[vc_row full_width=”stretch_row” content_placement=”middle” css=”.vc_custom_1729085588611{margin-top: -100px !important;background-color: #313e49 !important;}”][vc_column width=”3/5″][vc_custom_heading text=”CYBERSECURITY – A CRITICAL BUSINESS STRATEGY” font_container=”tag:h1|text_align:left|color:%2399ba47″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]Today’s technology-driven environment, coupled with heavy compliance requirements, makes cyber vulnerabilities inevitable. Don’t wait to discover could have be better protected.
Let Edwards help you identify your cybersecurity risks, develop a security plan, and then institutionalize a cyber risk program. Our cybersecurity assessments, plans, and other tailored solutions fit your budget – keeping you informed and well protected. Our team of cybersecurity experts apply decades of security expertise keeping your organization safe.[/vc_column_text][/vc_column][vc_column width=”2/5″][vc_cta h2=”Protect Your Data” h2_font_container=”tag:h2|text_align:center” h2_google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” h4_font_container=”tag:h4|text_align:left” txt_align=”center” style=”flat” el_width=”lg” add_button=”bottom” btn_title=”Send Us A Message” btn_style=”flat” btn_color=”green” btn_align=”center” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true” btn_link=”url:mailto%3AInfo%40edwps.com%20_blank”]Interested in learning more about how Edwards can help you with Cybersecurity?[/vc_cta][/vc_column][/vc_row][vc_row el_id=”Program Areas”][vc_column][vc_custom_heading text=”OUR SOLUTIONS” font_container=”tag:h1|text_align:center|color:%23161240″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][/vc_column][/vc_row][vc_row gap=”5″ content_placement=”top”][vc_column width=”1/4″][vc_hoverbox image=”339423″ primary_title=”CMMC Services” primary_title_font_container=”color:%23ffffff” primary_title_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” hover_title=”” hover_align=”justify” use_custom_fonts_primary_title=”true”]Edwards is the only fully certified organization in the ecosystem.
APP/ATP: Authored and instructs approved CMMC trainings.
RPO: Prepares OSCs for a formal C3PAO assessments.
C3PAO: Authorized C3PAO able to perform CMMC assessments.[/vc_hoverbox][/vc_column][vc_column width=”1/4″][vc_hoverbox image=”339424″ primary_title=”Compliance Assessments” primary_title_font_container=”color:%23ffffff” primary_title_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” hover_title=”” use_custom_fonts_primary_title=”true” use_custom_fonts_hover_title=”true”]Edwards identifies organizational risks and possible strategies. We create tailored action plans to advance your security, including:
HIPAA • CMMC 2.0 • CMMI • ISO 27001 • ISO 9001 • NIST CSF • NIST 800-53 • NIST 800-171 • GDPR • TISAX[/vc_hoverbox][/vc_column][vc_column width=”1/4″][vc_hoverbox image=”339426″ primary_title=”Penetration Testing & Vulnerability Scanning” primary_title_font_container=”color:%23ffffff” primary_title_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” hover_title=”” use_custom_fonts_primary_title=”true”]Edwards executes vulnerability and penetration testing identifying security weaknesses in your system and assesses your defenses by simulating attacks.[/vc_hoverbox][/vc_column][vc_column width=”1/4″][vc_hoverbox image=”339425″ primary_title=”vCISO Support” primary_title_font_container=”color:%23ffffff” primary_title_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” hover_title=”” use_custom_fonts_primary_title=”true”]Edwards provides vCISO support to offer expert cybersecurity management to companies that don’t need a full-time Chief Information Security Officer.[/vc_hoverbox][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space][/vc_column][/vc_row][vc_row full_width=”stretch_row” el_id=”THE EDWARDS DIFFERENCE” css=”.vc_custom_1729632196216{background-image: url(https://staging.edwps.com/wp-content/uploads/2024/09/Quote-BG.png?id=322612) !important;}”][vc_column][vc_custom_heading text=”THE EDWARDS DIFFERENCE” font_container=”tag:h1|text_align:center|color:%23ffffff” google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_empty_space height=”25px”][vc_column_text]
Edwards offers a unique cybersecurity approach, focusing on tailored services that prioritize compliance, governance, audits, and cutting-edge practices like penetration testing. Our commitment involves aligning cybersecurity with business needs, providing executive support for a collaborative journey towards cyber robustness.
[/vc_column_text][vc_row_inner equal_height=”yes” content_placement=”top” gap=”25″][vc_column_inner width=”1/3″ css=”.vc_custom_1729632314839{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: rgba(255,255,255,0.9) !important;*background-color: rgb(255,255,255) !important;border-radius: 15px !important;}”][dt_icon icon_alignment=”icon_center” dt_icon=”icomoon-the7-font-the7-comment-00″ dt_icon_border_width=”0px” icon_border_gap=”0px” dt_icon_color=”#2c4563″ dt_icon_border=”n” dt_icon_bg=”n” dt_icon_color_hover=”#95b9df” dt_icon_border_hover=”n” dt_icon_bg_hover=”n”][vc_custom_heading text=”CONNECTING THROUGH CONVERSATION” font_container=”tag:h4|text_align:center|color:%232b4764″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=”.vc_custom_1729102444797{padding-top: 15px !important;padding-right: 15px !important;padding-left: 15px !important;}”]
In the realm of cyber risks, one size does not fit all. Our strength lies in our ability to talk with technical staff, while translating complex cyber jargon into meaningful business risk dialogues for key-decision makers. We believe in equipping you with insights that resonate with your business perspective, making data actionable. When Edwards speaks, we ensure it’s in a language that aligns with you and your business goals.
[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″ css=”.vc_custom_1729632484451{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: rgba(255,255,255,0.91) !important;*background-color: rgb(255,255,255) !important;border-radius: 15px !important;}”][dt_icon icon_alignment=”icon_center” dt_icon=”icomoon-the7-font-the7-login-02″ dt_icon_border_width=”0px” icon_border_gap=”0px” dt_icon_color=”#2c4563″ dt_icon_border=”n” dt_icon_bg=”n” dt_icon_color_hover=”#95b9df” dt_icon_border_hover=”n” dt_icon_bg_hover=”n”][vc_custom_heading text=”DIVERSITY & SKILLED STAFF” font_container=”tag:h4|text_align:center|color:%232b4764″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=”.vc_custom_1729102434058{padding-top: 15px !important;padding-right: 15px !important;padding-left: 15px !important;}”]
At Edwards, our diverse team, drawn from varied backgrounds, combine technical acumen with an understanding of diverse industry nuances. With over a century of combined experience of implementing varied frameworks and compliance standards Edwards is poised to offer solutions that resonate with your specific needs, making cybersecurity a tailored fit, not a forced one.
[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″ css=”.vc_custom_1729632218807{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: rgba(255,255,255,0.9) !important;*background-color: rgb(255,255,255) !important;border-radius: 15px !important;}”][dt_icon icon_alignment=”icon_center” dt_icon=”icomoon-the7-font-the7-expand-07″ dt_icon_border_width=”0px” icon_border_gap=”0px” dt_icon_color=”#2c4563″ dt_icon_border=”n” dt_icon_bg=”n” dt_icon_color_hover=”#95b9df” dt_icon_border_hover=”n” dt_icon_bg_hover=”n”][vc_custom_heading text=”SCALABILITY AT ITS CORE” font_container=”tag:h4|text_align:center|color:%232b4764″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=”.vc_custom_1729102455331{padding-top: 15px !important;padding-right: 15px !important;padding-left: 15px !important;}”]
While we excel in cybersecurity, our roots are deeply embedded in program and project management. This means our solutions embody best in class cyber practices with documented processes to maintain security at every stage of your business. With Edwards, you get a partner that works hand-in-hand with you, ensuring each cybersecurity measure we recommend is scalable and repeatable with your growth trajectory.
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][/vc_column][/vc_row][vc_row gap=”10″ content_placement=”top” el_id=”Pen Testing”][vc_column width=”5/12″][vc_custom_heading text=”Penetration Testing” font_container=”tag:h1|text_align:left|color:%230d0f40″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]
Edwards offers indispensable insight via penetration assessments, helping you understand your organization’s security status. The Edwards Penetration Assessment team mimics the rhythm of real-world cyber threats through well-established campaigns, operations, and tasks, facilitating snapshot (moment in time) assessments.
Edwards’ team of ethical hackers provide external, internal, wireless, and physical penetration tests, as well as social engineering exercises to reveal exploitable vulnerabilities in your system. Our team specializes in devising strategies for risk mitigation while developing prioritized action plans aligned to your risk tolerance.
[/vc_column_text][vc_custom_heading text=”Vulnerability Scanning” font_container=”tag:h1|text_align:left|color:%230d0f40″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]
Edwards delivers essential insights through vulnerability scanning, offering a comprehensive view of your system’s security landscape. Our team leverages industry-leading tools and techniques to conduct real-time assessments that identify potential weaknesses.
[/vc_column_text][/vc_column][vc_column width=”1/12″][/vc_column][vc_column width=”6/12″ css=”.vc_custom_1729629421774{padding: 25px !important;}”][vc_custom_heading text=”Zero Day Attacks” font_container=”tag:p|text_align:left” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]A zero-day exploit is a cyberattack that targets vulnerabilities in software, firmware, or hardware before the vendor or antivirus software even knows they exist. In 2022, 62% of security teams faced these unpredictable threats[/vc_column_text][vc_round_chart type=”doughnut” stroke_width=”2″ legend=”” values=”%5B%7B%22title%22%3A%22Teams%20Facing%20Attacks%22%2C%22value%22%3A%2262%25%22%2C%22color%22%3A%22juicy-pink%22%7D%2C%7B%22title%22%3A%22Other%20Threats%22%2C%22value%22%3A%2238%22%2C%22color%22%3A%22grey%22%7D%5D” css=”.vc_custom_1730211123032{padding-bottom: 10px !important;}” el_class=”custom-chart-size”][vc_empty_space height=”10″][vc_column_text css=””]It took an average of 14 days to fix vulnerabilities—time your business can’t afford to be exposed. Our penetration testing services can uncover these weaknesses before they’re exploited, safeguarding your organization from costly breaches.[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row” gap=”10″ content_placement=”middle” css=”.vc_custom_1729086576299{background-color: #0d0f40 !important;}”][vc_column width=”1/2″][vc_custom_heading text=”Case Studies” font_container=”tag:h1|text_align:left|color:%23ffffff” google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_custom_heading text=”Enhancing Cybersecurity Company-Wide By Improving Standard Assessments and Developing a Plan” font_container=”tag:h3|text_align:left|color:%2399ba47″ google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]Edwards partnered with a large hospital system to support compliance requirements. For the first three years of the partnership, Edwards performed a HIPAA-meaningful use assessment. Edwards then mapped the assessment to both the NIST 800-53 and NIST Cybersecurity Framework. The resulting reports have led to the mitigation of risk from third parties.[/vc_column_text][vc_btn title=”To the Case Study” style=”flat” color=”green” align=”left” css=”” link=”url:https%3A%2F%2Fedwps.com%2Fcase_studies%2Fedwards-performance-solutions-enhancing-cybersecurity-at-a-premier-ffrdc-2-0%2F|target:_blank”][/vc_column][vc_column width=”1/2″][vc_column_text css=””]
[/vc_column_text][/vc_column][/vc_row][vc_row content_placement=”top” css=”.vc_custom_1729633505413{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;}”][vc_column width=”1/2″][vc_custom_heading text=”COMPLIANCE” font_container=”tag:h1|text_align:left|color:%230d0f40″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_custom_heading text=”Organizations often find navigating intricate compliance requirements challenging or time-consuming.” font_container=”tag:p|text_align:left” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]Edwards specializes in compliance standards like HIPAA, CMMC, CMMI, ISO, NIST, GDPR & more: we will identify your unique risks and craft tailored strategies to ensure adherence. Our commitment goes beyond mere compliance. As we scale our strategies with your growth, we bolster your cyber defenses and elevate your security posture to unparalleled heights.Edwards is not a managed service provider (MSP). We integrate seamlessly working with you and or your MSP to align your organizational objectives. [/vc_column_text][vc_custom_heading text=”Our method for ensuring compliance is comprehensive:” font_container=”tag:p|text_align:left” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_tta_accordion color=”black” c_icon=”chevron” active_section=”” no_fill=”true” collapsible_all=”true”][vc_tta_section title=”Training Programs” tab_id=”1728390923629-a60920bc-a80d”][vc_column_text css=””]We empower your team with a deep understanding of diverse standards. By demystifying these complexities, we ensure that a knowledgeable team is your first line of defense against cyber threats.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Asset & Data Discovery” tab_id=”1728390923644-d1d3ecb3-27c0″][vc_column_text css=””]Understanding the full scope of your assets is paramount. Without a precise inventory and understanding of their locations, deliberate and effective protection remains elusive.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Implementation & Readiness Assessments” tab_id=”1728391085079-cae3bba3-4fca”][vc_column_text css=””]We provide impartial advice during our readiness phases. This ensures that vulnerabilities are not just identified but effectively addressed. It also positions your organization to navigate the ever-changing regulatory environment with confidence.[/vc_column_text][/vc_tta_section][/vc_tta_accordion][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1729632514250{padding-right: 25px !important;padding-left: 25px !important;}”][vc_custom_heading text=”Compliance Gaps” font_container=”tag:p|text_align:left” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]Compliance gaps can leave your business exposed to costly risks. Shockingly, 23% of organizations lack a formal compliance training plan, and 40% rate their programs as basic or reactive. Even more concerning, only 70% of companies attempt to measure the effectiveness of their compliance efforts.[/vc_column_text][vc_progress_bar values=”%5B%7B%22label%22%3A%22No%20Formal%20Compliance%20Training%22%2C%22value%22%3A%2223%22%2C%22color%22%3A%22bar_red%22%7D%2C%7B%22label%22%3A%22Rate%20Their%20Programs%20as%20Basic%22%2C%22value%22%3A%2240%22%2C%22color%22%3A%22sandy-brown%22%7D%2C%7B%22label%22%3A%22Actually%20Measure%20Compliance%20Effectiveness%22%2C%22value%22%3A%2270%22%2C%22color%22%3A%22blue%22%7D%5D” options=”striped,animated” css=”” caption_pos=”top” bgstyle=”transparent” units=”%” el_class=”compliance-bars”][vc_separator el_width=”70″ css=””][vc_column_text css=””]Our comprehensive compliance services ensure your organization stays ahead of regulatory demands, with proactive strategies that not only address immediate risks but also strengthen long-term resilience.[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row” disable_element=”yes” el_id=”Cyber PMO” css=”.vc_custom_1693237383961{background-color: #ffffff !important;}”][vc_column][vc_row_inner][vc_column_inner][vc_single_image image=”2896″ img_size=””][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]What is CyberPMO®? Our proprietary solution addresses the root cause of at least 90% of current industry breaches. At its core, CyberPMO® focuses on cybersecurity program essentials like creating an asset inventory, identifying risk rates, and managing existing vulnerabilities. We take the time to establish an appropriate compliance framework, measure your organization against that framework, and define projects for improvement.
We partner with you to help create and manage policies, ensuring they are understood throughout the organization to develop a culture of cybersecurity through focused security awareness training and phishing campaigns.
CyberPMO® provides
✅ Visibility into your organization’s cyber risk
✅ Management of your cyber program to reduce risk utilizing a common platform
✅ Skilled cybersecurity professionals with decades of experience
✅ A solution focused on the specifics of your business
[/vc_column_text][vc_empty_space height=”10px”][/vc_column_inner][vc_column_inner width=”1/3″][vc_empty_space height=”35px”][vc_single_image image=”203672″ img_size=”” alignment=”center” onclick=”link_image”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row_content” gap=”20″ equal_height=”yes” content_placement=”top” css=”.vc_custom_1729680113701{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #0d0f40 !important;}”][vc_column][vc_custom_heading text=”CMMC Compliance” font_container=”tag:h1|text_align:center|color:%23ffffff” google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_custom_heading text=”Essential Training for a Secure and Certified Future” font_container=”tag:h3|text_align:center|color:%2399ba47″ google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_custom_heading text=”The data below highlights the critical need for CMMC compliance to protect sensitive information and avoid legal and financial repercussions. With over 300,000 contractors requiring certification and hundreds of security controls to implement, non-compliance can result in severe fines and vulnerabilities to cyber threats.” font_container=”tag:p|text_align:center|color:%23ffffff” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=””][vc_column_text css=””]
Edwards Performance Solutions offers tailored CMMC solutions to help contractors meet the necessary security requirements and avoid costly penalties. Ensure your organization is fully prepared by enrolling in our expert-led training today to achieve compliance and protect your business from cyber threats.
[/vc_column_text][vc_btn title=”View Course Dates” style=”flat” color=”green” align=”center” css=”” link=”url:https%3A%2F%2Fonline.edwps-learn.com%2F%23%2Fcatalog%2F97342bdf-2ded-4169-a2ee-a9768fd37db1″][/vc_column][vc_column width=”5/12″ css=”.vc_custom_1730213595349{margin: 50px !important;padding: 40px !important;}”][vc_single_image image=”343958″ img_size=”medium” alignment=”center” css=”” image_hovers=”false”][vc_custom_heading text=”Education, Training, Consulting, & Certification” font_container=”tag:h2|text_align:center|color:%230d0f40″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_custom_heading text=”APP, ATP, RPO, & C3PAO” font_container=”tag:h2|text_align:center|color:%230d0f40″ google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]
A solid foundational knowledge is critical to any CMMC certification journey. We’ve trained over 28% of the marketplace, solidifying our stance as the premier choice for CMMC education. Our Cyber AB-approved 5-day CCP and CCA courses are designed to offer an in-depth dive into the CMMC 2.0 standard, grooming participants to excel as CMMC assessors, implementors, and consultants. Guided by elite Provisional Instructors, each with decades of experience, participants gain a holistic understanding of CMMC.
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column offset=”vc_hidden-xs”][vc_custom_heading text=”EDWARDS CYBERSECURITY LEADERSHIP” font_container=”tag:h1|text_align:center|color:%230d0f40″ google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=””][vc_column_text css=””]
Our Cybersecurity Team has a combined experience of over 10 decades, expertly managing and implementing security programs across government, commercial, and healthcare sectors, in line with NIST, CIS, HIPAA, and ISO 27001 standards.
[/vc_column_text]
[/vc_column_text][vc_empty_space height=”66″][/vc_column][vc_column width=”2/5″][vc_btn title=”LET’S CHAT” style=”flat” shape=”square” color=”green” align=”center” i_icon_fontawesome=”fas fa-question-circle” css=”” add_icon=”true” link=”url:%23Consultation_Form”][vc_custom_heading text=”- OR -” font_container=”tag:h1|font_size:42|text_align:center|color:%23ffffff” google_fonts=”font_family:Oswald%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal” css=”.vc_custom_1725548855592{padding-top: 5px !important;padding-bottom: 10px !important;}”][vc_btn title=”CALL 443-561-1334″ style=”flat” shape=”square” color=”green” align=”center” i_icon_fontawesome=”fas fa-phone-alt” css=”.vc_custom_1725903078815{padding-top: 10px !important;}” add_icon=”true” link=”url:tel%3A%2B14435611334″][vc_empty_space][/vc_column][/vc_row]