42 Computer services, namely, remote management of information technology (IT) systems for others; computer technology support services, namely, help desk services; providing cyber technology solutions, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, providing security and anonymity for electronically transmitted credit card transactions; consulting in the field of information technology; computer forensic services, including providing strategy, design and implementation of forensic laboratories; technical support and consulting services in the fields of computer security, vulnerability of computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security software systems for others; information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; providing technology solutions related to cyber-security, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, updating of computer software relating to computer security and prevention of computer risks, hard drive erasure