{"id":4087,"date":"2022-07-20T14:38:04","date_gmt":"2022-07-20T13:38:04","guid":{"rendered":"https:\/\/apexsecurity.nl\/?p=4087"},"modified":"2025-01-17T14:40:52","modified_gmt":"2025-01-17T14:40:52","slug":"hoe-monitoring-schade-kan-voorkomen","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/hoe-monitoring-schade-kan-voorkomen\/","title":{"rendered":"Hoe monitoring schade kan voorkomen"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4087\" class=\"elementor elementor-4087\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f26fda0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f26fda0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15c761b0\" data-id=\"15c761b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fa621a elementor-widget elementor-widget-text-editor\" data-id=\"57fa621a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Het aanschaffen van een firewall is \u00e9\u00e9n ding, maar daarmee ben je er niet. Vervolgens moet je je omgeving goed inrichten \u00e9n zorgvuldig monitoren. Als je afwijkend gedrag in systemen snel herkent en gepaste actie neemt, blijven de gevolgen beperkt. Zo voorkom je met vroege detectie ernstige schade veroorzaakt door cyberaanvallen.<\/p><h2><strong>Meldingen vragen om actie<\/strong><\/h2><p>We schreven het al <a href=\"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/\" target=\"_blank\" rel=\"noopener\">eerder<\/a>, cybersecurity is geen kwestie van \u2018set it and forget it\u2019. Het installeren van het juiste technische apparaat, dat is nog maar het begin. Vervolgens moet je zo\u2019n apparaat goed beheren en meldingen die uit zo\u2019n apparaat komen, moeten natuurlijk wel snel opgepakt worden, anders heb je er nog niets aan. Immers, als je <a href=\"https:\/\/www.apexsecurity.nl\/en\/je-huis-verzeker-je-toch-ook-voor-het-in-brand-staat\/\" target=\"_blank\" rel=\"noopener\">rookmelder<\/a> afgaat, ga je ook niet op zoek naar gehoorbescherming, dan zoek je naar de oorzaak zodat je verdere schade kunt voorkomen. Hoe eerder je dat doet, hoe beter je er vanaf komt.<\/p><h2><strong>Combineer monitoring met slimme technologie<\/strong><\/h2><p>Door een kwetsbaarheidsscanner te gebruiken, kun je je netwerk voortdurend \u2013 van binnen en van buiten \u2013 monitoren. Als je alle gegevens van kwetsbaarheden op \u00e9\u00e9n plek verzamelt, kan dat nogal overweldigend zijn. Niet alle meldingen zijn even dringend, en het risico is dat het monitoren van alle meldingen al snel naar de achtergrond verdwijnt. Door slimme technologie\u00ebn als kunstmatige intelligentie in te zetten, krijg je meer inzicht in welke kwetsbaarheden snel aangepakt moeten worden en bij welke de kans dat het wordt uitgebuit niet zo groot is.<\/p><h2><strong>Binnen twintig minuten inzicht<\/strong><\/h2><p>Wij houden ons de hele dag bezig met beveiligingsoplossingen. Ons slimme <a href=\"https:\/\/www.apexsecurity.nl\/en\/diensten\/\" target=\"_blank\" rel=\"noopener\">monitoringsysteem<\/a> \u2013 in combinatie met AI \u2013 automatiseert het verwerken van meldingen. Op het moment dat een nieuwe kwetsbaarheid bekend wordt, wordt een aparte scantemplate aangemaakt en weet je binnen twintig minuten welk deel van je omgeving kwetsbaar is. Dat gaat een stuk sneller dan dagenlang alle servers nalopen met een scriptje. Zo hou je volledige <a href=\"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">controle over je cybersecurity<\/a>.<\/p><h2><strong>Learn More<\/strong><\/h2><p>Benieuwd naar ons slimme <a href=\"https:\/\/www.apexsecurity.nl\/en\/diensten\/\" target=\"_blank\" rel=\"noopener\">monitoringsysteem<\/a>? Wil je weten hoe je de beveiliging van jouw bedrijf het best naar het volgende niveau kunt tillen? Neem gerust <a href=\"https:\/\/www.apexsecurity.nl\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">vrijblijvend contact <\/a>met ons op. We leren je graag kennen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Het aanschaffen van een firewall is \u00e9\u00e9n ding, maar daarmee ben je er niet. Vervolgens moet je je omgeving goed inrichten \u00e9n [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-4087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-monitoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hoe Monitoring Schade Kan Voorkomen | Apex Security<\/title>\n<meta name=\"description\" content=\"Leer hoe het zorgvuldig monitoren van je IT-omgeving kan helpen om schade door cyberaanvallen te voorkomen en de gevolgen te beperken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/hoe-monitoring-schade-kan-voorkomen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hoe Monitoring Schade Kan Voorkomen | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Leer hoe het zorgvuldig monitoren van je IT-omgeving kan helpen om schade door cyberaanvallen te voorkomen en de gevolgen te beperken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/hoe-monitoring-schade-kan-voorkomen\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-20T13:38:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T14:40:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/07\/shutterstock_1739619152-1-1024x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Peter Pronk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Pronk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/\"},\"author\":{\"name\":\"Peter Pronk\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\"},\"headline\":\"Hoe monitoring schade kan voorkomen\",\"datePublished\":\"2022-07-20T13:38:04+00:00\",\"dateModified\":\"2025-01-17T14:40:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/\"},\"wordCount\":355,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/shutterstock_1739619152-1-1024x512-1.jpg\",\"articleSection\":[\"Security Monitoring\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/\",\"name\":\"Hoe Monitoring Schade Kan Voorkomen | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/shutterstock_1739619152-1-1024x512-1.jpg\",\"datePublished\":\"2022-07-20T13:38:04+00:00\",\"dateModified\":\"2025-01-17T14:40:52+00:00\",\"description\":\"Leer hoe het zorgvuldig monitoren van je IT-omgeving kan helpen om schade door cyberaanvallen te voorkomen en de gevolgen te beperken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/shutterstock_1739619152-1-1024x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/shutterstock_1739619152-1-1024x512-1.jpg\",\"width\":1024,\"height\":512,\"caption\":\"shutterstock_1739619152-1-1024x512\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/hoe-monitoring-schade-kan-voorkomen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hoe monitoring schade kan voorkomen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\",\"name\":\"Peter Pronk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"caption\":\"Peter Pronk\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petpro\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hoe Monitoring Schade Kan Voorkomen | Apex Security","description":"Leer hoe het zorgvuldig monitoren van je IT-omgeving kan helpen om schade door cyberaanvallen te voorkomen en de gevolgen te beperken.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/hoe-monitoring-schade-kan-voorkomen\/","og_locale":"en_US","og_type":"article","og_title":"Hoe Monitoring Schade Kan Voorkomen | Apex Security","og_description":"Leer hoe het zorgvuldig monitoren van je IT-omgeving kan helpen om schade door cyberaanvallen te voorkomen en de gevolgen te beperken.","og_url":"https:\/\/www.apexsecurity.nl\/en\/hoe-monitoring-schade-kan-voorkomen\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2022-07-20T13:38:04+00:00","article_modified_time":"2025-01-17T14:40:52+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/07\/shutterstock_1739619152-1-1024x512-1.jpg","type":"image\/jpeg"}],"author":"Peter Pronk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Pronk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/"},"author":{"name":"Peter Pronk","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688"},"headline":"Hoe monitoring schade kan voorkomen","datePublished":"2022-07-20T13:38:04+00:00","dateModified":"2025-01-17T14:40:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/"},"wordCount":355,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/07\/shutterstock_1739619152-1-1024x512-1.jpg","articleSection":["Security Monitoring"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/","url":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/","name":"Hoe Monitoring Schade Kan Voorkomen | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/07\/shutterstock_1739619152-1-1024x512-1.jpg","datePublished":"2022-07-20T13:38:04+00:00","dateModified":"2025-01-17T14:40:52+00:00","description":"Leer hoe het zorgvuldig monitoren van je IT-omgeving kan helpen om schade door cyberaanvallen te voorkomen en de gevolgen te beperken.","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#primaryimage","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/07\/shutterstock_1739619152-1-1024x512-1.jpg","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/07\/shutterstock_1739619152-1-1024x512-1.jpg","width":1024,"height":512,"caption":"shutterstock_1739619152-1-1024x512"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/hoe-monitoring-schade-kan-voorkomen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Hoe monitoring schade kan voorkomen"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688","name":"Peter Pronk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","caption":"Peter Pronk"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petpro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=4087"}],"version-history":[{"count":3,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4087\/revisions"}],"predecessor-version":[{"id":8542,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4087\/revisions\/8542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media\/5077"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=4087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=4087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=4087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}