{"id":3206,"date":"2024-06-14T07:30:06","date_gmt":"2024-06-14T07:30:06","guid":{"rendered":"https:\/\/www.keytech.be\/cybersecurity\/"},"modified":"2024-06-25T14:10:53","modified_gmt":"2024-06-25T14:10:53","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.keytech.be\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-bottom:3%;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:35px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:38;line-height:1.4;\">A multi-layered and in-depth cyber defense!<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><center><iframe width=\"854\" height=\"480\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/CtkP8K6-1O0?si=rZRec4isehrEylYw&controls=0\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/center><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1\"><p>At KeyTech, we provide our customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers to consistently secure their digital assets in an ever-changing threat landscape.<\/p>\n<p>Our &#8220;360\u00b0&#8221; services include :<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-custom_color_1);--awb-toggle-active-accent-color:var(--awb-custom_color_1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:24px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:1.4;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-3206-1\"><div class=\"fusion-panel panel-default panel-b9552f98cc5333e9f fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b9552f98cc5333e9f\"><a aria-expanded=\"false\" aria-controls=\"b9552f98cc5333e9f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#b9552f98cc5333e9f\" href=\"#b9552f98cc5333e9f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Managed security as a 24\/7 service<\/span><\/a><\/h4><\/div><div id=\"b9552f98cc5333e9f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b9552f98cc5333e9f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Cybersecurity is not a one-time patch. We offer subscriptions with continuous remote security management including :<\/p>\n<ul>\n<li>Permanent real time vulnerability scan<\/li>\n<li>Threats dashboards monitored by our professionals<\/li>\n<li>Reporting of urgent undertaken response actions and further requirements<\/li>\n<li>Endpoint security (EDR)<\/li>\n<li>Logfiles analysis<\/li>\n<li>Updates &amp; patching<\/li>\n<li>AI and threat intelligence integration<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-059e8f59a215d65c3 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_059e8f59a215d65c3\"><a aria-expanded=\"false\" aria-controls=\"059e8f59a215d65c3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#059e8f59a215d65c3\" href=\"#059e8f59a215d65c3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cybersecurity trainings<\/span><\/a><\/h4><\/div><div id=\"059e8f59a215d65c3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_059e8f59a215d65c3\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Covered topics : phishing scams, trojan horses, vulnerability exploits, data theft and data breaches, sniffing, social engineering, privacy invasion, brute force attacks.<\/p>\n<p>Based on the size and needs of the company, we offer 3 variations of our training<\/p>\n<ul>\n<li>Mixed training for end-users and IT staff (ranging from 2 hours sessions for a specific topic to 2 days sessions covering all the topics)<\/li>\n<li>Comprehensive training for end-users (ranging from 2 hours sessions for a specific topic to 2 days sessions covering all the topics))<\/li>\n<li>Technical training for IT staff (ranging from 2 hours sessions for a specific topic to 2 days sessions covering all the topics)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.keytech.be\/en\/trainings\/#cybersecurity\" target=\"_blank\" rel=\"noopener\">Go to our Cybersecurity trainings page<\/a><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-9e06a8e2fb0f28b87 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_9e06a8e2fb0f28b87\"><a aria-expanded=\"false\" aria-controls=\"9e06a8e2fb0f28b87\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#9e06a8e2fb0f28b87\" href=\"#9e06a8e2fb0f28b87\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Security audits<\/span><\/a><\/h4><\/div><div id=\"9e06a8e2fb0f28b87\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_9e06a8e2fb0f28b87\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The goal of our internal audits is to evaluate an organization&#8217;s maturity level regarding cyber resilience and to provide prioritized recommendations, ranging from quick wins to achieving full compliance with standards like ISO27001 or NIS2.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-a08ab18cf504eaddf fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a08ab18cf504eaddf\"><a aria-expanded=\"false\" aria-controls=\"a08ab18cf504eaddf\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#a08ab18cf504eaddf\" href=\"#a08ab18cf504eaddf\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Penetration tests (blackbox)<\/span><\/a><\/h4><\/div><div id=\"a08ab18cf504eaddf\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a08ab18cf504eaddf\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The prime goal of the pen tests conducted by our ethical hackers is to detect vulnerabilities, weaknesses and potential entry points that could externally be exploited without insights into the organizations\u2019 architecture in order to evaluate their readiness to defend against the latest cyber threats.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-eb7e7c953b4b0ec5d fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_eb7e7c953b4b0ec5d\"><a aria-expanded=\"false\" aria-controls=\"eb7e7c953b4b0ec5d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#eb7e7c953b4b0ec5d\" href=\"#eb7e7c953b4b0ec5d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Custom phishing campaigns with microlearning <\/span><\/a><\/h4><\/div><div id=\"eb7e7c953b4b0ec5d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_eb7e7c953b4b0ec5d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Assess your employees\u2019 vulnerability to sophisticated phishing scams with our realistic and highly customizable simulations.<\/p>\n<p>Monitor the results (reaction time, clicks, \u2026).<\/p>\n<p>Redirect the affected users to micro-learning modules.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-feb6de77c24dc06cf fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_feb6de77c24dc06cf\"><a aria-expanded=\"false\" aria-controls=\"feb6de77c24dc06cf\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#feb6de77c24dc06cf\" href=\"#feb6de77c24dc06cf\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cloud backups (secured and isolated)<\/span><\/a><\/h4><\/div><div id=\"feb6de77c24dc06cf\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_feb6de77c24dc06cf\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Despite all the measures taken, no one can guarantee 100% security, and there must be adequate attention given to a fast disaster recovery in the event of an incident.<\/p>\n<p>With our secured online backup solutions, we make sure that all our company\u2019s data are not only safe but above all promptly recoverable if needed.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-607a6b6571eff035f fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_607a6b6571eff035f\"><a aria-expanded=\"false\" aria-controls=\"607a6b6571eff035f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#607a6b6571eff035f\" href=\"#607a6b6571eff035f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Secured Wi-Fi as a service<\/span><\/a><\/h4><\/div><div id=\"607a6b6571eff035f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_607a6b6571eff035f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Our centralized controllers in the cloud allows us to configure, secure, upgrade and monitor the access points of our customers from a central console, even for our customers with distributed locations.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-aa14337dd010285e6 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_aa14337dd010285e6\"><a aria-expanded=\"false\" aria-controls=\"aa14337dd010285e6\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#aa14337dd010285e6\" href=\"#aa14337dd010285e6\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Security configurations and policies implementations<\/span><\/a><\/h4><\/div><div id=\"aa14337dd010285e6\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_aa14337dd010285e6\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>All our system engineers and developers have been trained to consider security as the highest priority in their interventions according to specific procedures. They are all skilled in the implementations of 2FA, geo-blocking, password manager, data encryption, firewall &amp; VPN rules, DNS security, website security, SQL security, etc.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-6565f50b8e39076bf fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_6565f50b8e39076bf\"><a aria-expanded=\"false\" aria-controls=\"6565f50b8e39076bf\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3206-1\" data-target=\"#6565f50b8e39076bf\" href=\"#6565f50b8e39076bf\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Footprinting<\/span><\/a><\/h4><\/div><div id=\"6565f50b8e39076bf\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_6565f50b8e39076bf\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Footprinting is the fact of collecting data about an enterprise in order to make a targeted cyberattack. Our footprint analysis using well known techniques and tools such as OSINT, google dorking, dark web leaks scanning, \u2026 will show you all the information that is exposed on the Internet about your company, your employees and their devices which might be a potential risk for your organization.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_self\" href=\"#\" data-toggle=\"modal\" data-target=\".fusion-modal.contact_cybersec\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">I would like an offer<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling lazyload\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:6%;--awb-background-color:rgba(32,32,32,0.35);--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/10\/cybersecurity-hacker-dark.jpg\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:40px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:38;line-height:1.4;\">Awareness is the first step to action.<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.keytech.be\/en\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">CONTACT US<\/span><\/a><\/div><div class=\"fusion-modal modal fade modal-1 contact_cybersec\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\" style=\"--awb-border-color:var(--awb-color3);--awb-background:var(--awb-color2);\"><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\">Would you like more information about our cybersecurity services?<\/h3><\/div><div class=\"modal-body fusion-clearfix\">\n<p>Please tick the subject of your choice in the form below and an expert will contact you within 48 hours.<\/p>\n<div class=\"fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-3204\" style=\"--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;--awb-form-input-height:45px;--awb-form-font-size:15px;--awb-form-border-color:var(--awb-color7);--awb-form-focus-border-color:var(--awb-color7);--awb-form-focus-border-hover-color:hsla(var(--awb-color7-h),var(--awb-color7-s),var(--awb-color7-l),calc(var(--awb-color7-a) - 50%));\" data-form-id=\"3204\" data-config=\"{&quot;form_id&quot;:3204,&quot;form_post_id&quot;:3204,&quot;post_id&quot;:3206,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;topics&quot;:&quot;I would like more information about the following cybersecurity services&quot;,&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;phone&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;job&quot;:&quot;&quot;,&quot;message&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;topics&quot;:&quot;&quot;,&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;phone&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;job&quot;:&quot;&quot;,&quot;message&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;topics&quot;:&quot;checkbox&quot;,&quot;firstname&quot;:&quot;text&quot;,&quot;lastname&quot;:&quot;text&quot;,&quot;email&quot;:&quot;email&quot;,&quot;phone&quot;:&quot;phone_number&quot;,&quot;company&quot;:&quot;text&quot;,&quot;job&quot;:&quot;text&quot;,&quot;message&quot;:&quot;textarea&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;notice_1&quot;:&quot;notice&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}\"><form action=\"https:\/\/www.keytech.be\/en\/cybersecurity\/\" method=\"post\" class=\"fusion-form fusion-form-3204\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:-20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-margin-top-medium:-20px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-margin-top-small:-20px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-checkbox-field fusion-form-label-above topic\" style=\"\" data-form-id=\"3204\"><fieldset data-awb-fieldset-min-required=\"1\" data-awb-fieldset-max-required=\"9\" data-awb-fieldset-error=\"Please select at least one topic!\"><legend class=\"fusion-form-label-wrapper\"><span class=\"label\">I would like more information about the following cybersecurity services <abbr class=\"fusion-form-element-required\" title=\"Please select at least one topic!\">*<\/abbr><\/span><div class=\"fusion-form-tooltip\"><i class=\"awb-icon-question-circle\"><\/i><span class=\"fusion-form-tooltip-content\">Please select at least one topic!<\/span><\/div><\/legend><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-0\" type=\"checkbox\" value=\"Managed security as a 24\/7 service\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-0\">Managed security as a 24\/7 service<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-1\" type=\"checkbox\" value=\"Cybersecurity trainings\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-1\">Cybersecurity trainings<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-2\" type=\"checkbox\" value=\"Security audits\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-2\">Security audits<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-3\" type=\"checkbox\" value=\"Penetration tests\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-3\">Penetration tests<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-4\" type=\"checkbox\" value=\"Custom phishing campaigns\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-4\">Custom phishing campaigns<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-5\" type=\"checkbox\" value=\"Cloud backups\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-5\">Cloud backups<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-6\" type=\"checkbox\" value=\"Secured Wi-Fi\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-6\">Secured Wi-Fi<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-7\" type=\"checkbox\" value=\"Security configurations and policies implementations\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-7\">Security configurations and policies implementations<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-8\" type=\"checkbox\" value=\"Footprinting\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-8\">Footprinting<\/label><\/div><\/fieldset><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><input type=\"text\" autocomplete=\"off\" name=\"firstname\" id=\"firstname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Firstname *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><input type=\"text\" autocomplete=\"off\" name=\"lastname\" id=\"lastname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Lastname *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-email-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><input type=\"email\" autocomplete=\"off\" name=\"email\" id=\"email\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Email *\" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-phone-number-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><input type=\"tel\" autocomplete=\"off\" name=\"phone\" id=\"phone\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Phone number \" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><input type=\"text\" autocomplete=\"off\" name=\"company\" id=\"company\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Company \" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><input type=\"text\" autocomplete=\"off\" name=\"job\" id=\"job\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Job title \" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-textarea-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><textarea cols=\"40\" autocomplete=\"off\"  minlength=\"0\"  rows=\"4\" tabindex=\"\" id=\"message\" name=\"message\" class=\"fusion-form-input\" placeholder=\"Other question(s) here \" data-holds-private-data=\"false\"><\/textarea><\/div><div class=\"fusion-form-field fusion-form-submit-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\"><div class=\"fusion-button-wrapper fusion-aligncenter\"><button type=\"submit\" class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span  button-default form-form-submit\" style=\"--awb-margin-bottom:30px;\" data-form-number=\"3204\" tabindex=\"\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Send<\/span><\/button><\/div><\/div><div class=\"fusion-form-field fusion-form-recaptcha-field fusion-form-label-above\" style=\"\" data-form-id=\"3204\">\t\t\t\t<div class=\"form-creator-recaptcha\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tid=\"g-recaptcha-id-form-3204\"\n\t\t\t\t\t\t\tclass=\"fusion-form-recaptcha-v3 recaptcha-container  fusion-form-hide-recaptcha-badge\"\n\t\t\t\t\t\t\tdata-sitekey=\"6LdQojwiAAAAAPdAow3cEOtGjSwVtrDdKbgCAeue\"\n\t\t\t\t\t\t\tdata-badge=\"hide\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"hidden\"\n\t\t\t\t\t\t\tname=\"fusion-form-recaptcha-response\"\n\t\t\t\t\t\t\tclass=\"g-recaptcha-response\"\n\t\t\t\t\t\t\tid=\"fusion-form-recaptcha-response-3204\"\n\t\t\t\t\t\t\tvalue=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><div class=\"form-submission-notices data-notice_1\" id=\"fusion-notices-1\" data-instance=\"1\"><div class=\"fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-check-circle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Thank you for your message. It has been sent.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><div class=\"fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-exclamation-triangle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">There was an error trying to send your message. Please try again later.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><\/div><\/div><\/div><\/div><\/div><\/form><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-3206","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KeyTech - Cybersecurity<\/title>\n<meta name=\"description\" content=\"KeyTech provides its customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KeyTech - Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"KeyTech provides its customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T14:10:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/cybersecurity\\\/\",\"name\":\"KeyTech - Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\"},\"datePublished\":\"2024-06-14T07:30:06+00:00\",\"dateModified\":\"2024-06-25T14:10:53+00:00\",\"description\":\"KeyTech provides its customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keytech.be\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/keytech.be\",\"https:\\\/\\\/x.com\\\/keytechbe\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/keytechbelgium\",\"https:\\\/\\\/www.instagram.com\\\/keytech.be\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KeyTech - Cybersecurity","description":"KeyTech provides its customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"KeyTech - Cybersecurity","og_description":"KeyTech provides its customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers.","og_url":"https:\/\/www.keytech.be\/en\/cybersecurity\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_modified_time":"2024-06-25T14:10:53+00:00","twitter_card":"summary_large_image","twitter_site":"@keytechbe","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/en\/cybersecurity\/","url":"https:\/\/www.keytech.be\/en\/cybersecurity\/","name":"KeyTech - Cybersecurity","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"datePublished":"2024-06-14T07:30:06+00:00","dateModified":"2024-06-25T14:10:53+00:00","description":"KeyTech provides its customers with a comprehensive 360\u00b0 cybersecurity suite aimed at permanently identifying their risks and implementing appropriate protective measures on different layers.","breadcrumb":{"@id":"https:\/\/www.keytech.be\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/en\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/pages\/3206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/comments?post=3206"}],"version-history":[{"count":11,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/pages\/3206\/revisions"}],"predecessor-version":[{"id":3229,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/pages\/3206\/revisions\/3229"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/media?parent=3206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}