Two-factor authentication services; audit services; assessment of entities for compliance including on-line merchants, payment processors and service providers; attestations of compliance services; cloud security reviews; threat and risk assessment services; authentication and certification services for computer security; cloud computing services; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; cloud review services; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security engineering; computer security services (testing and risk assessment of computer networks); computer services, namely, consultation in the field of computer hacker countermeasures; computer security system monitoring services; computer virus protection services; computer security threat analysis for protecting data; conducting incident management services; conducting security assessments of cloud computing environments; conducting phishing testing; conducting phishing test services; conducting security testing; conducting social engineering testing; conducting social engineering testing services; conducting web application firewall services; cyber security services; cyber security intelligence advice; cyber security intelligence services; data security advice; data security services (firewalls); digital security; digital security services; forensic investigation services; gap-analysis and remediation services; computer security services; computer security audit services; computer security audits for detection, blocking, and facilitating removal and remediation of cyber-attacks; computer security advice relating to impersonation attacks; computer information security; computer information security advice; computer information security services; information technology services; information technology security services in the nature of providing network access to cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications; computer incident management services; computer incident management advice; internet security services; managed cyber security services; managed hosting services; managed computer security; managed computer security services; mitigation of computer risks services; monitoring of computer systems for security purposes; network security services (test and risk assessment of electronic networks); payment card industry data security compliance and reporting requirements services; payment card industry data security audits; payment card industry data security audits for the detection, blocking, and facilitating removal and remediation of cyber-attacks; computer penetration testing services; payment card industry data security standard assessor services; pen testing services; phishing test services; phishing testing services; prevention of computer impersonation attack services; prevention of ransomware services; prevention of ransomware attack services; providing network penetration testing, address spoofing and analysis of computer networks and software programs for security risks and vulnerability; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; ransomware attack advice; secure hosting services; managed hosting services; security advice, namely internet security advice; security advice services, namely internet security services; security assessments, namely internet security assessments; security assessments services, namely internet assessment services; security assessment services for computer networks; security audits, namely internet security audits; security awareness advice relating to computer systems; security risk assessment services relating to computer systems; security reviews relating to computer systems; security review services relating to internet security review services; security testing relating to computer networks; security testing services relating to computer networks; social engineering test services; technical consulting services related to designing, developing, customising, configuring, deploying, installing, maintaining, analysing, integrating, repairing, and managing of cyber-security systems for others; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; technical support services, namely troubleshooting of computer software problems; testing of data security practices and procedures for compliance with best practice; web application firewalls; web application firewall services; web application firewall advice; updating and maintaining computer software for others; security architecture and design services; public key infrastructure integration services; single sign on integration services; design of security policies, plans and procedures relating to computing; review of security policies, plans and procedures relating to computing; computer security consultancy