{"id":286,"date":"2022-04-23T01:29:17","date_gmt":"2022-04-23T01:29:17","guid":{"rendered":"https:\/\/www.keytech.be\/?p=286"},"modified":"2023-02-22T07:52:53","modified_gmt":"2023-02-22T07:52:53","slug":"lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen","status":"publish","type":"post","link":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/","title":{"rendered":"Local IT infrastructures increasingly vulnerable to cyber attacks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:capitalize;--fontSize:38;line-height:1.4;\">Een oud debat laait terug op : lokale hosting of cloud hosting?<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1\"><p>De toenemende waakzaamheid die vereist is voor de beveiliging van on-premise systemen heeft de druk en de onderhoudsprijs aanzienlijk doen stijgen, een trend die zich zal blijven voortzetten.<\/p>\n<p>U kent de argumenten die pleiten voor de cloud hosting (lagere investeringen, kostenbeheersing, snelle hervatting van activiteiten bij rampen, beveiliging et updates uitgevoerd door de leverancier, permanente toegang, \u2026)<\/p>\n<p><strong>En toch aarzelt u nog om de stap te zetten naar een volledige cloud omgeving?<\/strong><\/p>\n<p><strong>Zeer begrijpelijk<\/strong>, temeer als u nog met vragen zit waar u nooit een behoorlijk antwoord op kreeg, zoals:<\/p>\n<ul>\n<li>Wie garandeert de vertrouwelijkheid en de permanente beschikbaarheid van mijn gegevens?<\/li>\n<li>Is cloud computing flexibel genoeg voor mijn specifieke noden?<\/li>\n<li>Zijn mijn gegevens in de cloud effectief beter beveiligd dan op een lokale PC of server?<\/li>\n<li>Is de cloud evolutie echt onomkeerbaar of eerder een cyclische trend die weer zal overwaaien?<\/li>\n<li>Ervaren de klanten die de stap gezet hebben naar een volledige cloud omgeving effectief meer gemoedsrust en stabiliteit?<\/li>\n<li>Andere vragen\u2026 ?<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;\">U zoekt antwoorden?<\/h3><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2\"><p>Stel ons uw vragen en onze IT-experten zullen u met plezier helpen met een onverbloemd\u00a0en duidelijk antwoord.<\/p>\n<p><strong>KeyTech werd 20 jaar geleden opgericht met als voornaamste doel de cloud activiteiten te beheersen en de juiste oplossingen aan te bieden. Vandaag zijn we blij dat we onze expertise ter beschikking van onze klanten kunnen stellen.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Een oud debat laait terug op : lokale hosting of cloud hosting?<\/p>\n","protected":false},"author":1,"featured_media":1687,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,21],"tags":[],"class_list":["post-286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Local IT infrastructures increasingly vulnerable to cyber attacks - KeyTech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Local IT infrastructures increasingly vulnerable to cyber attacks - KeyTech\" \/>\n<meta property=\"og:description\" content=\"Een oud debat laait terug op : lokale hosting of cloud hosting?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-23T01:29:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-22T07:52:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/person\\\/970d0d8908bc7db4a640b796ccc07f86\"},\"headline\":\"Local IT infrastructures increasingly vulnerable to cyber attacks\",\"datePublished\":\"2022-04-23T01:29:17+00:00\",\"dateModified\":\"2023-02-22T07:52:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/\"},\"wordCount\":974,\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"articleSection\":[\"Cloud\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/\",\"name\":\"Local IT infrastructures increasingly vulnerable to cyber attacks - KeyTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"datePublished\":\"2022-04-23T01:29:17+00:00\",\"dateModified\":\"2023-02-22T07:52:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Local IT infrastructures increasingly vulnerable to cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/keytech.be\",\"https:\\\/\\\/x.com\\\/keytechbe\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/keytechbelgium\",\"https:\\\/\\\/www.instagram.com\\\/keytech.be\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/person\\\/970d0d8908bc7db4a640b796ccc07f86\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/author\\\/admin_ktu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Local IT infrastructures increasingly vulnerable to cyber attacks - KeyTech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/","og_locale":"en_US","og_type":"article","og_title":"Local IT infrastructures increasingly vulnerable to cyber attacks - KeyTech","og_description":"Een oud debat laait terug op : lokale hosting of cloud hosting?","og_url":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_published_time":"2022-04-23T01:29:17+00:00","article_modified_time":"2023-02-22T07:52:53+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@keytechbe","twitter_site":"@keytechbe","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#article","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/"},"author":{"name":"admin","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86"},"headline":"Local IT infrastructures increasingly vulnerable to cyber attacks","datePublished":"2022-04-23T01:29:17+00:00","dateModified":"2023-02-22T07:52:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/"},"wordCount":974,"publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"image":{"@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","articleSection":["Cloud","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/","url":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/","name":"Local IT infrastructures increasingly vulnerable to cyber attacks - KeyTech","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#primaryimage"},"image":{"@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","datePublished":"2022-04-23T01:29:17+00:00","dateModified":"2023-02-22T07:52:53+00:00","breadcrumb":{"@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#primaryimage","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/en\/lokale-it-infrastructuren-steeds-kwetsbaarder-voor-cyberaanvallen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/en\/"},{"@type":"ListItem","position":2,"name":"Local IT infrastructures increasingly vulnerable to cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]},{"@type":"Person","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86","name":"admin","url":"https:\/\/www.keytech.be\/en\/author\/admin_ktu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/posts\/286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":1,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"predecessor-version":[{"id":2939,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/posts\/286\/revisions\/2939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/media\/1687"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keytech.be\/en\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}