<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.annexustech.ca/blogs/tag/cloud-security/feed" rel="self" type="application/rss+xml"/><title>annexustech.ca - Blog #Cloud Security</title><description>annexustech.ca - Blog #Cloud Security</description><link>https://www.annexustech.ca/blogs/tag/cloud-security</link><lastBuildDate>Mon, 20 Apr 2026 10:52:23 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[PayPal Data Exposure: Risks for Business]]></title><link>https://www.annexustech.ca/blogs/post/paypal-data-exposure-a-quiet-incident-with-serious-implications-for-businesses</link><description><![CDATA[<img align="left" hspace="5" src="https://www.annexustech.ca/PayPal data exposure a quiet incident with serious implications for businesses.jpg"/>When most people hear about a data breach, they picture ransomware, phishing, or a compromised server. Yet some of the most damaging exposures happen ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ULz2sWJWT0Gi_RhzrjcNZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_4Rq9EUqRTW6wJ94pSMLP3w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YIjTlfz5TGmZL4tMWREfvg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zyV-GLcCQISVbYHZNdMzhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:22px;">PayPal Data Breach Shows How Internal Errors Can Expose Sensitive Data</span><br/></h2></div>
<div data-element-id="elm_jrOADOrrQDCfkghoBa7HYg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div><img src="/PayPal%20data%20exposure%20a%20quiet%20incident%20with%20serious%20implications%20for%20businesses.jpg"/><br/></div><div><p style="text-align:justify;margin-bottom:12pt;"><span><br/></span></p><p style="text-align:justify;margin-bottom:12pt;"><span>When most people hear about a data breach, they picture ransomware, phishing, or a compromised server. Yet some of the most damaging exposures happen quietly from internal errors or software misconfigurations. In February 2026, </span><span style="font-weight:700;">PayPal </span><span>disclosed that a routine code change in its PayPal Working Capital loan application unintentionally exposed customer data for more than six months. There was no system intrusion, no external attacker, just a change that behaved unexpectedly until it was detected in December 2025.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>This kind of incident is not unique. Studies show that </span><span style="font-weight:700;">over 40% of cloud service data breaches involve misconfigurations or internal errors</span><span>, affecting platforms including Stripe, Square, and QuickBooks. The PayPal exposure window ran from July 1 to December 13, 2025, and affected customers were formally notified on February 10, 2026.</span></p><br/><h3 style="text-align:justify;margin-bottom:4pt;"><span style="font-weight:700;">What data was involved</span></h3><p style="text-align:justify;margin-bottom:12pt;"><span>The exposure included a mix of personal and business information: full names, email addresses, phone numbers, business addresses, dates of birth, and Social Security numbers. While each piece of data is sensitive on its own, combined they create a high-risk profile for identity theft, financial fraud, and targeted social engineering attacks. Small business owners, in particular, may be vulnerable because attackers can leverage both personal and company details to gain trust or bypass security controls.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>Although the incident was not caused by external attackers, PayPal confirmed that a small number of customers did experience unauthorized transactions. Those transactions were quickly refunded, but the breach illustrates how even internal errors can lead to tangible financial impacts.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>For businesses, this incident is a reminder that </span><span style="font-weight:700;">the value of data is not just theoretical</span><span>: when personal and corporate information overlap, the consequences of exposure can cascade quickly,&nbsp; from compromised accounts to broader operational and reputational risks.</span></p><br/><h3 style="text-align:justify;margin-bottom:4pt;"><span style="font-weight:700;">What PayPal did after discovery</span></h3><p style="text-align:justify;margin-bottom:12pt;"><span>Once the issue came to light, PayPal acted quickly to contain the exposure. The faulty code was rolled back, unauthorized access terminated, and affected accounts were required to reset their passwords. Additional authentication controls were added to strengthen security at the next login, helping prevent further misuse of sensitive data.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>To support impacted customers, PayPal is offering two years of complimentary credit monitoring and identity restoration services through </span><span style="font-weight:700;">Equifax</span><span>, which includes identity theft insurance coverage. Affected users must enroll before July 31, 2026, to take full advantage of these protections.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>Customers were also advised to proactively monitor their credit reports and consider placing fraud alerts or credit freezes with </span><span style="font-weight:700;">Experian</span><span> and </span><span style="font-weight:700;">TransUnion</span><span>. These measures are especially important given the mix of personal and business data involved, which could otherwise be exploited for fraudulent activity or targeted attacks.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>By taking these steps, PayPal aimed not only to limit immediate risk but also to provide customers with tools to detect and respond to potential identity theft, a critical reminder that remediation after a breach is as important as prevention.</span></p><br/><h4 style="text-align:justify;margin-bottom:4pt;"><span style="font-weight:700;">Why this matters beyond PayPal</span></h4><p style="text-align:justify;margin-bottom:12pt;"><span>The most important takeaway here isn’t the platform involved — it’s the nature of the failure. Incidents like this don’t originate from obvious weaknesses such as poor passwords or an exposed firewall. They emerge from internal changes that unintentionally alter access and then blend into normal operations, unnoticed for months because nothing appears broken.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>These are some of the hardest issues to detect. Systems continue to function, users can do their jobs, and no alarms are triggered. From the outside, everything looks stable, while sensitive data may be quietly exposed in the background.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>For businesses that rely heavily on third-party platforms to process payments, manage finances, or store customer data, this introduces a familiar and uncomfortable reality: trust often replaces visibility. Organizations assume that well-known providers are secure by default, yet incidents like this show that even mature platforms can introduce risk through routine changes.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>The challenge for businesses is no longer deciding which vendors to trust — it’s understanding how much oversight is needed once that trust is granted.</span></p><br/><h3 style="text-align:justify;margin-bottom:4pt;"><span style="font-weight:700;">Securing PayPal and similar financial platforms</span></h3><p style="text-align:left;margin-bottom:12pt;"><span>For enterprises, treating financial platforms as integral parts of your security perimeter — rather than “black boxes” managed solely by the vendor:</span></p><ul><li><p style="text-align:left;"><span style="font-weight:700;">enable multi-factor authentication for all users</span><span>, with particular attention to administrators and employees with elevated access</span></p></li><li><p style="text-align:left;"><span style="font-weight:700;">use unique, strong passwords</span><span> for each platform and avoid reusing credentials across systems</span></p></li><li><p style="text-align:left;"><span style="font-weight:700;">regularly review user access</span><span>, removing permissions that are no longer necessary or assigned to inactive accounts</span></p></li><li><p style="text-align:left;"><span style="font-weight:700;">activate real-time alerts</span><span> for logins, withdrawals, and account changes to catch unusual activity quickly</span></p></li><li><p style="text-align:left;margin-bottom:12pt;"><span style="font-weight:700;">audit linked bank accounts, APIs, and integrations</span><span> on a consistent schedule to ensure no unintended connections exist</span></p></li></ul><p style="text-align:justify;margin-bottom:12pt;"><span>While no set of measures can guarantee that incidents never happen, these practices significantly reduce risk and give your team the ability to respond quickly if a problem arises. For enterprises, treating financial platforms as integral parts of your security perimeter rather than “black boxes” managed solely by the vendor is key to maintaining visibility and control.</span></p><br/><h3 style="text-align:justify;margin-bottom:4pt;"><span style="font-weight:700;">What businesses should do next</span></h3><p style="text-align:justify;margin-bottom:12pt;"><span>Incidents like this reveal a gap many organizations overlook. Security controls often focus on stopping external threats, while internal changes, misconfigurations, and third-party platforms get less attention. Yet these are exactly the areas where sensitive data can quietly leak for months.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>From an IT perspective, businesses should treat SaaS platforms as extensions of their own environment. That means actively monitoring user behavior, logging configuration changes, and including those tools in incident response planning. It also requires accepting that mistakes will happen — and designing controls that surface them quickly.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>“At Annexus Technologies, we see time and again that security issues aren’t always caused by hackers. More often, they stem from change without oversight. Routine code updates, permission changes, and integrations can quietly create vulnerabilities if organizations aren’t watching,” says </span><span style="font-weight:700;">Andrew N. Griffiths, CEO of Annexus Technologies</span><span>. “The PayPal incident is a reminder that proactive monitoring and disciplined change management aren’t optional — they’re essential.”</span></p><p style="text-align:justify;margin-bottom:12pt;"><span>For organizations looking to strengthen visibility and control over critical platforms, Annexus Technologies offers comprehensive guidance, security reviews, and monitoring solutions.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-weight:700;">Contact us to learn more:<br/></span><span>✉️ sales@annexustech.ca<br/>📞 (403) 879-4371</span></p><br/></div></div><p></p></div>
</div><div data-element-id="elm_QmNRNtG9QKaN4nw4Wa9_7w" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://booknow.annexustech.com/#/customer/4020452000000028057" target="_blank"><span class="zpbutton-content">BOOK A MEETING NOW</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 24 Feb 2026 08:13:02 -0500</pubDate></item><item><title><![CDATA[Cloud Security Webinar: Eagle Eye Networks]]></title><link>https://www.annexustech.ca/blogs/post/annexus-technologies-and-eagle-eye-networks-host-webinar-on-cloud-security-solutions</link><description><![CDATA[Annexus Technologies, in partnership with Eagle Eye Networks, is excited to announce a comprehensive webinar on &quot;Cloud Security Solutions,&quot; ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_j04J2CbORmaL-a8NqUzBDw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QhbA0OOTTU2V8ZVYOhN6tA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_rHa1HGIjSwaI6WMqIRNXgA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6K04xLn0Q02gRvu6WSKCCw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><p><span style="font-size:14pt;font-style:italic;">Exploring the Future of Cloud Security: &nbsp;</span><span style="font-size:14pt;font-style:italic;color:inherit;">Innovations in AI-Driven Surveillance and Emergency Response</span></p></span></h2></div>
<div data-element-id="elm_EWlv1sH4Tz-q-IXnfBIk0g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><img src="/Webinar%20Cloud%20Security%20Solutions%20Date%20August%2022%20Time%201030%20am.jpg" alt="Webinar Cloud Security Solutions"/><br/></p><p><br/></p><p style="text-align:justify;"><span style="font-size:11pt;">Annexus Technologies, in partnership with Eagle Eye Networks, is excited to announce a comprehensive webinar on &quot;Cloud Security Solutions,&quot; set to take place on August 22 at 10:30 AM Jamaica time. This webinar will delve into the crucial role of cloud-based solutions in enhancing security and streamlining management across multiple locations.</span></p><p><span style="color:inherit;"><span><br/></span></span></p><h3 style="text-align:justify;"><span style="font-size:14pt;font-weight:700;">Why Cloud Security?</span></h3><p><span style="color:inherit;"><span><br/></span></span></p><p style="text-align:justify;"><span style="font-size:11pt;">In our rapidly digitizing world, cloud solutions have become indispensable tools for businesses looking to secure their data and operations. With remote access capabilities, organizations can manage security systems more efficiently, ensuring seamless visibility across various branches. As cybersecurity threats continue to grow, it is imperative for businesses of all sizes to prioritize safeguarding their data against breaches, financial loss, and reputational damage.</span></p><p><span style="color:inherit;"><span><br/></span></span></p><h4 style="text-align:justify;"><span style="font-size:14pt;font-weight:700;">Webinar Highlights</span></h4><p><span style="color:inherit;"><span><br/></span></span></p><p style="text-align:justify;"><span style="font-size:11pt;">Participants in the webinar will gain insights into Eagle Eye Networks' cutting-edge technologies, including:</span></p><p><span style="color:inherit;"><span><br/></span></span></p><ol><li style="font-size:11pt;"><p style="text-align:justify;"><span style="font-size:11pt;">Eagle Eye License Plate Recognition: A high-precision AI model that enhances security by accurately identifying vehicles.</span></p></li><li style="font-size:11pt;"><p style="text-align:justify;"><span style="font-size:11pt;">Smart Video Search: Leveraging AI-based image analysis, this feature allows for rapid and efficient video data retrieval, making it easier to pinpoint relevant footage.</span></p></li><li style="font-size:11pt;"><p style="text-align:justify;"><span style="font-size:11pt;">Improving Emergency Response Times: The webinar will also cover strategies for pre-designating security access for first responders, a vital aspect of improving emergency response effectiveness.</span></p></li></ol><p><span style="color:inherit;"><span><br/></span></span></p><p style="text-align:justify;"><span style="font-size:11pt;">This session is designed for professionals seeking to enhance their understanding of cloud security solutions and the latest advancements in AI-driven security technologies. Whether you're responsible for managing security in a small business or a large enterprise, this webinar will provide valuable information to help you protect your assets and optimize your security infrastructure.</span></p><p><span style="color:inherit;"><span><br/></span></span></p><p style="text-align:justify;"><span style="font-size:14pt;font-weight:700;">How to Register</span></p><p style="text-align:justify;"><span style="font-size:14pt;font-weight:700;"><br/></span></p><p style="text-align:justify;"><span style="font-size:11pt;">Don't miss out on this opportunity to learn from industry experts about the latest in cloud security solutions. Register now to secure your spot in the webinar and take the first step towards enhancing your organization's cybersecurity posture.</span></p><p style="text-align:justify;"><span style="font-size:11pt;">Join us on August 22 at 10:30 AM Jamaica time to explore the future of cloud security with Annexus Technologies and Eagle Eye Networks.</span></p><p><span style="color:inherit;"><span><br/></span></span></p><p style="text-align:justify;"><span style="font-size:11pt;">Stay ahead of the curve and ensure your business is equipped to handle the evolving landscape of cybersecurity threats. We look forward to seeing you there!</span></p></div>
</div><div data-element-id="elm_yXFmBkcfTQ6ElVtgw2dHtw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://us06web.zoom.us/webinar/register/WN_6o2-g0FpQ0mfWXRfulz0uw?_hsenc=p2ANqtz-9a-WjdoXhQBKTo-8oenIfMKiHl7t67WUJd7G1hddkfn0mi6ipwPHNjqFSCSp2Spse8vJiw5uo50FMr3b_shOEbKNOGzw&amp;_hsmi=2#/registration" target="_blank"><span class="zpbutton-content">REGISTER NOW</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 31 Jul 2024 12:00:00 -0400</pubDate></item><item><title><![CDATA[Video Surveillance & AI Analytics for Business]]></title><link>https://www.annexustech.ca/blogs/post/video-surveillance-and-analytics-securing-your-assets-with-annexus</link><description><![CDATA[<img align="left" hspace="5" src="https://www.annexustech.ca/Video Surveillance and Analytics Securing Your Assets with Annexus-1.jpg"/>Annexus Technologies empowers you to make informed decisions promptly with our advanced video surveillance and analytics solutions. Designed to meet y ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_7UEimirXRfSbYZc1Ejp83A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_X_u4I1mIRvaHEJb8xSe7rQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_t2PJf0HoRkmzb_ZulX0QPw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_gg1-3fZuQ8OFmb2IoD4C4g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-style:italic;color:rgb(255, 0, 0);font-size:20px;">Enhancing Security with Cutting-Edge Video Surveillance and Analytics</span><br/></h2></div>
<div data-element-id="elm_hBZRfRI_SOSJD0RQDBeRwQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hBZRfRI_SOSJD0RQDBeRwQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><br/></p><p><img src="/Video%20Surveillance%20and%20Analytics%20Securing%20Your%20Assets%20with%20Annexus.jpg" alt="Video Surveillance and Analytics"/><br/></p><p><br/></p><div><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">Annexus Technologies empowers you to make informed decisions promptly with our advanced video surveillance and analytics solutions. Designed to meet your security needs, our comprehensive offerings include video security, analytics, and access control systems.</span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;"><br/></span></p><h3 style="color:inherit;text-align:justify;"><span style="font-weight:600;font-size:18px;">Introducing Eagle Eye Networks Partnership</span></h3><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">We are thrilled to announce our partnership with Eagle Eye Networks, the global leader in cloud video security. Covering the entire Caribbean region, this partnership aims to revolutionize traditional video surveillance systems by seamlessly integrating video management with the cloud.</span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;"><br/></span></p><h4 style="color:inherit;text-align:justify;"><span style="font-weight:600;font-size:16px;">Eagle Eye Cloud Video Management System</span></h4><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">Experience unparalleled security with the Eagle Eye Cloud Video Management System. This modern cloud-based solution offers seamless cloud management, mobile/web-based viewing, and comprehensive cloud recording capabilities. Say goodbye to traditional surveillance constraints and hello to effortless cloud-based monitoring.</span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;">Eagle Eye Camera Bridges (IP &amp; Analog)</span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">Connect all your cameras, from analog to IP, with ease using Eagle Eye Camera Bridges. These innovative devices offer fast GigE network connectivity and up to 48 hours of video buffering. Whether you have a few cameras or dozens, there's a solution tailored to your needs.</span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;">Eagle Eye Cloud Managed Video Recorders (CMVRs)</span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">Choose from a range of CMVRs to meet your camera capacity and storage requirements. With options for on-site storage and flexible storage durations, Eagle Eye CMVRs provide maximum flexibility and seamless retrieval of video footage.</span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;">Tailored Solutions for Businesses of All Sizes</span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">Eagle Eye Networks caters to businesses large and small, offering customized video solutions to enhance security, productivity, and remote management capabilities. Whether you're upgrading an existing system or installing a new one, we've got you covered.</span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;">Get Started Today</span></p><p style="color:inherit;text-align:justify;"><span style="font-weight:600;font-family:Montserrat, sans-serif;"><br/></span></p><p style="color:inherit;text-align:justify;"><span style="font-family:Montserrat, sans-serif;">Ready to enhance your security infrastructure? Reach out to us for expert guidance, installations, or to request a free quote. Let Annexus Technologies and Eagle Eye Networks safeguard your assets and provide peace of mind.</span></p></div></div>
</div><div data-element-id="elm_M17dnEx4Qyq5ie-80wE5RQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_M17dnEx4Qyq5ie-80wE5RQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://booknow.annexustech.com/#/4020452000000028057" target="_blank"><span class="zpbutton-content">BOOK A MEETING</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 24 Feb 2024 05:23:18 -0500</pubDate></item></channel></rss>