNS Filtering</td><td class="dash">-</td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr><td>Dark Web Monitoring</td><td class="dash">-</td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr><td>Security Awareness Training</td><td class="dash">-</td><td class="checkmark"></td><td class="checkmark"></td></tr>
<tr class="section-header">
<td colspan="4">Maximum Protection</td>
</tr>
<tr><td>Ransomware Rollback</td><td class="dash">-</td><td class="dash">-</td><td class="checkmark"></td></tr>
<tr><td>Compliance Tools (HIPAA/PCI)</td><td class="dash">-</td><td class="dash">-</td><td class="checkmark"></td></tr>
<tr><td>Priority Incident Response</td><td class="dash">-</td><td class="dash">-</td><td class="checkmark"></td></tr>
</table>
<p style="font-size: 10px; font-weight: bold; text-align: center; margin: 5px 0;">RECOMMENDED: GPS-PRO for most businesses • GPS-ADVANCED for regulated industries</p>
<div class="case-study-box">
<div class="case-study-header">REAL CLIENT SUCCESS: Southwest Legal Partners</div>
<p style="font-size: 10px;">Sophisticated phishing attack targeting accounting department. GPS detected threat within 45 seconds, quarantined endpoint, prevented credential theft.</p>
<div class="case-outcome">
<h4>Outcome:</h4>
<p style="font-size: 10px; margin: 0;">Zero data loss • Zero downtime • Zero financial loss<br>
<strong>Potential breach cost: $150,000+ • GPS monthly investment: $702</strong><br>
<strong style="color: #27ae60;">One prevented breach paid for 17+ YEARS of GPS protection</strong></p>
</div>
</div>
<div class="roi-calculator">
<h2>ROI Calculator: 15-Employee Business</h2>
<div class="roi-grid">
<div class="roi-card">
<h4>GPS-PRO Investment:</h4>
<div class="roi-breakdown">
<div>15 endpoints × $26 = $390</div>
<div>Email security = $45</div>
<div>Standard Support = $380</div>
<div style="border-top: 1px solid rgba(255,255,255,0.3); margin-top: 4px; padding-top: 4px;">
<strong>Total: $815/month ($9,780/year)</strong>
</div>
</div>
</div>
<div class="roi-card">
<h4>Average Breach Cost:</h4>
<div class="roi-breakdown">
<div>Low-end: $120,000</div>
<div>High-end: $200,000</div>
<div style="border-top: 1px solid rgba(255,255,255,0.3); margin-top: 4px; padding-top: 4px;">
<strong>ROI: 1,200-2,000%</strong>
</div>
</div>
</div>
</div>
<div class="roi-total">ONE PREVENTED BREACH PAYS FOR 12-20 YEARS OF GPS</div>
</div>
<div class="assessment-box">
<h3>FREE Security Risk Assessment ($500 Value)</h3>
<p style="font-size: 10px;">We'll scan your network and provide detailed findings:</p>
<ul class="assessment-list">
<li>External vulnerability scan of public-facing systems</li>
<li>Dark web scan for leaked credentials</li>
<li>Email security test (simulated phishing)</li>
<li>Written report with risk score and remediation roadmap</li>
<li>Custom GPS recommendation with exact pricing</li>
</ul>
<p style="font-size: 10px; font-weight: bold; margin-top: 6px;">No obligation. No sales pressure. 3-5 day turnaround.</p>
</div>
<div class="cta-box">
<h2>Schedule Your Free Security Assessment</h2>
<div class="phone-large">520.304.8300</div>
<p>Email: security@azcomputerguru.com</p>
<p>Web: azcomputerguru.com/security-assessment</p>
<p style="margin-top: 8px; font-size: 10px;">7437 E. 22nd St, Tucson, AZ 85710 (We're local—visit us anytime)</p>
</div>
<div class="offer-box">
<h3>NEW CLIENT SPECIAL OFFER</h3>
<p style="font-size: 10px; margin-bottom: 6px;">Sign up within 30 days and receive:</p>
<ul class="offer-list">
<li>Waived setup fees (normally $500)</li>
<li>First month 50% off support plan (save $190-425)</li>
<li>Free security assessment ($500 value)</li>
<li>Free dark web monitoring scan ($200 value)</li>
</ul>
<p style="font-size: 11px; font-weight: bold; text-align: center; margin-top: 6px;">Total Value: $1,500+ • Mention code "SECURITY2026"</p>
</div>
<div class="guarantee-box">
30-DAY MONEY-BACK GUARANTEE - If GPS doesn't give you peace of mind, we'll refund 100%
</div>
<div class="footer">Protecting Tucson Businesses from Cyber Threats Since 2001</div>
</div>
</body>
</html>