{"id":927,"date":"2023-06-07T05:23:56","date_gmt":"2023-06-07T05:23:56","guid":{"rendered":"https:\/\/wptf.themepul.co\/tronix\/?page_id=927"},"modified":"2025-07-02T19:37:54","modified_gmt":"2025-07-02T19:37:54","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/doo-it.be\/nl\/oplossingen\/cybersecurity\/","title":{"rendered":"Secure-IT"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"927\" class=\"elementor elementor-927\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d45594 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d45594\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-0a9e38f\" data-id=\"0a9e38f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d337960 elementor-widget elementor-widget-text-editor\" data-id=\"d337960\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Waarom cybersecurity een must-have is<\/h4><p class=\"translation-block\">In een wereld waar digitale dreigingen steeds geavanceerder worden, biedt Doo-IT de zekerheid die jouw organisatie nodig heeft. Van cloud security tot endpoint detectie, wij leveren ge\u00efntegreerde en schaalbare oplossingen die perfect aansluiten op jouw unieke bedrijfsbehoeften.\n\nMet onze unieke mix van monitoring, geavanceerde beveiligingstechnologie\u00ebn en proactieve aanpak, heb je niet alleen gemoedsrust, maar ook een sterk fundament voor groei. Onze experts helpen je inzicht te krijgen in je huidige beveiligingsstatus via diepgaande security audits. Hiermee brengen we zwakke punten in kaart en bieden we een helder, op maat gemaakt plan om je digitale veiligheid te optimaliseren.\n\nBij Doo-IT geloven we in het leveren van meerwaarde, niet alleen door technische oplossingen te bieden, maar ook door je te begeleiden naar een toekomst waarin je je geen zorgen meer hoeft te maken over cybersecurity. \n\nOntdek vandaag nog hoe wij jouw bedrijf kunnen beschermen en versterken. Samen zorgen we voor een veilige, betrouwbare en toekomstgerichte IT-omgeving.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8b22fc0 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b22fc0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dc9520\" data-id=\"1dc9520\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e61a74d elementor-widget elementor-widget-heading\" data-id=\"e61a74d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">De Risico's van Onvoldoende Beveiliging\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dc3aec elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7dc3aec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Het is gemakkelijk om te denken dat uw bedrijf geen doelwit zal zijn van een cyberaanval, maar in werkelijkheid is elke organisatie kwetsbaar. De gevolgen van een slecht beveiligd netwerk kunnen desastreus zijn:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a22b3f4 elementor-widget__width-initial elementor-widget elementor-widget-Tronix List\" data-id=\"a22b3f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"Tronix List.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"tronix_list-wrapper\">\n            <div class=\"container\">\n                <div class=\"row\">\n                                                                <div class=\"col-xl-12 col-lg-12 col-md-12 col-12\">\n                            <div class=\"tronix-list-box-item\">\n                                <div class=\"tronix-list-icon\">\n                                    <i aria-hidden=\"true\" class=\"bi bi-check2\"><\/i>                                <\/div>\n                                                                    <div class=\"tronix-list-title\">  Cyberaanvallen: Hackers kunnen toegang krijgen tot gevoelige informatie, klantgegevens, of zelfs uw netwerk blokkeren met ransomware. <\/div>\n                                                            <\/div>\n                        <\/div>\n                                            <div class=\"col-xl-12 col-lg-12 col-md-12 col-12\">\n                            <div class=\"tronix-list-box-item\">\n                                <div class=\"tronix-list-icon\">\n                                    <i aria-hidden=\"true\" class=\"bi bi-check2\"><\/i>                                <\/div>\n                                                                    <div class=\"tronix-list-title\">  \nDatalekken: Persoonlijke en professionele informatie kan in verkeerde handen vallen, wat leidt tot zware boetes en verlies van klantvertrouwen. <\/div>\n                                                            <\/div>\n                        <\/div>\n                                            <div class=\"col-xl-12 col-lg-12 col-md-12 col-12\">\n                            <div class=\"tronix-list-box-item\">\n                                <div class=\"tronix-list-icon\">\n                                    <i aria-hidden=\"true\" class=\"bi bi-check2\"><\/i>                                <\/div>\n                                                                    <div class=\"tronix-list-title\">  Mailsecurity: de meeste aanvallen gebeuren via mail, het is dus van belang om uw medewerkers te beschermen, door de juiste oplossingen?\n <\/div>\n                                                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7115210 elementor-widget elementor-widget-text-editor\" data-id=\"7115210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Strategie:<\/h3><h3>Meten is weten<\/h3><p class=\"translation-block\">Netwerk- en beveiligingsoplossingen hoeven niet duur of complex te zijn. Bij <strong>Doo-IT<\/strong> hanteren we een pragmatische en effectieve aanpak, zodat u zich kunt concentreren op uw activiteit terwijl wij de veiligheid en effici\u00ebntie van uw netwerk waarborgen. Onze aanpak omvat:<\/p><ul><li class=\"translation-block\"><strong>Analyse<\/strong>: We beginnen met een volledige analyse van uw netwerk- en beveiligingsinfrastructuur. We identificeren kwetsbaarheden, potenti\u00eble risico's en optimalisatiemogelijkheden.<\/li><li class=\"translation-block\"><strong>Advies<\/strong>: Op basis van onze analyse geven wij duidelijke en praktische adviezen. We laten u de stappen zien die u kunt nemen om uw netwerk te verbeteren en te beveiligen, zonder tijd te verliezen of onnodige kosten te maken.<\/li><li class=\"translation-block\"><strong>Implementatie<\/strong>: Wij doen het volledige implementatieproces. Of het nu gaat om het verbeteren van de netwerkprestaties, het implementeren van nieuwe beveiligingsprotocollen, of het opzetten van een volledig nieuwe infrastructuur, wij garanderen een soepele en ononderbroken uitvoering.<\/li><li class=\"translation-block\"><strong>Simpel<\/strong>: Wij leveren oplossingen die niet alleen veilig, maar ook gemakkelijk te beheren zijn. Geen ingewikkelde systemen of processen, alleen duidelijke en effectieve tools waarmee u altijd de controle behoudt.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b1513 elementor-widget elementor-widget-text-editor\" data-id=\"a2b1513\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Future proof<\/h4><p class=\"translation-block\">Bij <strong>Doo-IT<\/strong> gaan we verder dan enkel het oplossen van bestaande problemen. We richten ons ook op het voorkomen van toekomstige problemen door uw netwerk en beveiliging proactief te beheren. Wij zorgen ervoor dat uw infrastructuur altijd up-to-date is en bestand tegen de nieuwste bedreigingen:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fca8be1 elementor-widget elementor-widget-icon_box\" data-id=\"fca8be1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"tronix-icon-box-wrapper\">\n            <div class=\"container\">\n                <div class=\"row\">\n                                            <div class=\"col-xl-12 col-lg-12 col-md-12\">\n                            <div class=\"tronix-icon-box\">\n                                                                    <div class=\"tronix-icon\">\n                                        <i aria-hidden=\"true\" class=\"flaticon flaticon-support\"><\/i>                                    <\/div>\n                                                                <div class=\"icon-box-content\">\n                                    <div class=\"icon-box-title-label\"> 24\/7 support <\/div>\n                                                                            <h6 class=\"icon-box-title\">\n                                                                                             In geval van een probleem of bedreiging reageren wij snel en effici\u00ebnt om de impact op uw operaties te minimaliseren.                                                                                        <\/h6>\n                                                                    <\/div>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"col-xl-12 col-lg-12 col-md-12\">\n                            <div class=\"tronix-icon-box\">\n                                                                    <div class=\"tronix-icon\">\n                                        <i aria-hidden=\"true\" class=\"ico ico-eye2\"><\/i>                                    <\/div>\n                                                                <div class=\"icon-box-content\">\n                                    <div class=\"icon-box-title-label\"> Proactieve Monitoring <\/div>\n                                                                            <h6 class=\"icon-box-title\">\n                                                                                            We monitoren continu uw netwerk, identificeren potenti\u00eble problemen voordat ze escaleren, en nemen preventieve maatregelen om de goede werking van uw netwerk te garanderen.                                                                                        <\/h6>\n                                                                    <\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-71e7e72\" data-id=\"71e7e72\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f5bd6a8 elementor-widget elementor-widget-image\" data-id=\"f5bd6a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"690\" height=\"558\" src=\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png\" class=\"attachment-large size-large wp-image-10027\" alt=\"\" srcset=\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png 690w, https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32-600x485.png 600w, https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32-300x243.png 300w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-046c78a elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-wp-widget-nav_menu\" data-id=\"046c78a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-nav_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5>Oplossingen<\/h5><div class=\"menu-sector-container\"><ul id=\"menu-sector\" class=\"menu\"><li id=\"menu-item-10880\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10880\"><a href=\"https:\/\/doo-it.be\/nl\/oplossingen\/telecom\/\">Telecom-IT<\/a><\/li>\n<li id=\"menu-item-10794\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10794\"><a href=\"https:\/\/doo-it.be\/nl\/oplossingen\/netwerk\/\">Netwerk-IT<\/a><\/li>\n<li id=\"menu-item-11004\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-11004\"><a href=\"https:\/\/doo-it.be\/nl\/oplossingen\/connectiviteit-internet\/\">Connect-IT<\/a><\/li>\n<li id=\"menu-item-10745\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10745\"><a href=\"https:\/\/doo-it.be\/nl\/oplossingen\/cybersecurity\/\">Secure-IT<\/a><\/li>\n<\/ul><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Pourquoi une Structure R\u00e9seau Solide est-elle Essentielle ? Dans un monde o\u00f9 la technologie et la communication num\u00e9rique sont le pilier de chaque entreprise, une\u00a0structure r\u00e9seau solide et s\u00e9curis\u00e9e\u00a0est indispensable. Cependant, cette d\u00e9pendance pr\u00e9sente des risques : cyberattaques, fuites de donn\u00e9es, interruptions de r\u00e9seau\u2014autant de d\u00e9fis qui peuvent non seulement perturber vos op\u00e9rations, mais aussi [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":10983,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"blank-template.php","meta":{"footnotes":""},"class_list":["post-927","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>s\u00e9curit\u00e9 - Doo-it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/doo-it.be\/nl\/oplossingen\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"s\u00e9curit\u00e9 - Doo-it\" \/>\n<meta property=\"og:description\" content=\"Pourquoi une Structure R\u00e9seau Solide est-elle Essentielle ? Dans un monde o\u00f9 la technologie et la communication num\u00e9rique sont le pilier de chaque entreprise, une\u00a0structure r\u00e9seau solide et s\u00e9curis\u00e9e\u00a0est indispensable. Cependant, cette d\u00e9pendance pr\u00e9sente des risques : cyberattaques, fuites de donn\u00e9es, interruptions de r\u00e9seau\u2014autant de d\u00e9fis qui peuvent non seulement perturber vos op\u00e9rations, mais aussi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/doo-it.be\/nl\/oplossingen\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Doo-it\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-02T19:37:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/\",\"url\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/\",\"name\":\"s\u00e9curit\u00e9 - Doo-it\",\"isPartOf\":{\"@id\":\"https:\/\/doo-it.be\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png\",\"datePublished\":\"2023-06-07T05:23:56+00:00\",\"dateModified\":\"2025-07-02T19:37:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"vls\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vls\",\"@id\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png\",\"contentUrl\":\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/doo-it.be\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"solutions\",\"item\":\"https:\/\/doo-it.be\/oplossingen\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/doo-it.be\/nl\/#website\",\"url\":\"https:\/\/doo-it.be\/nl\/\",\"name\":\"Doo-it\",\"description\":\"We Think &amp; We Do\",\"publisher\":{\"@id\":\"https:\/\/doo-it.be\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/doo-it.be\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vls\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/doo-it.be\/nl\/#organization\",\"name\":\"Doo-it\",\"url\":\"https:\/\/doo-it.be\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vls\",\"@id\":\"https:\/\/doo-it.be\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/image-1-e1726453917245.png\",\"contentUrl\":\"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/image-1-e1726453917245.png\",\"width\":131,\"height\":50,\"caption\":\"Doo-it\"},\"image\":{\"@id\":\"https:\/\/doo-it.be\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"s\u00e9curit\u00e9 - Doo-it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/doo-it.be\/nl\/oplossingen\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"s\u00e9curit\u00e9 - Doo-it","og_description":"Pourquoi une Structure R\u00e9seau Solide est-elle Essentielle ? Dans un monde o\u00f9 la technologie et la communication num\u00e9rique sont le pilier de chaque entreprise, une\u00a0structure r\u00e9seau solide et s\u00e9curis\u00e9e\u00a0est indispensable. Cependant, cette d\u00e9pendance pr\u00e9sente des risques : cyberattaques, fuites de donn\u00e9es, interruptions de r\u00e9seau\u2014autant de d\u00e9fis qui peuvent non seulement perturber vos op\u00e9rations, mais aussi [&hellip;]","og_url":"https:\/\/doo-it.be\/nl\/oplossingen\/cybersecurity\/","og_site_name":"Doo-it","article_modified_time":"2025-07-02T19:37:54+00:00","og_image":[{"url":"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/","url":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/","name":"s\u00e9curit\u00e9 - Doo-it","isPartOf":{"@id":"https:\/\/doo-it.be\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png","datePublished":"2023-06-07T05:23:56+00:00","dateModified":"2025-07-02T19:37:54+00:00","breadcrumb":{"@id":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#breadcrumb"},"inLanguage":"vls","potentialAction":[{"@type":"ReadAction","target":["https:\/\/doo-it.be\/oplossingen\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"vls","@id":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#primaryimage","url":"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png","contentUrl":"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/Design-sans-titre-32.png"},{"@type":"BreadcrumbList","@id":"https:\/\/doo-it.be\/oplossingen\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/doo-it.be\/"},{"@type":"ListItem","position":2,"name":"solutions","item":"https:\/\/doo-it.be\/oplossingen\/"},{"@type":"ListItem","position":3,"name":"s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/doo-it.be\/nl\/#website","url":"https:\/\/doo-it.be\/nl\/","name":"We think and we do","description":"We Think &amp; We Do","publisher":{"@id":"https:\/\/doo-it.be\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/doo-it.be\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vls"},{"@type":"Organization","@id":"https:\/\/doo-it.be\/nl\/#organization","name":"We think and we do","url":"https:\/\/doo-it.be\/nl\/","logo":{"@type":"ImageObject","inLanguage":"vls","@id":"https:\/\/doo-it.be\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/image-1-e1726453917245.png","contentUrl":"https:\/\/doo-it.be\/wp-content\/uploads\/2024\/09\/image-1-e1726453917245.png","width":131,"height":50,"caption":"Doo-it"},"image":{"@id":"https:\/\/doo-it.be\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/pages\/927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/comments?post=927"}],"version-history":[{"count":0,"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/pages\/927\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/pages\/10983"}],"wp:attachment":[{"href":"https:\/\/doo-it.be\/nl\/wp-json\/wp\/v2\/media?parent=927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}