{"id":3198,"date":"2024-06-14T07:30:06","date_gmt":"2024-06-14T07:30:06","guid":{"rendered":"https:\/\/www.keytech.be\/cyberveiligheid\/"},"modified":"2024-06-25T14:10:59","modified_gmt":"2024-06-25T14:10:59","slug":"cyberveiligheid","status":"publish","type":"page","link":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/","title":{"rendered":"Cyberveiligheid"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-bottom:3%;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:35px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:38;line-height:1.4;\">Een diepgaande cyberverdediging in verschillende lagen!<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><center><iframe width=\"854\" height=\"480\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/CtkP8K6-1O0?si=rZRec4isehrEylYw&controls=0\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/center><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1\"><p>KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico&#8217;s en het implementeren van passende beschermingsmaatregelen om hun digitale activa consequent te beveiligen in een voortdurend veranderend bedreigingslandschap.<\/p>\n<p>Onze &#8220;360\u00b0&#8221; diensten omvatten:<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-custom_color_1);--awb-toggle-active-accent-color:var(--awb-custom_color_1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:24px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:1.4;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-3198-1\"><div class=\"fusion-panel panel-default panel-e030a22ad5b0d63b7 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e030a22ad5b0d63b7\"><a aria-expanded=\"false\" aria-controls=\"e030a22ad5b0d63b7\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#e030a22ad5b0d63b7\" href=\"#e030a22ad5b0d63b7\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beheerde beveiliging als een 24\/7 dienst<\/span><\/a><\/h4><\/div><div id=\"e030a22ad5b0d63b7\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e030a22ad5b0d63b7\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Cybersecurity is geen eenmalige oplossing.<\/p>\n<p>We bieden abonnementen met continue externe beveiligingsbeheer inclusief:<\/p>\n<ul>\n<li>Een permanente realtime kwetsbaarheidsscan<\/li>\n<li>Dashboards die door onze professionals worden gemonitord<\/li>\n<li>Rapportage van dringend ondernomen acties en verdere vereisten<\/li>\n<li>Endpoint beveiliging (EDR)<\/li>\n<li>Logfiles analyse<\/li>\n<li>Updates &amp; patching<\/li>\n<li>AI en threat intelligence integratie<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ead36c0a46b591254 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ead36c0a46b591254\"><a aria-expanded=\"false\" aria-controls=\"ead36c0a46b591254\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#ead36c0a46b591254\" href=\"#ead36c0a46b591254\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cybersecurityopleidingen<\/span><\/a><\/h4><\/div><div id=\"ead36c0a46b591254\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ead36c0a46b591254\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Behandelde onderwerpen: phishing, Trojan horses, vulnerability exploits, datadiefstal en datalekken, sniffing, social engineering, privacy invasion, brute force attacks.<\/p>\n<p>Afhankelijk van de grootte en de behoeften van het bedrijf, bieden we 3 variaties van onze training:<\/p>\n<ul>\n<li>Gemengde training voor eindgebruikers en IT-personeel (vari\u00ebrend van 2 uur sessies voor een specifiek onderwerp tot 2 dagen sessies die alle onderwerpen omvatten)<\/li>\n<li>Uitgebreide training voor eindgebruikers (vari\u00ebrend van 2 uur sessies voor een specifiek onderwerp tot 2 dagen sessies die alle onderwerpen omvatten)<\/li>\n<li>Technische training voor IT-personeel (vari\u00ebrend van 2 uur sessies voor een specifiek onderwerp tot 2 dagen sessies die alle onderwerpen omvatten)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.keytech.be\/nl\/opleidingen\/#cybersecurity\" target=\"_blank\" rel=\"noopener\">Ga naar onze Cybersecurity trainingen pagina<\/a><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ed433e85ca7daef25 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ed433e85ca7daef25\"><a aria-expanded=\"false\" aria-controls=\"ed433e85ca7daef25\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#ed433e85ca7daef25\" href=\"#ed433e85ca7daef25\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beveiligingsaudits<\/span><\/a><\/h4><\/div><div id=\"ed433e85ca7daef25\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ed433e85ca7daef25\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Het doel van onze interne audits is om het maturiteitssniveau van een organisatie met betrekking tot cyberweerbaarheid te evalueren en prioritaire aanbevelingen te bieden, vari\u00ebrend van quick wins tot volledige naleving van ISO27001 of NIS2 normen.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-386b59c979b6ef649 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_386b59c979b6ef649\"><a aria-expanded=\"false\" aria-controls=\"386b59c979b6ef649\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#386b59c979b6ef649\" href=\"#386b59c979b6ef649\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Penetratietesten (blackbox)<\/span><\/a><\/h4><\/div><div id=\"386b59c979b6ef649\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_386b59c979b6ef649\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Het primaire doel van de pentests uitgevoerd door onze ethische hackers is om kwetsbaarheden, zwakheden en mogelijke toegangspunten te detecteren die extern kunnen worden benut zonder inzichten in de architectuur van de organisaties, dit om hun cyberweerbaarheid te evalueren.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ec2994f4f724c37a3 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ec2994f4f724c37a3\"><a aria-expanded=\"false\" aria-controls=\"ec2994f4f724c37a3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#ec2994f4f724c37a3\" href=\"#ec2994f4f724c37a3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Aangepaste phishing-campagnes met microlearning<\/span><\/a><\/h4><\/div><div id=\"ec2994f4f724c37a3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ec2994f4f724c37a3\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Beoordeel de kwetsbaarheid van uw werknemers voor geavanceerde phishing-scams met onze realistische en zeer aanpasbare simulaties.<\/p>\n<p>Monitor de resultaten (reactietijd, klikken, &#8230;).<\/p>\n<p>Leid de gedupeerde gebruikers om naar microlearning-modules.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-a90ee3fac7aa7eb0a fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a90ee3fac7aa7eb0a\"><a aria-expanded=\"false\" aria-controls=\"a90ee3fac7aa7eb0a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#a90ee3fac7aa7eb0a\" href=\"#a90ee3fac7aa7eb0a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cloud backups (beveiligd en ge\u00efsoleerd)<\/span><\/a><\/h4><\/div><div id=\"a90ee3fac7aa7eb0a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a90ee3fac7aa7eb0a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Ondanks alle getroffen maatregelen kan niemand 100% beveiliging garanderen en moet er de nodige aandacht zijn voor een snelle disaster recovery bij een incident.<\/p>\n<p>Met onze beveiligde online backup-oplossingen zorgen we ervoor dat alle gegevens niet alleen veilig zijn, maar vooral snel herstelbaar indien nodig.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-2def08c0c54e3e20f fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2def08c0c54e3e20f\"><a aria-expanded=\"false\" aria-controls=\"2def08c0c54e3e20f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#2def08c0c54e3e20f\" href=\"#2def08c0c54e3e20f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beveiligde Wi-Fi als een dienst<\/span><\/a><\/h4><\/div><div id=\"2def08c0c54e3e20f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2def08c0c54e3e20f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Onze gecentraliseerde controllers in de cloud stellen ons in staat om de toegangspunten van onze klanten vanuit een centrale console te configureren, beveiligen, updaten en monitoren, zelfs voor klanten met verspreide locaties.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-dd2a112adf568ec27 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_dd2a112adf568ec27\"><a aria-expanded=\"false\" aria-controls=\"dd2a112adf568ec27\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#dd2a112adf568ec27\" href=\"#dd2a112adf568ec27\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beveiligingsconfiguraties en beleidsimplementaties<\/span><\/a><\/h4><\/div><div id=\"dd2a112adf568ec27\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_dd2a112adf568ec27\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Al onze systeemingenieurs en ontwikkelaars zijn getraind om beveiliging als hoogste aandachtspunt te beschouwen bij hun interventies volgens welbepaalde procedures. Ze zijn allemaal gedreven in de implementaties van 2FA, geo-blokkering, wachtwoordbeheer, gegevensversleuteling, firewall- &amp; VPN-regels, DNS-beveiliging, websitebeveiliging, SQL-beveiliging, enz.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-da5b23fbe4756b56e fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_da5b23fbe4756b56e\"><a aria-expanded=\"false\" aria-controls=\"da5b23fbe4756b56e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3198-1\" data-target=\"#da5b23fbe4756b56e\" href=\"#da5b23fbe4756b56e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Footprinting<\/span><\/a><\/h4><\/div><div id=\"da5b23fbe4756b56e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_da5b23fbe4756b56e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Footprinting is het verzamelen van gegevens over een onderneming om een gerichte cyberaanval uit te voeren. Onze voetafdrukanalyse met bekende technieken en hulpmiddelen zoals OSINT, Google dorking, scannen van darkweb-lekken, &#8230; zal u tonen welke informatie er op het internet is blootgesteld over uw bedrijf, uw werknemers en hun apparaten die een potentieel risico kunnen vormen voor uw organisatie.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_self\" href=\"#\" data-toggle=\"modal\" data-target=\".fusion-modal.contact_cybersec\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Ik wil graag een offerte<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling lazyload\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:6%;--awb-background-color:rgba(32,32,32,0.35);--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/10\/cybersecurity-hacker-dark.jpg\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:40px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:38;line-height:1.4;\">Bewustwording is de eerste stap naar actie.<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.keytech.be\/nl\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">CONTACTEER ONS<\/span><\/a><\/div><div class=\"fusion-modal modal fade modal-1 contact_cybersec\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\" style=\"--awb-border-color:var(--awb-color3);--awb-background:var(--awb-color2);\"><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\">Wenst u meer informatie over onze cyberbeveiligingsdiensten?<\/h3><\/div><div class=\"modal-body fusion-clearfix\">\n<p>Vink dan in onderstaand formulier het onderwerp van uw keuze aan en een expert zal u binnen de 48 uur contacteren.<\/p>\n<div class=\"fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-3201\" style=\"--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;--awb-form-input-height:45px;--awb-form-font-size:15px;--awb-form-border-color:var(--awb-color7);--awb-form-focus-border-color:var(--awb-color7);--awb-form-focus-border-hover-color:hsla(var(--awb-color7-h),var(--awb-color7-s),var(--awb-color7-l),calc(var(--awb-color7-a) - 50%));\" data-form-id=\"3201\" data-config=\"{&quot;form_id&quot;:3201,&quot;form_post_id&quot;:3201,&quot;post_id&quot;:3198,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;topics&quot;:&quot;Ik wens meer informatie over de cyberbeveiligingsdiensten&quot;,&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;phone&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;job&quot;:&quot;&quot;,&quot;message&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;topics&quot;:&quot;&quot;,&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;phone&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;job&quot;:&quot;&quot;,&quot;message&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;topics&quot;:&quot;checkbox&quot;,&quot;firstname&quot;:&quot;text&quot;,&quot;lastname&quot;:&quot;text&quot;,&quot;email&quot;:&quot;email&quot;,&quot;phone&quot;:&quot;phone_number&quot;,&quot;company&quot;:&quot;text&quot;,&quot;job&quot;:&quot;text&quot;,&quot;message&quot;:&quot;textarea&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;notice_1&quot;:&quot;notice&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}\"><form action=\"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/\" method=\"post\" class=\"fusion-form fusion-form-3201\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:-20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-margin-top-medium:-20px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-margin-top-small:-20px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-checkbox-field fusion-form-label-above topic\" style=\"\" data-form-id=\"3201\"><fieldset data-awb-fieldset-min-required=\"1\" data-awb-fieldset-max-required=\"9\" data-awb-fieldset-error=\"Please select at least one topic!\"><legend class=\"fusion-form-label-wrapper\"><span class=\"label\">Ik wens meer informatie over de cyberbeveiligingsdiensten <abbr class=\"fusion-form-element-required\" title=\"Please select at least one topic!\">*<\/abbr><\/span><div class=\"fusion-form-tooltip\"><i class=\"awb-icon-question-circle\"><\/i><span class=\"fusion-form-tooltip-content\">Selecteer ten minste \u00e9\u00e9n onderwerp!<\/span><\/div><\/legend><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-0\" type=\"checkbox\" value=\"Beheerde beveiliging als een 24\/7 dienst\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-0\">Beheerde beveiliging als een 24\/7 dienst<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-1\" type=\"checkbox\" value=\"Opleidingen\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-1\">Opleidingen<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-2\" type=\"checkbox\" value=\"Beveiligingsaudits\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-2\">Beveiligingsaudits<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-3\" type=\"checkbox\" value=\"Penetratietesten\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-3\">Penetratietesten<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-4\" type=\"checkbox\" value=\"Aangepaste phishing-campagnes\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-4\">Aangepaste phishing-campagnes<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-5\" type=\"checkbox\" value=\"Cloud backups\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-5\">Cloud backups<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-6\" type=\"checkbox\" value=\"Beveiligde Wi-Fi\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-6\">Beveiligde Wi-Fi<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-7\" type=\"checkbox\" value=\"Beveiligingsconfiguraties en beleidsimplementaties\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-7\">Beveiligingsconfiguraties en beleidsimplementaties<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-8\" type=\"checkbox\" value=\"Footprinting\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-8\">Footprinting<\/label><\/div><\/fieldset><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><input type=\"text\" autocomplete=\"off\" name=\"firstname\" id=\"firstname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Voornaam *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><input type=\"text\" autocomplete=\"off\" name=\"lastname\" id=\"lastname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Achternaam *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-email-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><input type=\"email\" autocomplete=\"off\" name=\"email\" id=\"email\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Email *\" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-phone-number-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><input type=\"tel\" autocomplete=\"off\" name=\"phone\" id=\"phone\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Telefoonnummer \" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><input type=\"text\" autocomplete=\"off\" name=\"company\" id=\"company\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Bedrijf \" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><input type=\"text\" autocomplete=\"off\" name=\"job\" id=\"job\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Functie \" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-textarea-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><textarea cols=\"40\" autocomplete=\"off\"  minlength=\"0\"  rows=\"4\" tabindex=\"\" id=\"message\" name=\"message\" class=\"fusion-form-input\" placeholder=\"Andere vraag(en) hier \" data-holds-private-data=\"false\"><\/textarea><\/div><div class=\"fusion-form-field fusion-form-submit-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\"><div class=\"fusion-button-wrapper fusion-aligncenter\"><button type=\"submit\" class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span  button-default form-form-submit\" style=\"--awb-margin-bottom:30px;\" data-form-number=\"3201\" tabindex=\"\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Verzenden<\/span><\/button><\/div><\/div><div class=\"fusion-form-field fusion-form-recaptcha-field fusion-form-label-above\" style=\"\" data-form-id=\"3201\">\t\t\t\t<div class=\"form-creator-recaptcha\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tid=\"g-recaptcha-id-form-3201\"\n\t\t\t\t\t\t\tclass=\"fusion-form-recaptcha-v3 recaptcha-container  fusion-form-hide-recaptcha-badge\"\n\t\t\t\t\t\t\tdata-sitekey=\"6LdQojwiAAAAAPdAow3cEOtGjSwVtrDdKbgCAeue\"\n\t\t\t\t\t\t\tdata-badge=\"hide\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"hidden\"\n\t\t\t\t\t\t\tname=\"fusion-form-recaptcha-response\"\n\t\t\t\t\t\t\tclass=\"g-recaptcha-response\"\n\t\t\t\t\t\t\tid=\"fusion-form-recaptcha-response-3201\"\n\t\t\t\t\t\t\tvalue=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><div class=\"form-submission-notices data-notice_1\" id=\"fusion-notices-1\" data-instance=\"1\"><div class=\"fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-check-circle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Thank you for your message. It has been sent.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><div class=\"fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-exclamation-triangle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">There was an error trying to send your message. Please try again later.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><\/div><\/div><\/div><\/div><\/div><\/form><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-3198","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KeyTech - Cyberveiligheid<\/title>\n<meta name=\"description\" content=\"KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico&#039;s en het implementeren van passende beschermingsmaatregelen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KeyTech - Cyberveiligheid\" \/>\n<meta property=\"og:description\" content=\"KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico&#039;s en het implementeren van passende beschermingsmaatregelen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T14:10:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/nl\\\/cyberveiligheid\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/nl\\\/cyberveiligheid\\\/\",\"name\":\"KeyTech - Cyberveiligheid\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\"},\"datePublished\":\"2024-06-14T07:30:06+00:00\",\"dateModified\":\"2024-06-25T14:10:59+00:00\",\"description\":\"KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico's en het implementeren van passende beschermingsmaatregelen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/nl\\\/cyberveiligheid\\\/#breadcrumb\"},\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keytech.be\\\/nl\\\/cyberveiligheid\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/nl\\\/cyberveiligheid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.keytech.be\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberveiligheid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-BE\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/keytech.be\",\"https:\\\/\\\/x.com\\\/keytechbe\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/keytechbelgium\",\"https:\\\/\\\/www.instagram.com\\\/keytech.be\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KeyTech - Cyberveiligheid","description":"KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico's en het implementeren van passende beschermingsmaatregelen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/","og_locale":"nl_BE","og_type":"article","og_title":"KeyTech - Cyberveiligheid","og_description":"KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico's en het implementeren van passende beschermingsmaatregelen.","og_url":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_modified_time":"2024-06-25T14:10:59+00:00","twitter_card":"summary_large_image","twitter_site":"@keytechbe","twitter_misc":{"Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/","url":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/","name":"KeyTech - Cyberveiligheid","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"datePublished":"2024-06-14T07:30:06+00:00","dateModified":"2024-06-25T14:10:59+00:00","description":"KeyTech biedt haar klanten een uitgebreide cybersecurity-suite die permanent gericht is op het identificeren van hun risico's en het implementeren van passende beschermingsmaatregelen.","breadcrumb":{"@id":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/#breadcrumb"},"inLanguage":"nl-BE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/nl\/cyberveiligheid\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/nl\/cyberveiligheid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/nl\/"},{"@type":"ListItem","position":2,"name":"Cyberveiligheid"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-BE"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"nl-BE","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/pages\/3198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/comments?post=3198"}],"version-history":[{"count":8,"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/pages\/3198\/revisions"}],"predecessor-version":[{"id":3230,"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/pages\/3198\/revisions\/3230"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/nl\/wp-json\/wp\/v2\/media?parent=3198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}