{"id":18324,"date":"2022-01-18T15:42:15","date_gmt":"2022-01-18T15:42:15","guid":{"rendered":"https:\/\/www.vcsobservation.com\/public-space\/cybersecurity\/"},"modified":"2024-07-25T14:48:35","modified_gmt":"2024-07-25T14:48:35","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; kd_image_overlay_color=&#8221;rgba(9,24,42,0.4)&#8221; kd_bottom_separator_style=&#8221;rounded-down&#8221; kd_bottom_separator_height=&#8221;separator-height-medium&#8221; kd_image_overlay=&#8221;true&#8221; kd_bottom_separator=&#8221;true&#8221; css=&#8221;.vc_custom_1642521085633{padding-top: 100px !important;padding-bottom: 100px !important;background-image: url(http:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/12\/Meldkamer-inrichten-scaled.jpg?id=13362) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; kd_bottom_separator_bg=&#8221;#ffffff&#8221;][vc_column width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1513003956648{padding-top: 0px !important;}&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1513004658055{padding-top: 50px !important;padding-left: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Cybersecurity&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1631527521837{margin-top: 0px !important;margin-bottom: 30px !important;padding-top: 30px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631527963491{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;]<header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1706190489027\" data-animation-delay=200><h2 class=\"separator_off\" >Protect your systems against cyber attacks<\/h2><h6 class=\"subtitle \" >The failure of your systems can have major consequences. But consider what the damage could be if systems are hacked. In that case, sensitive data can fall into the wrong hands or systems can be held hostage, with all the consequences that entails. VCS makes you more resilient against digital threats and vulnerabilities.<\/h6><\/header>[vc_empty_space]<a  href=\"https:\/\/www.vcsobservation.com\/en\/contact-vcs\/\"  target=\"_self\"  title=\"Contact\" class=\"tt_button tt_primary_button btn_primary_color  pull-left button-action-link\" ><span class=\"prim_text\">Get in touch<\/span><\/a>[\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631527018135{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_single_image image=&#8221;17671&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1633093381461{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1631620661673{margin-bottom: 50px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space height=&#8221;15px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; css=&#8221;.vc_custom_1639042259462{background-color: #f5f5f5 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;][vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1631540865796{padding-top: 50px !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1522315555118{padding-bottom: 50px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;]<header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1701179957055\" data-animation-delay=200><h2 class=\"separator_off\" >Why cybersecurity is essential<\/h2><h6 class=\"subtitle \" >From virus to security breach: failing systems can have major consequences at institutions such as municipalities, public transport companies and museums. All chain partners lean on VCS Observation's technology, which is why we make sure the cybersecurity of our systems is optimal. Find out how we ensure the security of your systems.<\/h6><\/header>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631540927049{padding-top: 0px !important;background-image: url(http:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/09\/GrAdient.png?id=7775) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;][vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1631540912305{padding-top: 50px !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;]<header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1701179976969\" data-animation-delay=200><h2 class=\"separator_off\" style=\"color: #ffffff;\">Ethical hacker<\/h2><h6 class=\"subtitle \" style=\"color: #ffffff;\">To ensure the security of your systems, VCS Observation works with a so-called ethical hacker. Ethical hackers, also called white hat hackers, ensure that you are always one step ahead of hackers with malicious intentions.<\/h6><\/header><header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1701179987863\" data-animation-delay=200><h6 class=\"subtitle \" style=\"color: #ffffff;\">\u2022 An ethical hacker can use penetration tests to uncover possible vulnerabilities in the systems supplied by VCS Observation.<\/h6><\/header><header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1701180002351\" data-animation-delay=200><h6 class=\"subtitle \" style=\"color: #ffffff;\">\u2022 He or she tests whether certain systems can be penetrated - without causing damage. Purely to discover bugs or leaks preventively.<\/h6><\/header>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1631620704461{margin-top: 40px !important;margin-bottom: 30px !important;padding-top: 10px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631620661673{margin-bottom: 50px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1706190379115\" data-animation-delay=200><h2 class=\"separator_off\" >Vulnerability scans<\/h2><\/header>[vc_empty_space height=&#8221;5px&#8221;][vc_column_text]<\/p>\n<h6>We also offer vulnerability scans to identify vulnerabilities and cover them. These are scans that scan your entire system and actively look for ways to invade your system.<\/h6>\n<ul>\n<li>\n<h6>Periodic scanning ensures up-to-date cybersecurity of your systems.<\/h6>\n<\/li>\n<li>\n<h6>This is because rogue hackers have access to the latest systems and gadgets.<\/h6>\n<\/li>\n<li>\n<h6>By staying up-to-date, you don&#8217;t give them a chance to do damage in your systems.<\/h6>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631620696538{margin-bottom: 50px !important;}&#8221;]<header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1701180087509\" data-animation-delay=200><h2 class=\"separator_off\" >For your organisation<\/h2><h6 class=\"subtitle \" >VCS Observation is your partner in the field of reliability, maintenance, and repair, and when it comes to security. Curious about what an ethical hacker or our vulnerability scans can do for your cybersecurity? Then get in touch with us. We are here to solve your most pressing security challenges.<\/h6><\/header>[vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner]<header class=\"kd-section-title col-lg-12 text-left  kd-animated fadeIn   vc_custom_1701180104919\" data-animation-delay=200><h2 class=\"separator_off\" >Essential security<\/h2><h6 class=\"subtitle \" >VCS Observation provides essential systems for improving security and liveability in the Netherlands. In recent years, cybersecurity has become increasingly important in this respect. It is no longer just about reliability of our systems, but also about security. VCS helps protect the Netherlands digital infrastructure against cyber-attacks.<\/h6><\/header>[vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_empty_space height=&#8221;5px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;bottom&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;7775&#8243; parallax_speed_bg=&#8221;1.3&#8243; kd_top_separator_style=&#8221;rounded-up&#8221; kd_top_separator_height=&#8221;separator-height-small&#8221; kd_top_separator=&#8221;true&#8221; css=&#8221;.vc_custom_1634114342335{background-image: url(http:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/09\/GrAdient.png?id=7775) !important;}&#8221;][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space height=&#8221;100px&#8221;][\/vc_column][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][vc_column css=&#8221;.vc_custom_1634115172364{padding-right: 0px !important;}&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631280466621{padding-right: 60px !important;padding-bottom: 60px !important;padding-left: 60px !important;}&#8221;][vc_single_image image=&#8221;17677&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1707736129990{margin-bottom: 10px !important;}&#8221;][vc_empty_space height=&#8221;5px&#8221;]<header class=\"kd-section-title col-lg-12 text-center  kd-animated fadeIn   vc_custom_1701180183349\" data-animation-delay=200><h3 class=\"separator_off\" style=\"color: #ffffff;\">Contact us directly<\/h3><\/header>[vc_column_text]<\/p>\n<h6 style=\"text-align: center; color: white;\">Are you curious what VCS can do for your organization? Contact Tim van Deijzen via <a href=\"mailto:tim.van.deijzen@vcsobservation.com\">e-mail<\/a> or call us on <a href=\"tel:+310416541010\" target=\"_blank\" rel=\"noopener\">+310416541010<\/a>.<\/h6>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;5\/12&#8243; css=&#8221;.vc_custom_1634115678891{margin-top: 60px !important;margin-bottom: 40px !important;padding-top: 30px !important;padding-right: 60px !important;padding-bottom: 30px !important;padding-left: 60px !important;background-color: #ffffff !important;border-radius: 5px !important;}&#8221;][vc_custom_heading text=&#8221;Request a presentation&#8221; font_container=&#8221;tag:h4|text_align:center|color:%230a0a0a&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1701180248086{margin-top: 50px !important;margin-left: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1721918740444{margin-bottom: 50px !important;margin-left: 20px !important;padding-right: 30px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\">Request a free presentation for your organization. This lasts approximately one hour and is completely without obligation. Contact VCS via <a href=\"mailto:info@vcsobservation.com\">e-mail<\/a> or call us on <a href=\"tel:+310416541010\" target=\"_blank\" rel=\"noopener\">+310416541010<\/a>.<\/h6>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; kd_image_overlay_color=&#8221;rgba(9,24,42,0.4)&#8221; kd_bottom_separator_style=&#8221;rounded-down&#8221; kd_bottom_separator_height=&#8221;separator-height-medium&#8221; kd_image_overlay=&#8221;true&#8221; kd_bottom_separator=&#8221;true&#8221; css=&#8221;.vc_custom_1642521085633{padding-top: 100px !important;padding-bottom: 100px !important;background-image: url(http:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/12\/Meldkamer-inrichten-scaled.jpg?id=13362) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":17671,"parent":17984,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-18324","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - VCS<\/title>\n<meta name=\"description\" content=\"In recent years, cybersecurity in the public space has become increasingly important. It is all about reliability and security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - VCS\" \/>\n<meta property=\"og:description\" content=\"In recent years, cybersecurity in the public space has become increasingly important. It is all about reliability and security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"VCS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T14:48:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/10\/Het-NOC-4-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - VCS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.vcsobservation.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Het-NOC-4-scaled.jpg\",\"datePublished\":\"2022-01-18T15:42:15+00:00\",\"dateModified\":\"2024-07-25T14:48:35+00:00\",\"description\":\"In recent years, cybersecurity in the public space has become increasingly important. It is all about reliability and security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.vcsobservation.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Het-NOC-4-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.vcsobservation.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Het-NOC-4-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"cybersecurity in the public domain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Discover VCS\",\"item\":\"https:\\\/\\\/www.vcsobservation.com\\\/en\\\/discover-vcs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.vcsobservation.com\\\/#website\",\"url\":\"https:\\\/\\\/www.vcsobservation.com\\\/\",\"name\":\"VCS\",\"description\":\"Samen werken aan veiligheid\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.vcsobservation.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - VCS","description":"In recent years, cybersecurity in the public space has become increasingly important. It is all about reliability and security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - VCS","og_description":"In recent years, cybersecurity in the public space has become increasingly important. It is all about reliability and security.","og_url":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/","og_site_name":"VCS","article_modified_time":"2024-07-25T14:48:35+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/10\/Het-NOC-4-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/","url":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/","name":"Cybersecurity - VCS","isPartOf":{"@id":"https:\/\/www.vcsobservation.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/10\/Het-NOC-4-scaled.jpg","datePublished":"2022-01-18T15:42:15+00:00","dateModified":"2024-07-25T14:48:35+00:00","description":"In recent years, cybersecurity in the public space has become increasingly important. It is all about reliability and security.","breadcrumb":{"@id":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/#primaryimage","url":"https:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/10\/Het-NOC-4-scaled.jpg","contentUrl":"https:\/\/www.vcsobservation.com\/wp-content\/uploads\/2021\/10\/Het-NOC-4-scaled.jpg","width":2560,"height":1707,"caption":"cybersecurity in the public domain"},{"@type":"BreadcrumbList","@id":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.vcsobservation.com\/en\/"},{"@type":"ListItem","position":2,"name":"Discover VCS","item":"https:\/\/www.vcsobservation.com\/en\/discover-vcs\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.vcsobservation.com\/#website","url":"https:\/\/www.vcsobservation.com\/","name":"VCS","description":"Samen werken aan veiligheid","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.vcsobservation.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/pages\/18324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/comments?post=18324"}],"version-history":[{"count":12,"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/pages\/18324\/revisions"}],"predecessor-version":[{"id":20622,"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/pages\/18324\/revisions\/20622"}],"up":[{"embeddable":true,"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/pages\/17984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/media\/17671"}],"wp:attachment":[{"href":"https:\/\/www.vcsobservation.com\/en\/wp-json\/wp\/v2\/media?parent=18324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}