{"id":4028,"date":"2022-05-12T14:38:40","date_gmt":"2022-05-12T13:38:40","guid":{"rendered":"https:\/\/apexsecurity.nl\/?p=4028"},"modified":"2025-01-17T14:56:05","modified_gmt":"2025-01-17T14:56:05","slug":"cybersecurity-geen-kwestie-van-set-it-and-forget-it","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/","title":{"rendered":"Cybersecurity. Geen kwestie van &#8220;Set it and Forget it&#8221;"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4028\" class=\"elementor elementor-4028\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f26fda0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f26fda0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15c761b0\" data-id=\"15c761b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fa621a elementor-widget elementor-widget-text-editor\" data-id=\"57fa621a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity gaat verder dan alleen het installeren van de juiste technische apparaten. Na de implementatie is beheer prioriteit nummer 1. Het goed beheren van een beveiligingsoplossing kost veel tijd. Immers, om effectief te zijn is dagelijkse controle en voortdurende verbetering noodzakelijk. In de waan van de dag schiet dit er vaak bij in. Begrijpelijk, maar het kan wel tot veel schade leiden. Wat kun je doen om die \u2018set it and forget it\u2019-mentaliteit te voorkomen en tot een effici\u00ebnte verbetercyclus te komen?<\/p><h2><strong>Basisimplementatie<\/strong><\/h2><p>Als wij met potenti\u00eble klanten in gesprek gaan over hun IT-beveiliging, horen we vaak dat die dik in orde is, \u2018want onze IT-partner heeft een firewall ge\u00efnstalleerd\u2019. Als we dan vragen of we even een kijkje in de keuken mogen nemen, blijkt de configuratie vaak niet optimaal te zijn. De betreffende IT-partner heeft bij gebrek aan kennis van security een basisimplementatie gedaan en daar blijft het dan bij. Security is een vak apart en een partner die goed is in IT-beheer hoeft nog geen vergaande kennis van security te hebben.<\/p><h2><strong>Inrichten en monitoren van firewall<\/strong><\/h2><p>Als wij dan naar de securitymanager terugkoppelen wat er allemaal beter kan, leidt dat nogal eens tot verbaasde gezichten. Logisch, want als je denkt een goede firewall aan te schaffen, ga je er ook vanuit dat het met je beveiliging wel goed zit. Het aanschaffen van zo\u2019n firewall is echter de makkelijkste stap, daarna moet je die omgeving niet alleen goed inrichten, je moet het ook monitoren en continu verbeteren. Vanuit een goeie securityarchitectuur kun je, met behulp van wat monitoring zaken steeds verder verbeteren. Een goede architectuur zorgt dat je sneller begrijpt wat de resultaten van monitoring je willen vertellen, waardoor je sneller kunt handelen. Interpreteren, handelen en continu verbeteren, daar draait het om.<\/p><h2><strong>Continu verbeteren voorkomt problemen<\/strong><\/h2><p>Beheerders hebben vaak geen tijd om naar de meldingen te kijken. Er staan niet heel vaak serieuze meldingen tussen, daardoor zakt het monitoren van de meldingen gestaag naar de onderkant van de agenda, om er vervolgens vanaf te vallen. Toch is het nodig. Je moet voortdurend controleren of er iets te verbeteren valt. Dat is geen eenmalige actie, dat is een cyclus.<\/p><h2><strong>Snel ingrijpen<\/strong><\/h2><p>Omdat wij niet anders doen dan ons druk maken om beveiligingsoplossingen, hebben wij het verwerken van dergelijke meldingen kunnen automatiseren. Ons <a href=\"https:\/\/www.apexsecurity.nl\/en\/diensten\/\" target=\"_blank\" rel=\"noopener\">monitoringsysteem<\/a> houdt je omgeving 24\/7 in de gaten en vist de &#8216;zware gevallen&#8217; waar actie op nodig is er automatisch uit. Dankzij die voortdurende monitoring kunnen we heel snel ingrijpen. Toch een lekker gevoel, als je <a href=\"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">controle hebt over je cybersecurity<\/a>.<\/p><h2><strong>Learn More<\/strong><\/h2><p>Nieuwsgierig hoe je de beveiliging van jouw bedrijf het best naar het volgende niveau kunt tillen? Neem gerust <a href=\"https:\/\/www.apexsecurity.nl\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">vrijblijvend contact <\/a>met ons op. We leren je graag kennen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity gaat verder dan alleen het installeren van de juiste technische apparaten. Na de implementatie is beheer prioriteit nummer 1. Het goed [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5066,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-4028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity: Actief Beheer Is Essentieel | Apex Security<\/title>\n<meta name=\"description\" content=\"Actief beheer en voortdurende verbetering zijn cruciaal voor effectieve cybersecurity. Vermijd de &#039;set it and forget it&#039;-mentaliteit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: Actief Beheer Is Essentieel | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Actief beheer en voortdurende verbetering zijn cruciaal voor effectieve cybersecurity. Vermijd de &#039;set it and forget it&#039;-mentaliteit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-12T13:38:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T14:56:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/05\/shutterstock_1439127266-1-1024x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Peter Pronk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Pronk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/\"},\"author\":{\"name\":\"Peter Pronk\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\"},\"headline\":\"Cybersecurity. Geen kwestie van &#8220;Set it and Forget it&#8221;\",\"datePublished\":\"2022-05-12T13:38:40+00:00\",\"dateModified\":\"2025-01-17T14:56:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/\"},\"wordCount\":465,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/shutterstock_1439127266-1-1024x512-1.jpg\",\"articleSection\":[\"Security Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/\",\"name\":\"Cybersecurity: Actief Beheer Is Essentieel | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/shutterstock_1439127266-1-1024x512-1.jpg\",\"datePublished\":\"2022-05-12T13:38:40+00:00\",\"dateModified\":\"2025-01-17T14:56:05+00:00\",\"description\":\"Actief beheer en voortdurende verbetering zijn cruciaal voor effectieve cybersecurity. Vermijd de 'set it and forget it'-mentaliteit.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/shutterstock_1439127266-1-1024x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/shutterstock_1439127266-1-1024x512-1.jpg\",\"width\":1024,\"height\":512,\"caption\":\"Cybersecurity. Geen kwestie van \\\"Set it and Forget it\\\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity. Geen kwestie van &#8220;Set it and Forget it&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\",\"name\":\"Peter Pronk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"caption\":\"Peter Pronk\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petpro\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: Actief Beheer Is Essentieel | Apex Security","description":"Actief beheer en voortdurende verbetering zijn cruciaal voor effectieve cybersecurity. Vermijd de 'set it and forget it'-mentaliteit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: Actief Beheer Is Essentieel | Apex Security","og_description":"Actief beheer en voortdurende verbetering zijn cruciaal voor effectieve cybersecurity. Vermijd de 'set it and forget it'-mentaliteit.","og_url":"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2022-05-12T13:38:40+00:00","article_modified_time":"2025-01-17T14:56:05+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/05\/shutterstock_1439127266-1-1024x512-1.jpg","type":"image\/jpeg"}],"author":"Peter Pronk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Pronk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/"},"author":{"name":"Peter Pronk","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688"},"headline":"Cybersecurity. Geen kwestie van &#8220;Set it and Forget it&#8221;","datePublished":"2022-05-12T13:38:40+00:00","dateModified":"2025-01-17T14:56:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/"},"wordCount":465,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/05\/shutterstock_1439127266-1-1024x512-1.jpg","articleSection":["Security Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/","url":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/","name":"Cybersecurity: Actief Beheer Is Essentieel | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/05\/shutterstock_1439127266-1-1024x512-1.jpg","datePublished":"2022-05-12T13:38:40+00:00","dateModified":"2025-01-17T14:56:05+00:00","description":"Actief beheer en voortdurende verbetering zijn cruciaal voor effectieve cybersecurity. Vermijd de 'set it and forget it'-mentaliteit.","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#primaryimage","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/05\/shutterstock_1439127266-1-1024x512-1.jpg","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/05\/shutterstock_1439127266-1-1024x512-1.jpg","width":1024,"height":512,"caption":"Cybersecurity. Geen kwestie van \"Set it and Forget it\""},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity. Geen kwestie van &#8220;Set it and Forget it&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688","name":"Peter Pronk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","caption":"Peter Pronk"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petpro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=4028"}],"version-history":[{"count":3,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4028\/revisions"}],"predecessor-version":[{"id":8547,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4028\/revisions\/8547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media\/5066"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=4028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=4028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=4028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}