{"id":4013,"date":"2022-04-06T07:10:00","date_gmt":"2022-04-06T06:10:00","guid":{"rendered":"https:\/\/apexsecurity.nl\/?p=4013"},"modified":"2025-01-17T15:01:24","modified_gmt":"2025-01-17T15:01:24","slug":"zo-krijg-je-weer-controle-over-je-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/","title":{"rendered":"Zo krijg je weer controle over je cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4013\" class=\"elementor elementor-4013\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f26fda0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f26fda0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15c761b0\" data-id=\"15c761b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fa621a elementor-widget elementor-widget-text-editor\" data-id=\"57fa621a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>De cyberdreigingen worden steeds groter. Je hebt je IT-partner gevraagd de security te regelen, maar of dat nou ook echt hun expertise is, je betwijfelt het. Tegelijkertijd denkt het management dat het wel losloopt met al die dreigingen. Wat kun je doen om toch controle te krijgen over je cyberbeveiliging?<\/p>\n<h2><strong>Een ton armer<\/strong><\/h2>\n<p>We vertelden het al in <a href=\"https:\/\/www.apexsecurity.nl\/en\/binnen-het-mkb-kunnen-we-echt-het-verschil-maken\/\" target=\"_blank\" rel=\"noopener\">onze vorige blog<\/a>: cybersecurity wordt steeds belangrijker. Toch denken veel ondernemers nog steeds dat ze niet interessant genoeg zijn voor hackers. Geloof ons. E\u00e9n op de twee bedrijven wordt slachtoffer van cybercrime, blijkt uit <a href=\"https:\/\/www.deondernemer.nl\/innovatie\/technologie\/gevaren-cyberaanvallen-mkb-ondernemers-doorlopend-onderschat~290361\" target=\"_blank\" rel=\"noopener\">onderzoek <\/a>onder mkb\u2019ers door financieel dienstverlener Centraal Beheer. Uit hetzelfde onderzoek blijkt dat het vooral de ondernemer zelf is, die zich weinig zorgen maakt. ICT-beheerders zijn zich terdege bewust van het risico. E\u00e9n verkeerde klik, en je belangrijkste bedrijfsproces ligt stil. De schade kan vari\u00ebren van tienduizenden euro\u2019s tot tonnen. Stel je maar eens voor dat een schip van een olieopslagbedrijf een dag aan de kade moet blijven liggen. Dan ben je zo maar een ton armer.<\/p>\n<h2><strong>Slapeloze nachten<\/strong><\/h2>\n<p>Veel van de securityofficers en IT-managers die wij spreken, hebben het gevoel dat ze niet meer \u2018in control\u2019 zijn en dat ze dingen missen. De cyberwereld verandert razendsnel en tegelijkertijd is de tijdsdruk enorm en zijn de budgetten te klein om hulp in huis te halen. Dat leidt tot de nodige kopzorgen. Als de directie al budget vrijmaakt voor security, dan worden er prachtige beveiligingssystemen gekocht, zoals firewalls, antivirus en malwareprotectie. Maar cybersecurity houdt niet op bij aanschaffen en neerzetten. Als die apparatuur niet dag in, dag uit goed wordt beheerd, ben je nog steeds niet goed beschermd. Zonde van de investering dus.<\/p>\n<h2><strong>Niemand wil thuiskomen met een onvoldoende<\/strong><\/h2>\n<p>SPRING &#8211; Security Posture RatING \u2013 is een manier om je securityniveau in een soort rapportcijfer uit te drukken. Het geeft jou als securityofficer een mooie tool in handen om je management te overtuigen dat het tijd is voor actie. Immers, niemand wil thuiskomen met een vier, ook jouw directie niet. Het rapportcijfer is een gewogen gemiddelde van de prestatie van tachtig verschillende securitymaatregelen. Deze methode is gebaseerd op het <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\">Cyber Security Framework van NIST <\/a>en maakt zwakke plekken inzichtelijk. Zo ontstaat een heldere cybersecurity-roadmap, onderbouwd met relevante cijfers, waarmee je heel gericht aan de slag kunt gaan. Zo kun je gaandeweg de vier opkrikken naar een cijfer waar je weer trots op kunt zijn.<\/p>\n<h2><strong>Learn More<\/strong><\/h2>\n<p>Nieuwsgierig hoe je de beveiliging van jouw bedrijf het best naar het volgende niveau kunt tillen? Neem gerust <a href=\"https:\/\/www.apexsecurity.nl\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">vrijblijvend contact <\/a>met ons op. We leren je graag kennen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>De cyberdreigingen worden steeds groter. Je hebt je IT-partner gevraagd de security te regelen, maar of dat nou ook echt hun expertise [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4014,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-4013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Herstel Controle over je Cybersecurity | Apex Security<\/title>\n<meta name=\"description\" content=\"Leer hoe actief beheer en de Security Posture Rating (SPRING) je helpen om je cybersecurity te verbeteren en zwakke plekken te identificeren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Herstel Controle over je Cybersecurity | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Leer hoe actief beheer en de Security Posture Rating (SPRING) je helpen om je cybersecurity te verbeteren en zwakke plekken te identificeren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-06T06:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T15:01:24+00:00\" \/>\n<meta name=\"author\" content=\"Peter Pronk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Pronk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/\"},\"author\":{\"name\":\"Peter Pronk\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\"},\"headline\":\"Zo krijg je weer controle over je cybersecurity\",\"datePublished\":\"2022-04-06T06:10:00+00:00\",\"dateModified\":\"2025-01-17T15:01:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/\"},\"wordCount\":437,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Security Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/\",\"name\":\"Herstel Controle over je Cybersecurity | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2022-04-06T06:10:00+00:00\",\"dateModified\":\"2025-01-17T15:01:24+00:00\",\"description\":\"Leer hoe actief beheer en de Security Posture Rating (SPRING) je helpen om je cybersecurity te verbeteren en zwakke plekken te identificeren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/zo-krijg-je-weer-controle-over-je-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zo krijg je weer controle over je cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\",\"name\":\"Peter Pronk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"caption\":\"Peter Pronk\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petpro\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Herstel Controle over je Cybersecurity | Apex Security","description":"Leer hoe actief beheer en de Security Posture Rating (SPRING) je helpen om je cybersecurity te verbeteren en zwakke plekken te identificeren.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Herstel Controle over je Cybersecurity | Apex Security","og_description":"Leer hoe actief beheer en de Security Posture Rating (SPRING) je helpen om je cybersecurity te verbeteren en zwakke plekken te identificeren.","og_url":"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2022-04-06T06:10:00+00:00","article_modified_time":"2025-01-17T15:01:24+00:00","author":"Peter Pronk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Pronk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/"},"author":{"name":"Peter Pronk","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688"},"headline":"Zo krijg je weer controle over je cybersecurity","datePublished":"2022-04-06T06:10:00+00:00","dateModified":"2025-01-17T15:01:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/"},"wordCount":437,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#primaryimage"},"thumbnailUrl":"","articleSection":["Security Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/","url":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/","name":"Herstel Controle over je Cybersecurity | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#primaryimage"},"thumbnailUrl":"","datePublished":"2022-04-06T06:10:00+00:00","dateModified":"2025-01-17T15:01:24+00:00","description":"Leer hoe actief beheer en de Security Posture Rating (SPRING) je helpen om je cybersecurity te verbeteren en zwakke plekken te identificeren.","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/zo-krijg-je-weer-controle-over-je-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Zo krijg je weer controle over je cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688","name":"Peter Pronk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","caption":"Peter Pronk"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petpro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=4013"}],"version-history":[{"count":2,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4013\/revisions"}],"predecessor-version":[{"id":8549,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4013\/revisions\/8549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=4013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=4013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=4013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}