{"id":78,"date":"2023-04-26T08:09:09","date_gmt":"2023-04-26T08:09:09","guid":{"rendered":"https:\/\/cybertel.org\/?page_id=78"},"modified":"2023-07-14T09:24:58","modified_gmt":"2023-07-14T09:24:58","slug":"know-your-customer","status":"publish","type":"page","link":"https:\/\/cybertel.org\/index.php\/know-your-customer\/","title":{"rendered":"Know Your Customer"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"78\" class=\"elementor elementor-78\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ccbb0be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ccbb0be\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77b1613c\" data-id=\"77b1613c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33dfb27a elementor-widget elementor-widget-heading\" data-id=\"33dfb27a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.2 - 23-04-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">KYC<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-fecd513 e-con-boxed e-con\" data-id=\"fecd513\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-864380f elementor-widget elementor-widget-text-editor\" data-id=\"864380f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.2 - 23-04-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>The widespread adoption of smartphones worldwide has led to a significant increase in digital data sharing. Customers are now required to provide personal information through online banking apps and rely on their phone numbers for everyday tasks like food ordering.<\/p><p>However, the telecom industry continues to face challenges related to fraudulent activities such as SIM swap fraud and data theft, primarily due to insufficient identity verification measures. Despite advancements in remote operations, identity fraud and financial crimes still pose a threat to the industry.<\/p><p>Frauds targeting the telecom industry primarily exploit vulnerabilities in mobile devices used for online transactions and sensitive communications. Even minor weaknesses in mobile networks can enable fraudsters to engage in identity fraud, payment scams, and account takeovers. A notable example is Telefonica Group, a telecom company with an annual revenue of $49.2 billion in 2020, which incurred a staggering $915 million loss to fraudsters and criminals, according to the Communications Fraud Control Association (CFCA).<\/p><p>Scammers are increasingly utilizing fraudulent methods like SIM Farms, leveraging the free services offered by the telecom industry. Through this approach, fraudsters accept payments and send SMS messages to thousands of random recipients in an attempt to obtain personal information. If successful, they utilize the acquired data for SIM swaps, a form of identity theft that targets mobile phones to gain access to social media accounts, bank accounts, and even cryptocurrency wallets by intercepting one-time passwords (OTPs).<\/p><p>A recent example involves the telecom giant T-Mobile, which faced SIM swapping attacks and code theft orchestrated by an extortion gang called Lapsus$. However, SIM swapping fraud is not the only concern. Phishing SMS techniques are also employed to target telecommunication companies sporadically. For instance, there have been instances of large-scale SMS messages promoting fake financial aid programs in Ukraine. Phishing scams have persisted even during the COVID-19 pandemic, with fraudsters attempting to gain access to payment details by exploiting fake vaccination programs.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b6c157 e-con-boxed e-con\" data-id=\"2b6c157\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-740a9f1 e-con-full e-con\" data-id=\"740a9f1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c12e208 elementor-widget elementor-widget-text-editor\" data-id=\"c12e208\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>Identifying and Eliminating Frauds<\/h3><p>SIM swapping is made possible when a customer\u2019s personal information is transferred to the SIM of an online scammer using techniques like hacking. This kind of scam not only makes the customers\u2019 personal information vulnerable to misuse but also brings the risk of hackers gaining access to other related information that is linked to their SIM cards. This information may include e-mail credentials and banking details. Telecommunication companies must adopt a risk-based approach to identify and eliminate such fraudulent activities.<\/p><p>Next to all the building blocks the flow builder is very easy to use because of various editing functions like: copy\/paste, delete, disconnect, shortcuts, drag\/drop, collaps\/expand and color alerts.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c73d84 e-con-full e-con\" data-id=\"3c73d84\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-760c3eb elementor-widget elementor-widget-spacer\" data-id=\"760c3eb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.2 - 23-04-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bba4eda elementor-widget elementor-widget-text-editor\" data-id=\"bba4eda\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/www.telnetww.com\/wp-content\/uploads\/2021\/10\/ignore-unknown-callers.png\" alt=\"5 Best Practices for Preventing Telecom Fraud | TelNet Worldwide\" width=\"357\" height=\"377\" \/><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f27ef9c e-con-boxed e-con\" data-id=\"f27ef9c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14ffab4 elementor-widget elementor-widget-text-editor\" data-id=\"14ffab4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"et_pb_module et_pb_text et_pb_text_12 et_pb_text_align_left et_pb_bg_layout_light\"><div class=\"et_pb_text_inner\"><p><span style=\"text-align: var(--text-align); color: var(--uicore-typography--p-c,'#070707'); font-family: var(--uicore-typography--p-f,'Inter'); font-size: var(--uicore-typography--p-s,'10px'); font-style: var(--uicore-typography--p-st,'normal'); font-weight: var(--uicore-typography--p-w,'600'); letter-spacing: var(--uicore-typography--p-ls,'-0.027em'); text-transform: var(--uicore-typography--p-t,'none');\">\u00a0<\/span>After the telecom industry gave its customers zero rate calls, it became clear that the sector needed and used the best available preventive measures. There has been a 2500% rise in calls and SMS messages to Ukraine since the Russian invasion earlier this year. As of now, telecom companies must do even more and make efforts to detect fraud while ensuring a fair service usage policy. There must be systems in place to monitor customers\u2019 usage of telecom services, as well as the monitoring of networks and other data sources involved when there are activities deviating from standard procedures. In this way, telecom companies can detect and report suspicious activities.<\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42e4ff3 e-con-boxed e-con\" data-id=\"42e4ff3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bd2801 elementor-widget elementor-widget-text-editor\" data-id=\"7bd2801\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"et_pb_module et_pb_text et_pb_text_12 et_pb_text_align_left et_pb_bg_layout_light\"><div class=\"et_pb_text_inner\"><p>There are now robust solutions available in the market for telecom service providers to keep an eye on suspicious activities and identify SIM swap frauds through devices that show unusual usage patterns. Telecom companies that monitor the red flags in mobile service usage are able to successfully combat fraudulent activities. This is done by detecting unusual activities in volumes of traffic coming from a specific location through mobile devices that send large numbers of SMS containing a link. Suspicious activities can also be detected through IMEIs that show relatively higher data consumption compared to other devices in a short span of time.<\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7c54ef8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c54ef8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-e-bg-lazyload=\"\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73275e9\" data-id=\"73275e9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1e6b7f elementor-widget__width-initial ui-e-a-animate elementor-widget elementor-widget-highlighted-text\" data-id=\"f1e6b7f\" data-element_type=\"widget\" data-widget_type=\"highlighted-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"ui-e--highlighted-text\" >\n        <span class=\"ui-e-headline-text\">How the Telecom Industry Can be Secured<\/span>        <\/h1>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a31defa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a31defa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6b026e9 bdt-backdrop-filter-yes\" data-id=\"6b026e9\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a25b90d\" data-id=\"a25b90d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-5282308 e-con-boxed e-con\" data-id=\"5282308\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a8cc8dc e-con-full e-con\" data-id=\"a8cc8dc\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99618f4 elementor-widget elementor-widget-text-editor\" data-id=\"99618f4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"et_pb_module et_pb_text et_pb_text_12 et_pb_text_align_left et_pb_bg_layout_light\"><div class=\"et_pb_text_inner\"><div class=\"et_pb_module et_pb_text et_pb_text_14 et_pb_text_align_left et_pb_bg_layout_light\"><div class=\"et_pb_text_inner\"><p>Know Your Customer (KYC) is the process of verifying customers\u2019 identities that is implemented by banks and any other financial institution dealing with monetary operations. It is aimed at preventing the risks of identity fraud and keeping an eye on both customers and telecom service providers. In several areas, KYC measures are encouraged by governments as part of AML (Anti-Money Laundering) regulations and as part of measures to secure mobile operators from unwantedly becoming the source of money laundering and terrorist financing.\u00a0<\/p><p><span style=\"font-size: inherit; text-align: var(--text-align); color: var(--uicore-typography--p-c,'#070707'); font-family: var(--uicore-typography--p-f,'Inter'); font-style: var(--uicore-typography--p-st,'normal'); font-weight: var(--uicore-typography--p-w,'600'); letter-spacing: var(--uicore-typography--p-ls,'-0.027em'); text-transform: var(--uicore-typography--p-t,'none');\">Even in areas where KYC measures are not encouraged by governments, telecom operators must incorporate robust identity verification measures to prevent fraudulent entities from accessing their system. Online identity verification service providers utilize technologies like biometric facial recognition along with thousands of AI algorithms to authenticate the identities of telecom companies\u2019 customers. KYC compliance ensures that companies run background checks on their customers to identify whether they are linked to PEPs (Politically exposed persons) as well as checking for their presence in global sanctions lists.<\/span><\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6212f4d8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6212f4d8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-621b21e1\" data-id=\"621b21e1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-e-bg-lazyload=\".elementor-element-populated\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-770992bf ui-e-a-animate elementor-widget elementor-widget-highlighted-text\" data-id=\"770992bf\" data-element_type=\"widget\" data-widget_type=\"highlighted-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"ui-e--highlighted-text\" >\n        <span class=\"ui-e-headline-text\">Grow your business<\/span><span class=\"whitespace\"> <\/span><span class=\"ui-e-headline-text ui-e-headline-stroke1\">\n\t\t\t\t\t\t\t<span class=\"ui-e-headline-text ui-e-headline-highlighted\"> today<\/span><span class=\"uicore-svg-wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 500 150\" preserveAspectRatio=\"none\"><path d='M15.2,133.3L15.2,133.3c121.9-7.6,244-9.9,366.1-6.8c34.6,0.9,69.1,2.3,103.7,4'\/><\/svg><\/span><\/span><span class=\"whitespace\"> <\/span>        <\/h2>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fc4f03c elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1fc4f03c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Get in touch with us. We have custom solutions for you and your business!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bf70b07 elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"2bf70b07\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Below<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-3997827 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3997827\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed76d77\" data-id=\"ed76d77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c350122 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c350122\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-923cc97\" data-id=\"923cc97\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4cb2de elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-image\" data-id=\"a4cb2de\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.2 - 23-04-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"172\" height=\"179\" src=\"https:\/\/cybertel.org\/wp-content\/uploads\/2023\/04\/SEO-Agency-Shape.webp\" class=\"attachment-full size-full wp-image-107\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afa96f3 elementor-widget__width-initial elementor-absolute e-transform elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial animated-fast ui-float-widget  ui-float-l elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"afa96f3\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-10,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:500,&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFill the form\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-504ab4b elementor-widget__width-auto elementor-absolute animated-fast elementor-invisible elementor-widget elementor-widget-image\" data-id=\"504ab4b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"112\" height=\"130\" src=\"https:\/\/cybertel.org\/wp-content\/uploads\/2023\/04\/SEO-Agency-Arrow.webp\" class=\"attachment-full size-full wp-image-108\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22ab49b elementor-button-align-start elementor-widget elementor-widget-bdt-contact-form\" data-id=\"22ab49b\" data-element_type=\"widget\" data-widget_type=\"bdt-contact-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"bdt-contact-form bdt-contact-form-skin-default\">\n\t\t\t<div class=\"elementor-form-fields-wrapper\">\n\t\t\t\t\t\t<div class=\"bdt-contact-form-wrapper\">\n\t\t\t<form class=\"bdt-contact-form-form bdt-form-stacked bdt-grid bdt-grid-small without-recaptcha\" data-bdt-grid=\"\" action=\"https:\/\/cybertel.org\/wp-admin\/admin-ajax.php\" method=\"post\">\n\n\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-field-group elementor-field-required bdt-width-1-1\">\n\t\t\t\t\t\t<div class=\"bdt-form-controls\"><input type=\"text\" name=\"name\" id=\"user_name22ab49b\" placeholder=\"Your Name\" class=\"bdt-input bdt-form-large\" required =\"required\"><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"bdt-field-group elementor-field-required bdt-width-1-1\">\n\t\t\t\t\t\t<div class=\"bdt-form-controls\"><input type=\"email\" name=\"email\" id=\"email22ab49b\" placeholder=\"example@email.com\" class=\"bdt-input bdt-form-large\" required=\"required\"><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"bdt-field-group bdt-width-1-1 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"bdt-form-controls\"><textarea name=\"message\" id=\"message22ab49b\" rows=\"4\" placeholder=\"Your Message Here\" class=\"bdt-textarea bdt-form-large\" required=\"required\"><\/textarea><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<input type=\"hidden\" class=\"widget_id\" name=\"widget_id\" value=\"22ab49b\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"bdt-sf-22ab49b\" value=\"true\" \/>\n\t\t\t\t\t<input type=\"hidden\" class=\"page_id\" name=\"page_id\" value=\"78\" \/>\n\n\t\t\t\t\t<div class=\"elementor-field-type-submit bdt-field-group bdt-flex bdt-width-1-1\">\n\t\t\t\t\t\t<button type=\"submit\" class=\"elementor-button bdt-button bdt-button-primary\" name=\"submit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Send Message<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<input name=\"_wpnonce\" value=\"e83fb25c2f\" type=\"hidden\">\n\n\t\t\t\t\t<input type=\"hidden\" name=\"action\" value=\"element_pack_contact_form\" \/>\n\n\t\t\t\t\t\n\t\t\t<\/form>\n\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-557dae4 elementor-widget elementor-widget-text-editor\" data-id=\"557dae4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We will get in touch with you in within 2 business days!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-15e3acc\" data-id=\"15e3acc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b113fde elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b113fde\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-headphones-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M160 288h-16c-35.35 0-64 28.7-64 64.12v63.76c0 35.41 28.65 64.12 64 64.12h16c17.67 0 32-14.36 32-32.06V320.06c0-17.71-14.33-32.06-32-32.06zm208 0h-16c-17.67 0-32 14.35-32 32.06v127.88c0 17.7 14.33 32.06 32 32.06h16c35.35 0 64-28.71 64-64.12v-63.76c0-35.41-28.65-64.12-64-64.12zM256 32C112.91 32 4.57 151.13 0 288v112c0 8.84 7.16 16 16 16h16c8.84 0 16-7.16 16-16V288c0-114.67 93.33-207.8 208-207.82 114.67.02 208 93.15 208 207.82v112c0 8.84 7.16 16 16 16h16c8.84 0 16-7.16 16-16V288C507.43 151.13 399.09 32 256 32z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5331cfe  ui-split-animate ui-splitby-chars elementor-widget elementor-widget-heading\" data-id=\"5331cfe\" data-element_type=\"widget\" data-settings=\"{&quot;ui_animate_split&quot;:&quot;ui-split-animate&quot;,&quot;ui_animate_split_by&quot;:&quot;chars&quot;,&quot;ui_animate_split_style&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let's talk to experienced advisers.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69916b1 elementor-widget elementor-widget-text-editor\" data-id=\"69916b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Need custom solutions? Don&#8217;t hesitate to ask us.\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>KYC The widespread adoption of smartphones worldwide has led to a significant increase in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/pages\/78"}],"collection":[{"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/comments?post=78"}],"version-history":[{"count":7,"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/pages\/78\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/pages\/78\/revisions\/391"}],"wp:attachment":[{"href":"https:\/\/cybertel.org\/index.php\/wp-json\/wp\/v2\/media?parent=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}