{"id":6008,"date":"2025-10-01T11:00:30","date_gmt":"2025-10-01T09:00:30","guid":{"rendered":"https:\/\/motics.nl\/staging\/?p=6008"},"modified":"2025-10-27T10:50:18","modified_gmt":"2025-10-27T08:50:18","slug":"de-anatomie-van-een-cyberweerbaar-bedrijf","status":"publish","type":"post","link":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/","title":{"rendered":"De anatomie van een cyberweerbaar bedrijf"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p data-start=\"45\" data-end=\"441\">Cyberaanvallen zijn niet langer zeldzame gebeurtenissen. Elk bedrijf van startup tot gevestigde organisatie loopt digitale risico\u2019s die de operatie kunnen ontwrichten en het vertrouwen van klanten kunnen schaden. Gelukkig heb je geen enorm budget of groot team nodig om je hierop voor te bereiden. Met een paar gerichte acties versterk je je verdediging en bouw je aan een veerkrachtiger bedrijf.<\/p>\n<p data-start=\"443\" data-end=\"625\">Proactieve gewoontes cre\u00ebren vangnetten v\u00f3\u00f3rdat er een crisis is. Door vandaag stappen te zetten, verklein je verrassingen van morgen en beperk je de impact als er toch iets misgaat.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography2-font-size);\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:var(--awb-typography2-text-transform);font-size:1em;line-height:var(--awb-typography2-line-height);\">De bouwstenen van cybergereedheid<\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p data-start=\"737\" data-end=\"1018\">Duurzame cybersecurity begint met praktische pijlers die elkaar versterken. Door je op deze gebieden te focussen, krijgt je organisatie een duidelijke, werkbare route om beschermd te blijven.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-custom_typography_3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-custom_typography_3-font-family);font-weight:var(--awb-custom_typography_3-font-weight);font-style:var(--awb-custom_typography_3-font-style);margin:0;letter-spacing:var(--awb-custom_typography_3-letter-spacing);text-transform:var(--awb-custom_typography_3-text-transform);font-size:1em;line-height:var(--awb-custom_typography_3-line-height);\">Risicobewustzijn<\/h3><\/div><div class=\"fusion-text fusion-text-3\"><p data-start=\"737\" data-end=\"1018\">Goede bescherming begint bij weten wat het meest belangrijk is. Neem de tijd om de data, systemen en informatie in kaart te brengen die cruciaal zijn voor je dagelijkse werk. Door je kroonjuwelen te identificeren en mogelijke dreigingen te begrijpen, kun je middelen richten waar ze het meeste effect hebben. Periodieke controles helpen nieuwe kwetsbaarheden te ontdekken voordat iemand anders dat doet.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-custom_typography_3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-custom_typography_3-font-family);font-weight:var(--awb-custom_typography_3-font-weight);font-style:var(--awb-custom_typography_3-font-style);margin:0;letter-spacing:var(--awb-custom_typography_3-letter-spacing);text-transform:var(--awb-custom_typography_3-text-transform);font-size:1em;line-height:var(--awb-custom_typography_3-line-height);\">Preventie en bescherming<\/h3><\/div><div class=\"fusion-text fusion-text-4\"><p data-start=\"737\" data-end=\"1018\">Sterke cybersecurity draait om meer dan alleen software of firewalls. Systemen up-to-date houden, betrouwbare antivirusoplossingen gebruiken en toegangsrechten tot gevoelige onderdelen beheren moeten samen optrekken. Als alleen vertrouwde mensen de sleutels hebben, zijn er minder ingangen voor aanvallers. Door je verdediging te stapelen, maak je het ongewenste bezoekers extra moeilijk.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-custom_typography_3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-custom_typography_3-font-family);font-weight:var(--awb-custom_typography_3-font-weight);font-style:var(--awb-custom_typography_3-font-style);margin:0;letter-spacing:var(--awb-custom_typography_3-letter-spacing);text-transform:var(--awb-custom_typography_3-text-transform);font-size:1em;line-height:var(--awb-custom_typography_3-line-height);\">Mensen en cultuur<\/h3><\/div><div class=\"fusion-text fusion-text-5\"><p data-start=\"737\" data-end=\"1018\">Technologie alleen garandeert geen veiligheid. Wanneer medewerkers phishing herkennen of iets verdachts melden, worden dreigingen vaak gestopt v\u00f3\u00f3r ze schade aanrichten. Maak beveiliging onderdeel van het dagelijkse gesprek en stimuleer een cultuur waarin iedereen zich verantwoordelijk voelt voor de bescherming van het bedrijf. Korte, regelmatige trainingen houden kennis fris en betrokkenheid hoog.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-custom_typography_3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-custom_typography_3-font-family);font-weight:var(--awb-custom_typography_3-font-weight);font-style:var(--awb-custom_typography_3-font-style);margin:0;letter-spacing:var(--awb-custom_typography_3-letter-spacing);text-transform:var(--awb-custom_typography_3-text-transform);font-size:1em;line-height:var(--awb-custom_typography_3-line-height);\">Detectie en monitoring<\/h3><\/div><div class=\"fusion-text fusion-text-6\"><p data-start=\"737\" data-end=\"1018\">Niet elke dreiging is te voorkomen; daarom is monitoring essentieel. Hulpmiddelen die ongebruikelijke activiteit signaleren helpen je problemen snel te ontdekken. Veel organisaties defini\u00ebren ook wat \u201cnormaal\u201d gedrag is, zodat alles wat afwijkt direct opvalt. Vroege detectie is de sleutel tot een snelle, effectieve respons.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-custom_typography_3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-custom_typography_3-font-family);font-weight:var(--awb-custom_typography_3-font-weight);font-style:var(--awb-custom_typography_3-font-style);margin:0;letter-spacing:var(--awb-custom_typography_3-letter-spacing);text-transform:var(--awb-custom_typography_3-text-transform);font-size:1em;line-height:var(--awb-custom_typography_3-line-height);\">Respons en herstel<\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p data-start=\"737\" data-end=\"1018\">Zelfs de beste plannen krijgen te maken met onverwachte situaties. Zorg dat iedereen weet wat te doen als er een incident plaatsvindt. Duidelijke richtlijnen, actuele bellijsten en regelmatige oefenscenario\u2019s maken het verschil tussen paniek en snel herstel. Geautomatiseerde en frequente back-ups vormen een vangnet, zodat kritieke informatie nooit lang onbereikbaar is.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-custom_typography_3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-custom_typography_3-font-family);font-weight:var(--awb-custom_typography_3-font-weight);font-style:var(--awb-custom_typography_3-font-style);margin:0;letter-spacing:var(--awb-custom_typography_3-letter-spacing);text-transform:var(--awb-custom_typography_3-text-transform);font-size:1em;line-height:var(--awb-custom_typography_3-line-height);\">Continue verbetering<\/h3><\/div><div class=\"fusion-text fusion-text-8\"><p data-start=\"2903\" data-end=\"3192\">Cyberdreigingen \u00e9n oplossingen veranderen voortdurend. Neem de tijd om beleid te herzien, trainingen op te frissen en je aanpak bij te sturen bij nieuwe dreigingen of na incidenten. Leren van \u00e9chte ervaringen versterkt je bescherming en zorgt dat je organisatie met vertrouwen vooruitgaat.<\/p>\n<p data-start=\"3194\" data-end=\"3379\">Door aan deze basis te werken, verhoog je de veiligheid en versterk je het vertrouwen van klanten en stakeholders. De inzet die je vandaag pleegt, zorgt morgen voor soepelere operaties.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography2-font-size);\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:var(--awb-typography2-text-transform);font-size:1em;line-height:var(--awb-typography2-line-height);\">Klaar voor ondersteuning?<\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p data-start=\"3411\" data-end=\"3715\">Cybergereedheid is geen checklist, het is een overlevingsstrategie. Voelt het als veel om alle bewegende onderdelen te managen? Je bent niet de enige. Samenwerken met een IT-dienstverlener zoals wij maakt het proces slimmer en effectiever. Onze ervaring en expertise kunnen precies zijn wat je nodig hebt.<\/p>\n<p data-start=\"3717\" data-end=\"3923\" data-is-last-node=\"\" data-is-only-node=\"\">Neem contact met ons op voor een vrijblijvend adviesgesprek. We geven praktische, op jouw bedrijf afgestemde aanbevelingen, zodat jij je kunt focussen op wat het meest telt: groei, innovatie en gemoedsrust.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_text_transform:var(--awb-custom_typography_7-text-transform);--button_font_size:var(--awb-custom_typography_7-font-size);--button_line_height:var(--awb-custom_typography_7-line-height);--button_typography-letter-spacing:var(--awb-custom_typography_7-letter-spacing);--button_typography-font-family:var(--awb-custom_typography_7-font-family);--button_typography-font-weight:var(--awb-custom_typography_7-font-weight);--button_typography-font-style:var(--awb-custom_typography_7-font-style);\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/motics.nl\/staging\/adviesgesprek-aanvragen\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Plan een vrijblijvende kennismaking.<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":6012,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,31],"tags":[],"class_list":["post-6008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>De anatomie van een cyberweerbaar bedrijf &#187; Motics<\/title>\n<meta name=\"description\" content=\"Ontdek de bouwstenen van een cyberweerbaar bedrijf: risicobewustzijn, preventie, detectie, respons en continue verbetering. Praktische stappen voor veerkracht.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"De anatomie van een cyberweerbaar bedrijf &#187; Motics\" \/>\n<meta property=\"og:description\" content=\"Ontdek de bouwstenen van een cyberweerbaar bedrijf: risicobewustzijn, preventie, detectie, respons en continue verbetering. Praktische stappen voor veerkracht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/\" \/>\n<meta property=\"og:site_name\" content=\"Motics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100084780373656\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-01T09:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-27T08:50:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/10\/1920x960-placeholder-blog1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rense Middelbos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rense Middelbos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/\"},\"author\":{\"name\":\"Rense Middelbos\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#\\\/schema\\\/person\\\/659316a3f2bbb2d8ac3b920447098bfe\"},\"headline\":\"De anatomie van een cyberweerbaar bedrijf\",\"datePublished\":\"2025-10-01T09:00:30+00:00\",\"dateModified\":\"2025-10-27T08:50:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/\"},\"wordCount\":5096,\"publisher\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/motics.nl\\\/staging\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/1920x960-placeholder-blog1.png\",\"articleSection\":[\"Blogs\",\"Cybersecurity\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/\",\"url\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/\",\"name\":\"De anatomie van een cyberweerbaar bedrijf &#187; Motics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/motics.nl\\\/staging\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/1920x960-placeholder-blog1.png\",\"datePublished\":\"2025-10-01T09:00:30+00:00\",\"dateModified\":\"2025-10-27T08:50:18+00:00\",\"description\":\"Ontdek de bouwstenen van een cyberweerbaar bedrijf: risicobewustzijn, preventie, detectie, respons en continue verbetering. Praktische stappen voor veerkracht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#primaryimage\",\"url\":\"https:\\\/\\\/motics.nl\\\/staging\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/1920x960-placeholder-blog1.png\",\"contentUrl\":\"https:\\\/\\\/motics.nl\\\/staging\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/1920x960-placeholder-blog1.png\",\"width\":1920,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/cybersecurity\\\/de-anatomie-van-een-cyberweerbaar-bedrijf\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/motics.nl\\\/staging\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De anatomie van een cyberweerbaar bedrijf\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#website\",\"url\":\"https:\\\/\\\/motics.nl\\\/staging\\\/\",\"name\":\"Motics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/motics.nl\\\/staging\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#organization\",\"name\":\"Motics\",\"url\":\"https:\\\/\\\/motics.nl\\\/staging\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/motics.nl\\\/staging\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Motics-logo-zwart.png\",\"contentUrl\":\"https:\\\/\\\/motics.nl\\\/staging\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Motics-logo-zwart.png\",\"width\":902,\"height\":190,\"caption\":\"Motics\"},\"image\":{\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=100084780373656\",\"https:\\\/\\\/www.instagram.com\\\/motics.ict\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/moticsict\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/motics.nl\\\/staging\\\/#\\\/schema\\\/person\\\/659316a3f2bbb2d8ac3b920447098bfe\",\"name\":\"Rense Middelbos\",\"description\":\"Chief Technology Officer\",\"url\":\"https:\\\/\\\/motics.nl\\\/staging\\\/kenniscentrum\\\/author\\\/rense-middelbosmotics-nl\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"De anatomie van een cyberweerbaar bedrijf &#187; Motics","description":"Ontdek de bouwstenen van een cyberweerbaar bedrijf: risicobewustzijn, preventie, detectie, respons en continue verbetering. Praktische stappen voor veerkracht.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"nl_NL","og_type":"article","og_title":"De anatomie van een cyberweerbaar bedrijf &#187; Motics","og_description":"Ontdek de bouwstenen van een cyberweerbaar bedrijf: risicobewustzijn, preventie, detectie, respons en continue verbetering. Praktische stappen voor veerkracht.","og_url":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/","og_site_name":"Motics","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100084780373656","article_published_time":"2025-10-01T09:00:30+00:00","article_modified_time":"2025-10-27T08:50:18+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/10\/1920x960-placeholder-blog1.png","type":"image\/png"}],"author":"Rense Middelbos","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Rense Middelbos","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#article","isPartOf":{"@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/"},"author":{"name":"Rense Middelbos","@id":"https:\/\/motics.nl\/staging\/#\/schema\/person\/659316a3f2bbb2d8ac3b920447098bfe"},"headline":"De anatomie van een cyberweerbaar bedrijf","datePublished":"2025-10-01T09:00:30+00:00","dateModified":"2025-10-27T08:50:18+00:00","mainEntityOfPage":{"@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/"},"wordCount":5096,"publisher":{"@id":"https:\/\/motics.nl\/staging\/#organization"},"image":{"@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#primaryimage"},"thumbnailUrl":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/10\/1920x960-placeholder-blog1.png","articleSection":["Blogs","Cybersecurity"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/","url":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/","name":"De anatomie van een cyberweerbaar bedrijf &#187; Motics","isPartOf":{"@id":"https:\/\/motics.nl\/staging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#primaryimage"},"image":{"@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#primaryimage"},"thumbnailUrl":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/10\/1920x960-placeholder-blog1.png","datePublished":"2025-10-01T09:00:30+00:00","dateModified":"2025-10-27T08:50:18+00:00","description":"Ontdek de bouwstenen van een cyberweerbaar bedrijf: risicobewustzijn, preventie, detectie, respons en continue verbetering. Praktische stappen voor veerkracht.","breadcrumb":{"@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#primaryimage","url":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/10\/1920x960-placeholder-blog1.png","contentUrl":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/10\/1920x960-placeholder-blog1.png","width":1920,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/motics.nl\/staging\/kenniscentrum\/cybersecurity\/de-anatomie-van-een-cyberweerbaar-bedrijf\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/motics.nl\/staging\/"},{"@type":"ListItem","position":2,"name":"De anatomie van een cyberweerbaar bedrijf"}]},{"@type":"WebSite","@id":"https:\/\/motics.nl\/staging\/#website","url":"https:\/\/motics.nl\/staging\/","name":"Motics","description":"","publisher":{"@id":"https:\/\/motics.nl\/staging\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/motics.nl\/staging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/motics.nl\/staging\/#organization","name":"Motics","url":"https:\/\/motics.nl\/staging\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/motics.nl\/staging\/#\/schema\/logo\/image\/","url":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/01\/Motics-logo-zwart.png","contentUrl":"https:\/\/motics.nl\/staging\/wp-content\/uploads\/2025\/01\/Motics-logo-zwart.png","width":902,"height":190,"caption":"Motics"},"image":{"@id":"https:\/\/motics.nl\/staging\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100084780373656","https:\/\/www.instagram.com\/motics.ict\/","https:\/\/www.linkedin.com\/company\/moticsict"]},{"@type":"Person","@id":"https:\/\/motics.nl\/staging\/#\/schema\/person\/659316a3f2bbb2d8ac3b920447098bfe","name":"Rense Middelbos","description":"Chief Technology Officer","url":"https:\/\/motics.nl\/staging\/kenniscentrum\/author\/rense-middelbosmotics-nl\/"}]}},"_links":{"self":[{"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/posts\/6008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/comments?post=6008"}],"version-history":[{"count":3,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/posts\/6008\/revisions"}],"predecessor-version":[{"id":6011,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/posts\/6008\/revisions\/6011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/media\/6012"}],"wp:attachment":[{"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/media?parent=6008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/categories?post=6008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/motics.nl\/staging\/wp-json\/wp\/v2\/tags?post=6008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}