{"id":5634793,"date":"2025-04-04T16:18:02","date_gmt":"2025-04-04T14:18:02","guid":{"rendered":"https:\/\/megabyteapplications.be\/?page_id=5634793"},"modified":"2025-04-09T10:26:02","modified_gmt":"2025-04-09T08:26:02","slug":"ict-bescherming","status":"publish","type":"page","link":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/","title":{"rendered":"ICT Bescherming"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5634793\" class=\"elementor elementor-5634793 elementor-5634792\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aad2e25 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aad2e25\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2329122\" data-id=\"2329122\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee4d64d elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ee4d64d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">In een steeds digitalere wereld wordt het essentieel om <strong>bescherming <\/strong><strong>tegen cyberaanvallen en virussen te voorzien.<\/strong><\/p>\n<p style=\"text-align: left;\">Of je het nu wilt of niet, kwaadaardige hackers barsten van de inventiviteit om te proberen je informatie, gegevens of geld te stelen.&nbsp;<\/p>\n<p style=\"text-align: left;\">Wanneer je gegevens eenmaal zijn gestolen, gegijzeld, verspreid of omgeleid, is het kwaad geschied en slaat de paniek toe. Dan moet je zo snel mogelijk handelen en enorme bedragen uitgeven om je netwerk en gegevens in allerijl te beveiligen. &nbsp;<\/p>\n<p style=\"text-align: left;\"><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem;\"><b>Toch moet cyberveiligheid het onderwerp zijn van een goed doordachte strategie.<\/b><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">In een bedrijf is de gegevensstroom constant! Ze kunnen via verschillende kanalen\/apparaten\/gebruikers worden overgedragen en kunnen gevoelig zijn. <\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">Het is daarom belangrijk om vooraf de verschillende factoren te overwegen die in dit <strong>digitale ecosysteem<\/strong> met elkaar in wisselwerking staan en <strong>om je data te beschermen volgens aangepaste beveiligingsniveaus<\/strong>.&nbsp;<\/span><\/p>\n<p style=\"text-align: left;\">Ons team van <strong>gecertificeerde experts<\/strong> staat tot uw beschikking <strong>om uw project te analyseren en u te adviseren over de ICT-bescherming<\/strong> die geschikt is voor uw organisatie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-111880b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"111880b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Neem contact met mij op<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d9ab912\" data-id=\"d9ab912\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-910a821 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-image\" data-id=\"910a821\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#CTATEL\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png\" class=\"attachment-large size-large wp-image-5634812\" alt=\"\" srcset=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png 1024w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-300x169.png 300w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-768x432.png 768w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12.png 1366w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-453217b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"453217b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-058f675\" data-id=\"058f675\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-402a5d6 elementor-widget elementor-widget-heading\" data-id=\"402a5d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Een 360\u00b0-bescherming voor uw bedrijf<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2e901f elementor-widget elementor-widget-heading\" data-id=\"e2e901f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expertise en cyberveiligheid - de kern van onze ICT-bescherming die is toegewijd aan bedrijven!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e09dd7 elementor-widget elementor-widget-text-editor\" data-id=\"0e09dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">\ud83d\udd04 Une s\u00e9curit\u00e9 compl\u00e8te, automatis\u00e9e et \u00e9volutive<\/p>\n<p style=\"text-align: center;\">Notre approche<strong> pr\u00e9vention \u2013 protection \u2013 r\u00e9cup\u00e9ration<\/strong> garantit une protection globale contre toutes les menaces num\u00e9riques.<\/p>\n<p style=\"text-align: center;\">Nous combinons technologies avanc\u00e9es et expertise humaine pour assurer la continuit\u00e9 de votre activit\u00e9.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5864274 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5864274\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8ad3533\" data-id=\"8ad3533\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc307f1 elementor-widget elementor-widget-video\" data-id=\"bc307f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;vimeo&quot;,&quot;autoplay&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen allow=\"autoplay\" title=\"vimeo videospeler\" src=\"https:\/\/player.vimeo.com\/video\/773794055?autoplay=1&amp;color&amp;autopause=0&amp;loop=0&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1&amp;h=0488c29fdd#t=\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e6a0ce elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5e6a0ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kies voor SOPHOS, de ultieme netwerkbescherming!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3008e8b\" data-id=\"3008e8b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf48f87 elementor-widget elementor-widget-heading\" data-id=\"bf48f87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Beveiliging van apparatuur (Endpoint Protection &amp; Patching)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b42cf1c elementor-widget elementor-widget-text-editor\" data-id=\"b42cf1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Werkstations en servers zijn de favoriete doelen van cyberaanvallen. We integreren geavanceerde beveiliging om hun veiligheid en prestaties te garanderen. <\/p>\n<p>\u2705 <strong>Preventie<\/strong>: Detectie van dreigingen in realtime en automatische toepassing van kritieke updates (patching) om beveiligingslekken te elimineren.<\/p>\n<p>\u2705 <strong>Bescherming<\/strong>: Geavanceerde verdediging tegen ransomware, malware en pogingen tot inbraak.<\/p>\n<p>\u2705 <strong>Herstel (Recovery)<\/strong>: Snelle herstel van systemen na een aanval of storing.<\/p>\n<p>Dankzij deze proactieve aanpak blijven uw apparaten beveiligd zonder onderbreking voor uw teams.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b7077fb elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7077fb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b30b435\" data-id=\"b30b435\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-215a666 elementor-widget elementor-widget-heading\" data-id=\"215a666\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Gebruikersbeveiliging<br>(User Protection &amp; Bewustmaking)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17fc8b3 elementor-widget elementor-widget-text-editor\" data-id=\"17fc8b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aanvallen gericht op gebruikers nemen sterk toe. (<b>phishing<\/b>, <b>identiteitsdiefstal<\/b>, <strong>datalekken<\/strong>)<\/p>\n<p>Daarom beschermen we elke medewerker met een globale aanpak :<\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/2705.svg\" alt=\"\u2705\"> <strong>Preventie<\/strong>: Bewustmaking en voortdurende training om menselijke fouten te verminderen en compromittering van accounts te voorkomen.<\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/2705.svg\" alt=\"\u2705\"> <strong>Bescherming<\/strong>: Geavanceerde beveiliging van e-mails, bestanden en toegang tot samenwerkingsapplicaties.<\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/2705.svg\" alt=\"\u2705\"> <strong>Herstel <\/strong>(Recovery): Automatische gegevensback-up en ondersteuning in geval van een cyberaanval.R\u00e9cup\u00e9ration (Recovery) : Sauvegarde automatique des donn\u00e9es et assistance en cas de cyberattaque.<\/p>\n<p>Uw medewerkers worden zo een verdedigingskracht in plaats van een kwetsbaarheidspunt.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6175be9\" data-id=\"6175be9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e844c7 elementor-widget elementor-widget-image\" data-id=\"3e844c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-7-1024x576.png\" class=\"attachment-large size-large wp-image-5634803\" alt=\"Cybers\u00e9curit\u00e9, phishing, s\u00e9curisation des acc\u00e8s utilisateurs\" srcset=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-7-1024x576.png 1024w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-7-300x169.png 300w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-7-768x432.png 768w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-7.png 1366w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Endpoint protection &amp; Patching - SOPHOS<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3068f49 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3068f49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-video\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Laten we de bewakingscamera's defini\u00ebren die je nodig hebt. <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1fd62f9 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fd62f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-67c9a17\" data-id=\"67c9a17\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25744cb elementor-widget elementor-widget-image\" data-id=\"25744cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-10-1024x576.png\" class=\"attachment-large size-large wp-image-5634809\" alt=\"firewall parefeu vpn cybers\u00e9curit\u00e9 cybersecurity\" srcset=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-10-1024x576.png 1024w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-10-300x169.png 300w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-10-768x432.png 768w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-10.png 1366w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea83e75 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ea83e75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-fire\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Laten we uw optimale netwerkfirewall defini\u00ebren. <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-17a86fb\" data-id=\"17a86fb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09826fe elementor-widget elementor-widget-heading\" data-id=\"09826fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Firewall &amp; Perimeterbeveiliging<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97fa2b1 elementor-widget elementor-widget-text-editor\" data-id=\"97fa2b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Een krachtige <strong>firewall <\/strong>is essentieel <strong>om het verkeer te filteren en bedreigingen te blokkeren voordat ze uw netwerk bereiken.<\/strong><\/p>\n<p>\u2705 <strong>Next-generation firewalls<\/strong>: <strong>Realtime detectie<\/strong> en neutralisatie van inbreuken.<\/p>\n<p><strong>\u2705 Gecentraliseerd beheer:<\/strong> Bewaking en bijwerken van <strong>beveiligingsregels <\/strong>die zijn afgestemd op uw omgeving.<\/p>\n<p><strong>\u2705 Bescherming van externe verbindingen<\/strong>: Beveiliging van <strong>VPN-toegang voor hybride werken<\/strong>.<\/p>\n<p>Deze barri\u00e8re beschermt uw infrastructuur tegen externe bedreigingen en garandeert <strong>gecontroleerde en veilige toegang<\/strong> tot de middelen van uw bedrijf.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d313027 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d313027\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-53e5364\" data-id=\"53e5364\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-954faa2 elementor-widget elementor-widget-heading\" data-id=\"954faa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Back-up &amp; Gegevensherstel<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eacfd65 elementor-widget elementor-widget-text-editor\" data-id=\"eacfd65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dataverlies kan uw activiteit verlammen. Onze oplossingen voor back-up en herstel garanderen de bescherming van uw essenti\u00eble bestanden : <\/p>\n<p>\u2705 <strong>Automatische back-up<\/strong>: Voortdurende bescherming van uw bestanden, servers en databases.<\/p>\n<p>\u2705 <strong>Veilige opslag<\/strong>: Geavanceerde versleuteling en gegevensreplicatie om verlies te voorkomen.<\/p>\n<p>\u2705 <strong>Snelle herstel<\/strong>: In geval van een aanval of incident, onmiddellijke recuperatie voor een snelle terugkeer naar normaal.<\/p>\n<p>Met onze <strong>back-upoplossing<\/strong> bent u ervan verzekerd dat uw gegevens beschermd en altijd toegankelijk blijven, ongeacht de omstandigheden.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-59de35a\" data-id=\"59de35a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a15a893 elementor-widget elementor-widget-image\" data-id=\"a15a893\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-15-1024x576.png\" class=\"attachment-large size-large wp-image-5634827\" alt=\"backup protection\" srcset=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-15-1024x576.png 1024w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-15-300x169.png 300w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-15-768x432.png 768w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-15.png 1366w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63bfec3 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"63bfec3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-cloud-upload-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Neem contact met ons op voor uw veilige back-ups.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ff3d46f elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ff3d46f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1046a36\" data-id=\"1046a36\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4a6763 elementor-widget elementor-widget-image\" data-id=\"f4a6763\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/megabyteapplications.be\/produits-de-gestion\/protection-ict-veezo\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"427\" src=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/veezo-cp-1024x546.webp\" class=\"attachment-large size-large wp-image-5634797\" alt=\"veezo\" srcset=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/veezo-cp-1024x546.webp 1024w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/veezo-cp-300x160.webp 300w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/veezo-cp-768x410.webp 768w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/veezo-cp.webp 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38c263b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"38c263b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/megabyteapplications.be\/produits-de-gestion\/protection-ict-veezo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-virus\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Veezo bewaakt en beschermt uw netwerk 24\/7.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0bb8338\" data-id=\"0bb8338\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8702696 elementor-widget elementor-widget-heading\" data-id=\"8702696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/megabyteapplications.be\/produits-de-gestion\/protection-ict-veezo\/\">Veezo: De oplossing voor bedrijfscontinu\u00efteit.<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4970d78 elementor-widget elementor-widget-text-editor\" data-id=\"4970d78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In geval van een <strong>storing<\/strong>, <strong>cyberaanval <\/strong>of groot <strong>incident <\/strong>zorgt <strong>VEEZO <\/strong>voor een onmiddellijke <strong>herstel <\/strong>van uw infrastructuur om de continu\u00efteit van uw activiteit te waarborgen.<\/p>\n<p>VEEZO is een aanvullende beveiligingsoplossing bij elke traditionele beveiligingsinstallatie. Als een echt virtueel beveiligingsoperatiecentrum (vSOC) biedt VEEZO volledige bescherming, ongeacht de complexiteit van uw IT-omgeving. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-093445c elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"093445c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-245f49e\" data-id=\"245f49e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6096849 elementor-widget elementor-widget-heading\" data-id=\"6096849\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Toezicht en ondersteuning 24\/7 met SOC &amp; NOC.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35fbcae elementor-widget elementor-widget-text-editor\" data-id=\"35fbcae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Effectieve cyberbeveiliging berust op continue toezicht en snelle ondersteuning. Onze Security Operations Center (SOC) en Network Operations Center (NOC) garanderen: <\/p>\n<p>\u2705 <strong>Toezicht 24\/7<\/strong>: Snelle detectie en respons op cyberaanvallen en netwerkincidenten.<\/p>\n<p>\u2705 <strong>Automatische patching<\/strong>: Regelmatige systeemupdates om kwetsbaarheden te corrigeren.<\/p>\n<p>\u2705 <strong>Helpdesk tot uw beschikking<\/strong>: Technische ondersteuning via telefoon en e-mail om uw IT-problemen op te lossen.<\/p>\n<p>Onze experts staan altijd klaar om u een betrouwbare en veilige omgeving te garanderen.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22aed6e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"22aed6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-headphones-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ik kies voor gemoedsrust en 24\/7 bewaking van mijn netwerk.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b79e314\" data-id=\"b79e314\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-193c391 elementor-widget elementor-widget-image\" data-id=\"193c391\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#PROTECTIONICT\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-6-1024x576.png\" class=\"attachment-large size-large wp-image-5634800\" alt=\"SOC NOC Assistance s\u00e9curit\u00e9 infrastructure IT r\u00e9seau cybers\u00e9curit\u00e9\" srcset=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-6-1024x576.png 1024w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-6-300x169.png 300w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-6-768x432.png 768w, https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-6.png 1366w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-31b37da e-flex e-con-boxed e-con e-parent\" data-id=\"31b37da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-265567a elementor-widget elementor-widget-menu-anchor\" data-id=\"265567a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"PROTECTIONICT\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c85184 elementor-section-stretched animated-slow elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"6c85184\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25ac897\" data-id=\"25ac897\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8754079 elementor-widget elementor-widget-heading\" data-id=\"8754079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Beveilig uw infrastructuur vandaag nog met onze maatwerk ICT-beveiliging! <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b338562 elementor-widget elementor-widget-text-editor\" data-id=\"b338562\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Envie d\u2019une protection ICT robuste et sur mesure ? <\/p>\n<p>Neem nu contact met ons op om uw bedrijf te beveiligen. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e25dd3a elementor-tablet-button-align-center elementor-mobile-button-align-stretch elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"e25dd3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;25&quot;,&quot;button_width_tablet&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Lead Bescherming ICT - Megabyte Applications\" aria-label=\"Lead Bescherming ICT - Megabyte Applications\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"5634793\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"e25dd3a\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"ICT bescherming | B-to-B &amp; Cyberveiligheid | Megabyte Applicaties\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"5634793\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-nom elementor-col-30 elementor-md-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-nom\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNaam\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[nom]\" id=\"form-field-nom\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Naam\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-prenom elementor-col-30 elementor-md-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-prenom\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tVoornaam\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[prenom]\" id=\"form-field-prenom\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Voornaam\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-entreprise elementor-col-30 elementor-md-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-entreprise\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tBedrijf\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[entreprise]\" id=\"form-field-entreprise\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Bedrijf\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-telephone elementor-col-30 elementor-md-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-telephone\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tTelefoon\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[telephone]\" id=\"form-field-telephone\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Telefoon\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Alleen nummers en telefoontekens (#, -, *, enz.) worden geaccepteerd.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_3f4dbc2 elementor-col-60 elementor-md-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_3f4dbc2\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tE-mail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_3f4dbc2]\" id=\"form-field-field_3f4dbc2\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"E-mail\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-checkbox elementor-field-group elementor-column elementor-field-group-field_a9b0609 elementor-col-50 elementor-md-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_a9b0609\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tVotre projet : \t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<div class=\"elementor-field-subgroup  \"><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"S\u00e9curisation des \u00e9quipements\" id=\"form-field-field_a9b0609-0\" name=\"form_fields[field_a9b0609][]\"> <label for=\"form-field-field_a9b0609-0\">S\u00e9curisation des \u00e9quipements<\/label><\/span><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"S\u00e9curisation des utilisateurs\" id=\"form-field-field_a9b0609-1\" name=\"form_fields[field_a9b0609][]\"> <label for=\"form-field-field_a9b0609-1\">S\u00e9curisation des utilisateurs<\/label><\/span><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"Firewall &amp; S\u00e9curit\u00e9 p\u00e9rim\u00e9trique\" id=\"form-field-field_a9b0609-2\" name=\"form_fields[field_a9b0609][]\"> <label for=\"form-field-field_a9b0609-2\">Firewall & S\u00e9curit\u00e9 p\u00e9rim\u00e9trique<\/label><\/span><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"Backups\" id=\"form-field-field_a9b0609-3\" name=\"form_fields[field_a9b0609][]\"> <label for=\"form-field-field_a9b0609-3\">Backups<\/label><\/span><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"Veezo - Continuit\u00e9 d&#039;activit\u00e9\" id=\"form-field-field_a9b0609-4\" name=\"form_fields[field_a9b0609][]\"> <label for=\"form-field-field_a9b0609-4\">Veezo - Continuit\u00e9 d'activit\u00e9<\/label><\/span><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"Surveillance &amp; Assistance 24\/7\" id=\"form-field-field_a9b0609-5\" name=\"form_fields[field_a9b0609][]\"> <label for=\"form-field-field_a9b0609-5\">Surveillance & Assistance 24\/7<\/label><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-25 e-form__buttons elementor-md-100\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Verzenden<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In een steeds digitalere wereld wordt het essentieel om bescherming tegen cyberaanvallen en virussen te voorzien. Of je het nu wilt of niet, kwaadaardige hackers barsten van de inventiviteit om te proberen je informatie, gegevens of geld te stelen.&nbsp; Wanneer je gegevens eenmaal zijn gestolen, gegijzeld, verspreid of omgeleid, is het kwaad geschied en slaat [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5634793","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ICT bescherming | B-to-B &amp; Cyberveiligheid | Megabyte Applicaties<\/title>\n<meta name=\"description\" content=\"ICT-bescherming &amp; cyberveiligheid (apparatuur, gebruikers, toegang, gegevens, monitoring). Advies &amp; gecertificeerde experts. Contact opnemen &gt;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ICT bescherming | B-to-B &amp; Cyberveiligheid | Megabyte Applicaties\" \/>\n<meta property=\"og:description\" content=\"ICT-bescherming &amp; cyberveiligheid (apparatuur, gebruikers, toegang, gegevens, monitoring). Advies &amp; gecertificeerde experts. Contact opnemen &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/\" \/>\n<meta property=\"og:site_name\" content=\"Megabyte Applications\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-09T08:26:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/\",\"url\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/\",\"name\":\"ICT bescherming | B-to-B & Cyberveiligheid | Megabyte Applicaties\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/megabyteapplications.be\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Home-12-1024x576.png\",\"datePublished\":\"2025-04-04T14:18:02+00:00\",\"dateModified\":\"2025-04-09T08:26:02+00:00\",\"description\":\"ICT-bescherming & cyberveiligheid (apparatuur, gebruikers, toegang, gegevens, monitoring). Advies & gecertificeerde experts. Contact opnemen >\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/#primaryimage\",\"url\":\"https:\\\/\\\/megabyteapplications.be\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Home-12-1024x576.png\",\"contentUrl\":\"https:\\\/\\\/megabyteapplications.be\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Home-12-1024x576.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/ict-bescherming\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ICT Bescherming\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/\",\"name\":\"Megabyte Applications\",\"description\":\"#1 Sage BOB Partner - Accounting, invoicing &amp; ERP\",\"publisher\":{\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/#organization\",\"name\":\"Megabyte Applications\",\"url\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/megabyteapplications.be\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo-Megabyte-Applications-Horizontal-2.png\",\"contentUrl\":\"https:\\\/\\\/megabyteapplications.be\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo-Megabyte-Applications-Horizontal-2.png\",\"width\":1584,\"height\":680,\"caption\":\"Megabyte Applications\"},\"image\":{\"@id\":\"https:\\\/\\\/megabyteapplications.be\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ICT bescherming | B-to-B & Cyberveiligheid | Megabyte Applicaties","description":"ICT-bescherming & cyberveiligheid (apparatuur, gebruikers, toegang, gegevens, monitoring). Advies & gecertificeerde experts. Contact opnemen >","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/","og_locale":"nl_NL","og_type":"article","og_title":"ICT bescherming | B-to-B & Cyberveiligheid | Megabyte Applicaties","og_description":"ICT-bescherming & cyberveiligheid (apparatuur, gebruikers, toegang, gegevens, monitoring). Advies & gecertificeerde experts. Contact opnemen >","og_url":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/","og_site_name":"Megabyte Applications","article_modified_time":"2025-04-09T08:26:02+00:00","og_image":[{"url":"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/","url":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/","name":"ICT bescherming | B-to-B & Cyberveiligheid | Megabyte Applicaties","isPartOf":{"@id":"https:\/\/megabyteapplications.be\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/#primaryimage"},"image":{"@id":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/#primaryimage"},"thumbnailUrl":"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png","datePublished":"2025-04-04T14:18:02+00:00","dateModified":"2025-04-09T08:26:02+00:00","description":"ICT-bescherming & cyberveiligheid (apparatuur, gebruikers, toegang, gegevens, monitoring). Advies & gecertificeerde experts. Contact opnemen >","breadcrumb":{"@id":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/#primaryimage","url":"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png","contentUrl":"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2025\/02\/Home-12-1024x576.png"},{"@type":"BreadcrumbList","@id":"https:\/\/megabyteapplications.be\/nl\/ict-bescherming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/megabyteapplications.be\/nl\/"},{"@type":"ListItem","position":2,"name":"ICT Bescherming"}]},{"@type":"WebSite","@id":"https:\/\/megabyteapplications.be\/nl\/#website","url":"https:\/\/megabyteapplications.be\/nl\/","name":"Megabyte Applications","description":"#1 Sage BOB Partner - Accounting, invoicing &amp; ERP","publisher":{"@id":"https:\/\/megabyteapplications.be\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/megabyteapplications.be\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/megabyteapplications.be\/nl\/#organization","name":"Megabyte Applications","url":"https:\/\/megabyteapplications.be\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/megabyteapplications.be\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2023\/09\/Logo-Megabyte-Applications-Horizontal-2.png","contentUrl":"https:\/\/megabyteapplications.be\/wp-content\/uploads\/2023\/09\/Logo-Megabyte-Applications-Horizontal-2.png","width":1584,"height":680,"caption":"Megabyte Applications"},"image":{"@id":"https:\/\/megabyteapplications.be\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/pages\/5634793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/comments?post=5634793"}],"version-history":[{"count":4,"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/pages\/5634793\/revisions"}],"predecessor-version":[{"id":5635029,"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/pages\/5634793\/revisions\/5635029"}],"wp:attachment":[{"href":"https:\/\/megabyteapplications.be\/nl\/wp-json\/wp\/v2\/media?parent=5634793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}