{"id":4247,"date":"2022-09-26T10:22:11","date_gmt":"2022-09-26T09:22:11","guid":{"rendered":"https:\/\/apexsecurity.nl\/?p=4247"},"modified":"2025-01-17T13:46:41","modified_gmt":"2025-01-17T13:46:41","slug":"cybersecurity-uitbesteden-waarom-zou-je","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-uitbesteden-waarom-zou-je\/","title":{"rendered":"Cybersecurity uitbesteden waarom zou je?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4247\" class=\"elementor elementor-4247\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f26fda0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f26fda0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15c761b0\" data-id=\"15c761b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fa621a elementor-widget elementor-widget-text-editor\" data-id=\"57fa621a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Veel grote corporate ondernemingen hebben hun eigen securityafdeling. Binnen het mkb is dat vaak anders. \u00d3f security bungelt ergens onder aan de agenda, \u00f3f het is uitbesteed aan een IT-partner. Maar cybersecurity is een vak apart en vraagt om speciale expertise. In deze blog geven we je vijf redenen om je cybersecurity uit te besteden aan experts.<\/p><h2><strong>1. Cybersecurity is een vak apart<\/strong><\/h2><p>Veel bedrijven besteden cybersecurity uit aan de IT-partij die ook hun werkplekken beheert. Zij weten alles van opslag, virtualisatie, werkplekken en de cloud, maar kijken niet naar de wereld met de securityogen van een securityexpert. Dat begint al bij de segmentering van je netwerk. Waar een IT-beheerpartij alles al snel in een zogenaamd plat netwerk zal zetten, zal een securityexpert je netwerk segmenteren. Als je dan besmetting hebt, is niet direct je hele netwerk besmet.<\/p><h2><strong>2. Je haalt meer uit je investering<\/strong><\/h2><p>E\u00e9n op de twee bedrijven wordt slachtoffer van cybercrime, blijkt uit <a href=\"https:\/\/www.deondernemer.nl\/innovatie\/technologie\/gevaren-cyberaanvallen-mkb-ondernemers-doorlopend-onderschat~290361\" target=\"_blank\" rel=\"noopener\">onderzoek onder mkb\u2019ers<\/a>. Toch maken maar weinig mkb\u2019ers zich zorgen. Als er al budget vrij wordt gemaakt voor security, dan wordt dat besteed aan firewalls, antivirus en malwareprotectie. Maar met het neerzetten van een paar beveiligingssystemen ben je er niet. Die apparatuur moet je <a href=\"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-geen-kwestie-van-set-it-and-forget-it\/\" target=\"_blank\" rel=\"noopener\">goed beheren<\/a>, elke dag weer. Dan pas haal je echt waarde uit je investering.<\/p><h2><strong>3. Je kunt snel ingrijpen<\/strong><\/h2><p>Al die apparaten genereren meldingen. Een IT-beheerpartij heeft vaak helemaal geen tijd om boven op die meldingen te zitten. Bovendien ontbreekt het vaak aan kennis om ze ook nog eens goed te interpreteren. Een goede cybersecurity-professional heeft het verwerken van dergelijke meldingen geautomatiseerd. Zo houdt ons <a href=\"https:\/\/www.apexsecurity.nl\/en\/diensten\/\" target=\"_blank\" rel=\"noopener\">monitoringsysteem<\/a> je omgeving 24\/7 in de gaten en kunnen we heel snel ingrijpen.<\/p><h2><strong>4. Je cybersecurity is toekomstbestendig<\/strong><\/h2><p>Een echte securityexpert maakt een duidelijke cybersecurity-roadmap, onderbouwd met relevante cijfers. Daarmee kun je heel gericht aan de slag en kun je je bedrijf stap voor stap naar het hoogste niveau van beveiliging brengen.<\/p><h2><strong>5. Je bent weer in control<\/strong><\/h2><p>Technologie verandert razendsnel en de cyberwereld verandert mee. Wij spreken regelmatig security-officers en IT-managers die het gevoel hebben dat ze dingen missen. Ze voelen zich niet meer \u2018in control\u2019 en hebben tegelijkertijd te maken met een enorme tijdsdruk en krappe budgetten. Door je cybersecurity uit te besteden aan echte experts, krijg je weer <a href=\"https:\/\/www.apexsecurity.nl\/en\/zo-krijg-je-weer-controle-over-je-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">controle over je cybersecurity<\/a>.<\/p><h2><strong>Learn More<\/strong><\/h2><p>Nieuwsgierig hoe je de beveiliging van jouw bedrijf het best naar het volgende niveau kunt tillen? Neem gerust <a href=\"https:\/\/www.apexsecurity.nl\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">vrijblijvend contact<\/a> met ons op. We leren je graag kennen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Veel grote corporate ondernemingen hebben hun eigen securityafdeling. Binnen het mkb is dat vaak anders. \u00d3f security bungelt ergens onder aan de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5083,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-4247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Waarom Cybersecurity Uitbesteden? | Apex Security<\/title>\n<meta name=\"description\" content=\"Ontdek vijf redenen waarom het uitbesteden van cybersecurity aan experts uw organisatie ten goede komt. Lees verder!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-uitbesteden-waarom-zou-je\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Waarom Cybersecurity Uitbesteden? | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Ontdek vijf redenen waarom het uitbesteden van cybersecurity aan experts uw organisatie ten goede komt. Lees verder!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-uitbesteden-waarom-zou-je\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-26T09:22:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T13:46:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/09\/Apex_2219_blog-1024x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Peter Pronk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Pronk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/\"},\"author\":{\"name\":\"Peter Pronk\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\"},\"headline\":\"Cybersecurity uitbesteden waarom zou je?\",\"datePublished\":\"2022-09-26T09:22:11+00:00\",\"dateModified\":\"2025-01-17T13:46:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Apex_2219_blog-1024x512-1.jpg\",\"articleSection\":[\"Security Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/\",\"name\":\"Waarom Cybersecurity Uitbesteden? | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Apex_2219_blog-1024x512-1.jpg\",\"datePublished\":\"2022-09-26T09:22:11+00:00\",\"dateModified\":\"2025-01-17T13:46:41+00:00\",\"description\":\"Ontdek vijf redenen waarom het uitbesteden van cybersecurity aan experts uw organisatie ten goede komt. Lees verder!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Apex_2219_blog-1024x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Apex_2219_blog-1024x512-1.jpg\",\"width\":1024,\"height\":512,\"caption\":\"Security concept with person increasing the protection level by turning a knob. Selecting highest defence against cyber attack. Digital crime and data privacy on internet. Cybersecurity.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/cybersecurity-uitbesteden-waarom-zou-je\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity uitbesteden waarom zou je?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\",\"name\":\"Peter Pronk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"caption\":\"Peter Pronk\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petpro\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Waarom Cybersecurity Uitbesteden? | Apex Security","description":"Ontdek vijf redenen waarom het uitbesteden van cybersecurity aan experts uw organisatie ten goede komt. Lees verder!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-uitbesteden-waarom-zou-je\/","og_locale":"en_US","og_type":"article","og_title":"Waarom Cybersecurity Uitbesteden? | Apex Security","og_description":"Ontdek vijf redenen waarom het uitbesteden van cybersecurity aan experts uw organisatie ten goede komt. Lees verder!","og_url":"https:\/\/www.apexsecurity.nl\/en\/cybersecurity-uitbesteden-waarom-zou-je\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2022-09-26T09:22:11+00:00","article_modified_time":"2025-01-17T13:46:41+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/09\/Apex_2219_blog-1024x512-1.jpg","type":"image\/jpeg"}],"author":"Peter Pronk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Pronk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/"},"author":{"name":"Peter Pronk","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688"},"headline":"Cybersecurity uitbesteden waarom zou je?","datePublished":"2022-09-26T09:22:11+00:00","dateModified":"2025-01-17T13:46:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/"},"wordCount":412,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/09\/Apex_2219_blog-1024x512-1.jpg","articleSection":["Security Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/","url":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/","name":"Waarom Cybersecurity Uitbesteden? | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/09\/Apex_2219_blog-1024x512-1.jpg","datePublished":"2022-09-26T09:22:11+00:00","dateModified":"2025-01-17T13:46:41+00:00","description":"Ontdek vijf redenen waarom het uitbesteden van cybersecurity aan experts uw organisatie ten goede komt. Lees verder!","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#primaryimage","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/09\/Apex_2219_blog-1024x512-1.jpg","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2022\/09\/Apex_2219_blog-1024x512-1.jpg","width":1024,"height":512,"caption":"Security concept with person increasing the protection level by turning a knob. Selecting highest defence against cyber attack. Digital crime and data privacy on internet. Cybersecurity."},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/cybersecurity-uitbesteden-waarom-zou-je\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity uitbesteden waarom zou je?"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688","name":"Peter Pronk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","caption":"Peter Pronk"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petpro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=4247"}],"version-history":[{"count":3,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4247\/revisions"}],"predecessor-version":[{"id":8539,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/4247\/revisions\/8539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media\/5083"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=4247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=4247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=4247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}