ftypavifavifmif1miafxmeta!hdlrpictpitmFilocD@+FBbiinfinfeav01infeExif*infemimeapplication/rdf+xmlmiprpNipcocolrprof lcms0mntrRGB XYZ  acspMSFTlcms-lcms dmndjdeschdmddhwtptPrXYZdbXYZxgXYZrTRC gTRC  bTRC chrm$cprt!desclcms generated descsRGBdescsRGBXYZ =XYZ o8XYZ $XYZ bcurv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Kmcurv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Kmcurv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)KmchrmT{L&f\textno copyright, use freely av1C ispepixiipma(irefcdsccdscl3mdat eZ @@Ѐ2QAYǸjUUȞ#pl:Mr(ؙ?c#l? ~84d( ~b`9&ܘdEޏN^YʑgVR%}p +Z7<*N5#H T<^iGCKA&q: 8D ofY/4l!/,ge5Cg1?1zæ `S@@Q2ŖQGA}0MCi T5ڮtJ4/LuCAC%ݖx^z܈֙AWQJB;lli}1¤|qD?pl& jL^Njpil=oלl]&m~O,\iM~[=>_Sd9j0c,*x34 ?Tue~y!K3A'`g (WsR !M?ˍqJwY'7 +"^ U,EBkeӲ:[S(unémhC7 <<ĖQf M.NlN2fo翖:1s(d}K- HۣvO5+6RMwɞHj:KlQ1 `dًq\H}f*=G$ے,U.}1YtX&.j.w 3 ZƎ(YMRE jy4a"Eb3QZMs\ߘGtz3R Awn [##ꚣM}J@- P7GBzꆳt&!yus˻5Je' ,J/bZso\ټ)Sg\:ja+݋̈Iy'WФi^Dܳ4%$۫Bb5c:5M釼wh/E V2pSӰt$M^2X GSfOyBVY<ϼ܂J]|>trsߍi%u+t e8Ps̼'xh]IS[:6zwp6xq#?T@gLit8K̢[yA!oN+o٬ mL OFﲤ|)5/ Í-ߚuT̸9GgAūadFE/*[+bc<#eOß/nSq1P09/aHTy5x-p&-3Ʈ @ZaPv\E[\ 6~/nBgIaw g|L#._So42IvOfpӱfȬUVlGa)-WCz_;'H]h۸|yE'K qM I꤃{X^Nø:+i0b-@v$%<@E:h5/2V%$ARU3\7pb 0(&IhUq9?k@3֟A==Hܼ%&ѯ;*5cOռ#ؾê#{}dmj-vTӪI7w;7zw[Y>emLֺԘ3[h&֒ ՂǺ ˫_E sXG^~C 'Nv0Iސǰ{"@U ۪!]Q^Xuy VHMW<))*щz9/!%Jwc6t]y,7aQ]<!2 Ki z*Wm]Z}Lq]+ O h?;i>i 0bNOnmIX⠇i-=;@ӟ.Cdm]u%.' A]ML! o'ܖnQO~T8>Go&vN=:wxֿ%ңgFPV^i$H`#٢A!~)/|F Nt0}!#?enK0I0&?\m*o/La0t)wr\Kvg^KBᴅo@{,L2ܷ,)0>(Ν]srV/̫k1]=̫\xu%cL~EzftCP1uÞ&$ ,Ef`MS-ht@υ֛(SŲ;;iʕfeez0gLXrRvE:4URDY_O7yDkc"MiK4R=y hIzSJC8~8CxsAo٬ T"LK*5Up5߅+\&ả@dn >*R~{4OͼmI\wqN]Ә2*(OcPkUG5cx0Gȇ4O qĎ5Q_p=~v8K [" +NSz[o}}5_~~m8 6x4C87&t ܽo)pRuBx9bъ%wHs>7sU-@N]ɨZ(N7l>Jp('\30;޻P+wOJ)& ǖu}'c=d =aTٴtQȒϚzҫ8D-E~W~J .W,{@b`Ƿ8`9g8Oc30SExifMM* r (132ԇi蜛X蜟 DCybersecurity checklist concept with digital checkmarks and shield lock icon, symbolizing data protection, privacy, encryption, and compliance for business, cloud security, and secure online systems.NIKON CORPORATIONNIKON D810Adobe Photoshop Lightroom Classic 14.5.1 (Windows)2025:09:27 13:53:48%"'d00231Β     2   1"2*4J2014:01:01 06:37:422014:01:01 13:37:42yXB@  3|3|2041798    50.0 mm f/1.8Cybersecurity checklist concept with digital checkmarks and shield lock icon, symbolizing data protection, privacy, encryption, and compliance for business, cloud security, and secure online systems.access; authentication; big data; breach; checklist; cloud; communication; compliance; computer; confidential; connection; control; cyber; cyberspace; data; database; encryption; fingerprint; firewall; futuristic; hacker; identity; information; interface; key; lock; malware; network; online; padlock; password; phishing; privacy; private; programming; protection; ransomware; safe; safety; security; security system; server; shield; software; spyware; surveillance; system; task; techCybersecurity checklist concept with digital checkmarks and shield lock icon, symbolizing data protection, privacy, encryption, and compliance for business, cloud security, and secure online systems.  ( HHC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222b! }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?z+s0.itڍ%޺I,13 I.|<Vvnb]RXM@qḊ s4+b@+'/]랜[:+RJJ+S((XX˨]),ƚh$%YP\[OM4%ŧPF{\b"r84hʖyfnm_*D U QV8X<Jp1upہ6z!X%#!nݏr3Q?җƮzlZe= SkM69"s,3)GGVPv.I8Hix :pqIYjYh[d/(r7"cmehX.NcR9h!7^0rbAru]uȭe&i&n pwA5ʝkwc+"2ΌUx,J>MZ홷Z$lqjM-R s,鴬gvxOSiBv9Ui-r1V,Q8.۷jlqZt:Kj,$"pzdsV4HRDIgp1@3\y{G:uK^^R]a.т-ln#@oDtQ$?/=+*7Sot)suo[u5<* gt=}ʺdR*DB1 0Dڔl{o G)q1 NWrhFʌqO^n;jM3 J7 (CCMOYDĴpvl{{]M2F~Xި褽jmRK[ybx%s滹vLTSV-_u+!<Ō~o$S oÆq84y-kZMkXgQvI>waz8kk& ʴcqVqx=ZHcg9Sfާ~pKMq=Ɉ2# 6's0'zKO5R` [F}Jwc6lvg$>Mݳ@O ҵ7v7'x 3BR6>0qVIc_\4X7NvGֹ=pN-q0%W{Kv>< 9ct*u&16Ҧ:u$hT$V19l&;s=UMӺMn#c|`+zP[K׈ð#sS(5;hS椏/!GYI3fhqB*TlSh5HQ]Fsߊ˽z:m{]F׽-hvGzm{"ԇΏȐ;g)^yK-Ɗ,09^te%:T=eQ `\&LW aI@zqVhnn&,OC*턹ϊ4q༻2FL|ӌ:FR}Z<ZJa8#c )H:!oKn\)98'L9. XAXd ;Sr} WPzZBp1Y'`2kUɤ8>Ѭ,{p$VںG#F|9뚻]XW^ݯٯ%oY7\jPk@>9?sȨWṊ)@.a%?3Ԛ[w󣕢L͗A18a}UE{t|֍r`a4e 'qz✓eiu.$]rnUdc=23XbFʞzjrMח)5PI<ͣZC1 bRV-m6awp ևT#穥 \L#v:}{P@sQxصO7CTW"ҩVcNl(IkMk+S]$Dv-%ҭl&d]٫ GzwP fc6G9&oEG4^4r]3g>Pk*\>wiktcc0aq&#>= c ]'i$~"犨LdG9  d͈fAq洭5'pTVR:fx[;W+]LMM8YҵNd)QZE%-=)pkBMҚ$cjboʨB#wk.G57f%N+zZ p aq$3Eaj6Ip"3@ ''bj# FAGJJ@PQ@-%ZeT"⮏H<~PSP%n {:imMd@gC}NI9(@ 53/100 True 66155 True 50.0 mm f/1.8 176 500/10 500/10 18/10 18/10 2041798 True chaylek Cybersecurity checklist concept with digital checkmarks and shield lock icon, symbolizing data protection, privacy, encryption, and compliance for business, cloud security, and secure online systems. image/jpeg chaylek/Vecteezy Cybersecurity checklist concept with digital checkmarks and shield lock icon, symbolizing data protection, privacy, encryption, and compliance for business, cloud security, and secure online systems. 65535 50.0 mm f/1.8 500/10 2041798 37 37 37 protection shield compliance key lock virus confidential safety workflow task ransomware checklist technology authentication programming breach spyware malware server data hacker connection padlock access encryption cyberspace security system identity web fingerprint cyber safe big data private surveillance control interface phishing database network system tech software futuristic cloud password online firewall communication privacy computer information security 2014-01-01T13:37:42.037 https://www.vecteezy.com/-/71433679-cybersecurity-checklist-concept-with-digital-checkmarks-and-shield-lock-icon-symbolizing-data-protection-privacy-encryption-and-compliance-for-business-cloud-security-and-secure-online-systems?utm_source=iptc%26utm_medium%3Dgoogleimages%26utm_campaign%3Dimage 2014-01-01T13:37:42 Adobe Photoshop Lightroom Classic 14.5.1 (Windows) 2025-09-27T13:53:48+07:00 2025-09-27T13:53:48+07:00 0 adobe:docid:photoshop:615075b5-c077-a94d-8fd7-a037d65ad7a5 xmp.iid:0acdb8a2-906f-8842-aefc-0ec489ce8071 529FE93A762063466E042B4B13C7CA1A xmp.did:0d752d53-32b0-614c-a1b5-da8f2e95aa3e derived converted from image/x-nikon-nef to image/tiff saved / xmp.iid:4dc05c79-7762-e440-a065-38c959e5d731 Adobe Photoshop Camera Raw 17.5 (Windows) 2025-09-27T13:37:50+07:00 saved / xmp.iid:0acdb8a2-906f-8842-aefc-0ec489ce8071 Adobe Photoshop 25.12 (Windows) 2025-09-27T13:53:33+07:00 derived converted from image/tiff to image/jpeg, saved to new location saved / xmp.iid:0d752d53-32b0-614c-a1b5-da8f2e95aa3e Adobe Photoshop Lightroom Classic 14.5.1 (Windows) 2025-09-27T13:53:48+07:00 xmp.iid:0d752d53-32b0-614c-a1b5-da8f2e95aa3e 529FE93A762063466E042B4B13C7CA1A _DSC0654.NEF https://www.vecteezy.com/licensing True 0 0 0 0 Embedded 54650A341B5B5CCAE8442D0B43A92BCE 0 50 0 0 0 0 0 0 0 0 0 -50.000000 0 False 0 1 1 0 0 1 0 0 60 40 0 70 30 0 0.00 0 0 0 0 False True 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 False 0 75 0 0 50 25 0 0 0 0.0 100 0 0 0.00 0.00 -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000, -1.000000 0 15.4 _DSC0654-Edit.tif 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Linear 0, 0 255, 255 0, 0 255, 255 0, 0 255, 255 0, 0 255, 255 17.5 0 0 As Shot 0