{"id":31149,"date":"2025-11-11T10:41:17","date_gmt":"2025-11-11T09:41:17","guid":{"rendered":"https:\/\/solvinity.com\/?post_type=blog&#038;p=31149"},"modified":"2025-11-11T10:58:12","modified_gmt":"2025-11-11T09:58:12","slug":"de-stille-dreiging-van-schijnveiligheid","status":"publish","type":"blog","link":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/","title":{"rendered":"De stille dreiging van schijnveiligheid"},"content":{"rendered":"<p class=\"attachment\"><a href='https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research.png'><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research-300x200.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research-300x200.png 300w, https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research-1024x683.png 1024w, https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research-768x512.png 768w, https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research.png 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"31149\" class=\"elementor elementor-31149\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d40904f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d40904f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-377e1b7b\" data-id=\"377e1b7b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be05267 elementor-widget elementor-widget-breadcrumbs\" data-id=\"be05267\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.solvinity.com\/nl\/\"><i class=\"fas fa-home\"><\/i> <span class=\"home-text\">Home<\/span><\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55ac767d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55ac767d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a55018d\" data-id=\"5a55018d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41ce7a11 elementor-widget elementor-widget-spacer\" data-id=\"41ce7a11\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e559fab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e559fab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3de5411b\" data-id=\"3de5411b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d083336 elementor-widget elementor-widget-shortcode\" data-id=\"2d083336\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">            <div class=\"werknemers\">                                                     <img decoding=\"async\" width=\"727\" height=\"727\" src=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2024\/03\/tim_kooij.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Tim Kooij\" srcset=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2024\/03\/tim_kooij.jpg 727w, https:\/\/www.solvinity.com\/wp-content\/uploads\/2024\/03\/tim_kooij-300x300.jpg 300w, https:\/\/www.solvinity.com\/wp-content\/uploads\/2024\/03\/tim_kooij-150x150.jpg 150w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/>                            <div class=\"werknemer_info\">\n                                <span class=\"naam_werknemer\">Tim Kooij<\/span>\n                                <span class=\"fucntie_werknemer\">Sales Director<\/span>\n                            <\/div>\n                                                        <\/div>\n            <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f695ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f695ee\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3709996\" data-id=\"3709996\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6dedb3a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dedb3a1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3238acf1\" data-id=\"3238acf1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47aa4cd3 blog-date elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"47aa4cd3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t11 november 2025\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1457704a elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"1457704a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.solvinity.com\/category\/blog\/\" rel=\"tag\">Blogs<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-695d3bbf elementor-widget elementor-widget-heading\" data-id=\"695d3bbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">De stille dreiging van schijnveiligheid<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a3a5274 elementor-widget elementor-widget-text-editor\" data-id=\"2a3a5274\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>We zien dat veel organisaties nog steeds worstelen met dezelfde basisproblemen als in de afgelopen jaren. Het Cybersecurity Report 2025 schetst een duidelijk beeld: het fundament van veel securitystrategie\u00ebn is fragiel.<\/strong><\/p><p>Organisaties investeren weliswaar in maatregelen, audits en technologie, maar missen vaak het noodzakelijke overzicht en de diepgaande kennis om hun infrastructuur en data \u00e9cht goed te beschermen. Hierdoor ontstaat een kloof tussen het gevoel van veiligheid en de werkelijke weerbaarheid.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21fddacc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21fddacc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-132a270f\" data-id=\"132a270f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3df90968 elementor-widget elementor-widget-heading\" data-id=\"3df90968\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grootste security uitdagingen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e68aae0 elementor-widget elementor-widget-text-editor\" data-id=\"1e68aae0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.solvinity.com\/nl\/download\/cybersecurity-report-2025\/\">In ons onderzoek<\/a> vroegen we organisaties samen met Securify naar hun grootste security-uitdagingen. Daaruit kwamen drie duidelijke pijnpunten naar voren:<\/p><ul><li>Gedegen implementatie van de juiste beveiligingsmaatregelen (27,1%)<\/li><li>Gericht identificeren van te beschermen processen, systemen en data (22,4%)<\/li><li>Tijdig detecteren van security-incidenten (18,4%)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41640ca elementor-widget elementor-widget-text-editor\" data-id=\"41640ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deze drie punten hebben \u00e9\u00e9n gemeenschappelijke noemer: het ontbreken van volledig inzicht in de eigen infrastructuur. Zonder dat inzicht is controle nauwelijks mogelijk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f6ea98b elementor-widget elementor-widget-heading\" data-id=\"4f6ea98b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Het belang van een grondige inventarisatie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c027348 elementor-widget elementor-widget-text-editor\" data-id=\"3c027348\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Een stevige securitybasis begint met een complete inventarisatie van infrastructuur en assets, aangevuld met een gedegen risicoanalyse. Dat geeft organisaties het overzicht dat nodig is om te bepalen welke systemen en data de hoogste securityprioriteit verdienen. Met die kennis kunnen beveiligingsmaatregelen gericht worden gekozen en ontstaan er mogelijkheden om sneller en adequater te reageren op actuele dreigingen.<\/p><p>Door te investeren in inzicht \u00e9n monitoring groeit niet alleen de weerbaarheid, maar ook de basis voor een securitystrategie die continu kan verbeteren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5946224 elementor-widget elementor-widget-heading\" data-id=\"5946224\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Het gevaar van een vals gevoel van veiligheid<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13df3e0 elementor-widget elementor-widget-text-editor\" data-id=\"13df3e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Uit het rapport blijkt ook dat organisaties vooral vertrouwen op interne security audits (56,8%), gevolgd door risico-assessments (52,4%) en externe audits (49,6%). Hoewel deze methoden waardevol zijn voor compliance en procescontrole, schuilt er een risico: ze schetsen vaak slechts een papieren werkelijkheid.<\/p><p>Volgens Kees Stammes, CEO bij Securify, ontdek je pas hoe weerbaar je \u00e9cht bent tegen cyberaanvallen door <a href=\"https:\/\/www.datocms-assets.com\/21957\/1756898671-securify-whitepaper-de-kracht-van-continuous-pentesting.pdf\" target=\"_blank\" rel=\"noopener\">Continuous Pentesting<\/a> en <a href=\"https:\/\/www.securify.nl\/diensten\/red-teaming\/\" target=\"_blank\" rel=\"noopener\">Red Teaming<\/a> uit te voeren. Deze methoden simuleren realistische aanvallen en laten zien hoe systemen, processen en mensen reageren onder druk.<\/p><p>Toch geeft slechts 17,2% van de respondenten aan gebruik te maken van Red Teaming om hun security te toetsen. \u201cIk durf te stellen dat deze 17,2% echt weerbaar is tegen cyberaanvallen. De rest doet aan schijnveiligheid,\u201d zegt Stammes. Het feit dat 42% van de organisaties aangeeft dat de topprioriteit voor het komende jaar is om meer kennis op te bouwen, onderstreept zijn punt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d945337 elementor-widget elementor-widget-heading\" data-id=\"6d945337\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Van compliance naar echte weerbaarheid<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57aee2f1 elementor-widget elementor-widget-text-editor\" data-id=\"57aee2f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Het rapport laat duidelijk zien dat veel organisaties nog stappen moeten zetten om hun securitystrategie te laten aansluiten op de realiteit van hedendaagse cyberdreigingen. Compliance alleen biedt geen bescherming tegen doelgerichte aanvallen van geavanceerde cybercriminelen. Papieren zekerheid is een basis, maar voor echte weerbaarheid zal je continue reality checks moeten uitvoeren.<\/p><p>Echte weerbaarheid vraagt om een securityaanpak die proactief, integraal en continu wordt uitgevoerd. Dit betekent dat beleid, processen, technologie \u00e9n menselijk handelen in samenhang moeten worden bekeken en getest.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ac675a0 elementor-widget elementor-widget-heading\" data-id=\"2ac675a0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Weerbaarheidschecklist<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26947345 elementor-widget elementor-widget-text-editor\" data-id=\"26947345\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Schijnveiligheid voelt comfortabel, maar is heel gevaarlijk. Met deze weerbaarheidschecklist ontdek je waar je \u00e9cht staat en welke stappen nodig zijn om aanvallen voor te zijn.<\/p><ol><li><strong>Begin met inzicht:<\/strong> Maak een volledige inventarisatie van je infrastructuur en assets. Zonder actueel overzicht weet je niet waar de kwetsbaarheden zitten.<\/li><li><strong>Ken je kroonjuwelen:<\/strong> Identificeer welke processen, systemen en data het meest kritisch zijn voor je bedrijfscontinu\u00efteit. Richt beveiliging op wat het bedrijf \u00e9cht niet mag verliezen.<\/li><li><strong>Test realistisch:<\/strong> Voeg Continious Pentesting en Red Teaming toe aan je testplan. Hiermee simuleer je aanvallen zoals ze in het echt plaatsvinden, inclusief social engineering.<\/li><li><strong>Investeer in kennis:<\/strong> Zorg dat medewerkers begrijpen hoe aanvallen werken \u00e9n hoe ze daarop moeten reageren. Security awareness en incident response training zijn bewezen effectief in het verkleinen van risico\u2019s.<\/li><li><strong>Monitor continu:<\/strong> Gebruik geavanceerde detectietools en processen om afwijkingen direct te signaleren en te analyseren. Denk bijvoorbeeld aan een <a href=\"https:\/\/www.solvinity.com\/nl\/blog\/in-house-security-of-uitbesteden-dit-kiezen-nederlandse-organisaties\/\">(Managed) SOC<\/a>. Hoe eerder een aanval wordt ontdekt, hoe kleiner de schade.<\/li><\/ol><p>Wie deze stappen volgt, gaat van een papieren werkelijkheid naar een robuuste verdediging die bestand is tegen de dreigingen van vandaag \u00e9n morgen. Het gaat niet alleen om voldoen aan normen en verplichtingen, maar om het opbouwen van een securitycultuur waarin elke schakel actief bijdraagt aan cyberweerbaarheid.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93595de elementor-widget elementor-widget-heading\" data-id=\"93595de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Durf de werkelijkheid te testen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b35399b elementor-widget elementor-widget-text-editor\" data-id=\"b35399b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Schijnveiligheid is een dure illusie. Alleen door het combineren van inzicht, realistische tests en een continu verbeterproces kunnen organisaties recht doen aan de term \u2018cyberweerbaarheid\u2019. Het <a href=\"https:\/\/www.solvinity.com\/nl\/download\/cybersecurity-report-2025\/\">Cybersecurity Report 2025<\/a> geeft hierbij een duidelijke boodschap: durf de werkelijkheid te testen.<\/p><p>Benieuwd hoe? <a href=\"https:\/\/www.solvinity.com\/nl\/contact\/\">Neem contact op<\/a> en ontdek wat Solvinity en Securify voor jou kunnen betekenen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2706c026 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2706c026\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f6207c6\" data-id=\"4f6207c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8fb6c0b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"8fb6c0b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1e32a9b1\" data-id=\"1e32a9b1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df7075d elementor-widget elementor-widget-heading\" data-id=\"df7075d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benieuwd hoe Nederlandse organisaties over hun weerbaarheid denken?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44a7597c elementor-widget elementor-widget-text-editor\" data-id=\"44a7597c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Download het Cybersecurity Report 2025<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25f79f1 custom-newsletter-ref-button elementor-widget elementor-widget-text-editor\" data-id=\"25f79f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.solvinity.com\/nl\/download\/cybersecurity-report-2025\/\" target=\"_blank\" rel=\"noopener\">Download het rapport<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5914f83a elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5914f83a\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45e40537\" data-id=\"45e40537\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c06a9af elementor-widget elementor-widget-heading\" data-id=\"2c06a9af\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Lees ook<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78409a7 elementor-align-center elementor-mobile-align-center icon-right no-absolute-mobile elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-button\" data-id=\"78409a7\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/nl\/resources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Meer berichten<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76d5662d text-behind-title elementor-widget__width-inherit elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"76d5662d\" data-element_type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;_position&quot;:&quot;absolute&quot;,&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Meer<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3069fe42 elementor-widget elementor-widget-shortcode\" data-id=\"3069fe42\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><!-- Gridbuilder \u1d42\u1d3e Plugin (https:\/\/wpgridbuilder.com) -->\n<div class=\"wp-grid-builder wpgb-grid-6 equal-height-211 purple_grid\" data-options=\"{&quot;id&quot;:6,&quot;type&quot;:&quot;masonry&quot;,&quot;source&quot;:&quot;post_type&quot;,&quot;loader&quot;:false,&quot;layout&quot;:&quot;vertical&quot;,&quot;reveal&quot;:0,&quot;isMainQuery&quot;:0,&quot;lazyLoad&quot;:false,&quot;cardSizes&quot;:{&quot;9999&quot;:{&quot;columns&quot;:3,&quot;height&quot;:240,&quot;gutter&quot;:30,&quot;ratio&quot;:&quot;1.33333&quot;},&quot;1200&quot;:{&quot;columns&quot;:3,&quot;height&quot;:240,&quot;gutter&quot;:30,&quot;ratio&quot;:&quot;1.33333&quot;},&quot;992&quot;:{&quot;columns&quot;:3,&quot;height&quot;:220,&quot;gutter&quot;:30,&quot;ratio&quot;:&quot;1.33333&quot;},&quot;768&quot;:{&quot;columns&quot;:1,&quot;height&quot;:220,&quot;gutter&quot;:30,&quot;ratio&quot;:&quot;1.33333&quot;},&quot;576&quot;:{&quot;columns&quot;:1,&quot;height&quot;:200,&quot;gutter&quot;:30,&quot;ratio&quot;:&quot;1.33333&quot;},&quot;320&quot;:{&quot;columns&quot;:1,&quot;height&quot;:200,&quot;gutter&quot;:30,&quot;ratio&quot;:&quot;1.33333&quot;}},&quot;fitRows&quot;:false,&quot;equalRows&quot;:0,&quot;equalColumns&quot;:false,&quot;fillLastRow&quot;:0,&quot;centerLastRow&quot;:0,&quot;horizontalOrder&quot;:false,&quot;fullWidth&quot;:false,&quot;transitionDelay&quot;:100,&quot;gallerySlideshow&quot;:0,&quot;rowsNumber&quot;:1,&quot;slideAlign&quot;:&quot;left&quot;,&quot;groupCells&quot;:1,&quot;draggable&quot;:true,&quot;initialIndex&quot;:0,&quot;contain&quot;:false,&quot;freeScroll&quot;:false,&quot;freeFriction&quot;:&quot;0.075&quot;,&quot;friction&quot;:&quot;0.285&quot;,&quot;attraction&quot;:&quot;0.025&quot;,&quot;autoPlay&quot;:0,&quot;pageDotAriaLabel&quot;:&quot;Page dot %d&quot;,&quot;isPreview&quot;:false,&quot;isGutenberg&quot;:false,&quot;rightToLeft&quot;:false}\"><div class=\"wpgb-svg-icons\" hidden>\n\t<svg viewBox=\"0 0 120 24\" width=\"0\" height=\"0\">\n\t<defs>\n        <polygon id=\"wpgb-star-svg\" points=\"12 2.5 15.1 8.8 22 9.8 17 14.6 18.2 21.5 12 18.3 5.8 21.5 7 14.6 2 9.8 8.9 8.8\"><\/polygon>\n    <\/defs>\n    <symbol id=\"wpgb-rating-stars-svg\">\n        <use xlink:href=\"#wpgb-star-svg\"><\/use>\n        <use xlink:href=\"#wpgb-star-svg\" x=\"24\"><\/use>\n        <use xlink:href=\"#wpgb-star-svg\" x=\"48\"><\/use>\n        <use xlink:href=\"#wpgb-star-svg\" x=\"72\"><\/use>\n        <use xlink:href=\"#wpgb-star-svg\" x=\"96\"><\/use>\n    <\/symbol>\n<\/svg>\n<\/div>\n<div class=\"wpgb-wrapper\">\n\t<div class=\"wpgb-main\">\n\t<div class=\"wpgb-layout\">\n\t<div class=\"wpgb-viewport\">\n\t\t<div class=\"wpgb-masonry\">\n\t\t\t<article class=\"wpgb-card wpgb-card-5 wpgb-post-31831\" data-col=\"1\" data-row=\"1\" data-format=\"standard\"><div class=\"wpgb-card-wrapper\"><div class=\"wpgb-card-inner\" data-action><div class=\"wpgb-card-media wpgb-scheme-light\"><svg data-ratio style=\"padding-top:66.67%\" viewBox=\"0 0 768 512\"><\/svg><div class=\"wpgb-card-media-thumbnail\"><a href=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2026\/03\/Shadow-AI-blog-visual.png\" tabindex=\"-1\" class=\"wpgb-handle-lb wpgb-lightbox\" data-type=\"image\" data-rel=\"6\" data-title=\"Shadow-AI-blog-visual\" title=\"Enlarge photo\"><div style=\"background-image:url(https:\/\/www.solvinity.com\/wp-content\/uploads\/2026\/03\/Shadow-AI-blog-visual-768x512.png)\"><\/div><noscript><img decoding=\"async\" class=\"wpgb-noscript-img\" src=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2026\/03\/Shadow-AI-blog-visual-768x512.png\" alt=\"\" height=\"512\" width=\"768\"><\/noscript><\/a><\/div><div class=\"wpgb-card-media-content\"><div class=\"wpgb-card-media-content-top\"><div class=\"wpgb-block-4 blog-category-grid\"><span class=\"wpgb-block-term\" data-id=\"64\">Blogs<\/span><\/div><\/div><\/div><\/div><div class=\"wpgb-card-content wpgb-scheme-dark\"><div class=\"wpgb-card-body\"><div class=\"wpgb-block-5\">12 maart 2026<\/div><h3 class=\"wpgb-block-1 wpgb-idle-scheme-1 wpgb-hover-accent-1\"><a href=\"https:\/\/www.solvinity.com\/nl\/blog\/shadow-ai-hoeveel-controle-heeft-jouw-organisatie-over-ai-gebruik\/\">Shadow AI: hoeveel controle heeft jouw organisatie over AI-gebruik?<\/a><\/h3><p class=\"wpgb-block-2 wpgb-idle-scheme-2\">Wat is Shadow AI, waarom verbieden organisaties publieke AI-tools en welke gevolgen heeft dat? Je leest...<\/p><a class=\"wpgb-block-3 grid-more-info-green\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/shadow-ai-hoeveel-controle-heeft-jouw-organisatie-over-ai-gebruik\/\">READ MORE <i aria-hidden=\"true\" class=\"grid-more-info-green fas fa-arrow-right\"><\/i><\/a><\/div><\/div><a class=\"wpgb-card-layer-link\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/shadow-ai-hoeveel-controle-heeft-jouw-organisatie-over-ai-gebruik\/\"><\/a><\/div><\/div><\/article><article class=\"wpgb-card wpgb-card-5 wpgb-post-31353\" data-col=\"1\" data-row=\"1\" data-format=\"standard\"><div class=\"wpgb-card-wrapper\"><div class=\"wpgb-card-inner\" data-action><div class=\"wpgb-card-media wpgb-scheme-light\"><svg data-ratio style=\"padding-top:66.67%\" viewBox=\"0 0 768 512\"><\/svg><div class=\"wpgb-card-media-thumbnail\"><a href=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Hybrid-Cloud-1.png\" tabindex=\"-1\" class=\"wpgb-handle-lb wpgb-lightbox\" data-type=\"image\" data-rel=\"6\" data-title=\"Hybrid Cloud\" title=\"Enlarge photo\"><div style=\"background-image:url(https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Hybrid-Cloud-1-768x512.png)\"><\/div><noscript><img loading=\"lazy\" decoding=\"async\" class=\"wpgb-noscript-img\" src=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Hybrid-Cloud-1-768x512.png\" alt=\"\" height=\"512\" width=\"768\"><\/noscript><\/a><\/div><div class=\"wpgb-card-media-content\"><div class=\"wpgb-card-media-content-top\"><div class=\"wpgb-block-4 blog-category-grid\"><span class=\"wpgb-block-term\" data-id=\"64\">Blogs<\/span><\/div><\/div><\/div><\/div><div class=\"wpgb-card-content wpgb-scheme-dark\"><div class=\"wpgb-card-body\"><div class=\"wpgb-block-5\">19 november 2025<\/div><h3 class=\"wpgb-block-1 wpgb-idle-scheme-1 wpgb-hover-accent-1\"><a href=\"https:\/\/www.solvinity.com\/nl\/blog\/van-versnippering-naar-overzicht-de-kracht-van-de-hybrid-cloud\/\">Van versnippering naar overzicht: de kracht van de Hybrid Cloud<\/a><\/h3><p class=\"wpgb-block-2 wpgb-idle-scheme-2\">Wat is een Hybrid Cloud en wat zijn de voordelen? Ontdek wanneer een combinatie van een...<\/p><a class=\"wpgb-block-3 grid-more-info-green\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/van-versnippering-naar-overzicht-de-kracht-van-de-hybrid-cloud\/\">READ MORE <i aria-hidden=\"true\" class=\"grid-more-info-green fas fa-arrow-right\"><\/i><\/a><\/div><\/div><a class=\"wpgb-card-layer-link\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/van-versnippering-naar-overzicht-de-kracht-van-de-hybrid-cloud\/\"><\/a><\/div><\/div><\/article><article class=\"wpgb-card wpgb-card-5 wpgb-post-31020\" data-col=\"1\" data-row=\"1\" data-format=\"standard\"><div class=\"wpgb-card-wrapper\"><div class=\"wpgb-card-inner\" data-action><div class=\"wpgb-card-media wpgb-scheme-light\"><svg data-ratio style=\"padding-top:66.67%\" viewBox=\"0 0 768 512\"><\/svg><div class=\"wpgb-card-media-thumbnail\"><a href=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research.png\" tabindex=\"-1\" class=\"wpgb-handle-lb wpgb-lightbox\" data-type=\"image\" data-rel=\"6\" data-title=\"Header blog 2 cybersecurity research\" title=\"Enlarge photo\"><div style=\"background-image:url(https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research-768x512.png)\"><\/div><noscript><img loading=\"lazy\" decoding=\"async\" class=\"wpgb-noscript-img\" src=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/10\/Header-blog-2-cybersecurity-research-768x512.png\" alt=\"\" height=\"512\" width=\"768\"><\/noscript><\/a><\/div><div class=\"wpgb-card-media-content\"><div class=\"wpgb-card-media-content-top\"><div class=\"wpgb-block-4 blog-category-grid\"><span class=\"wpgb-block-term\" data-id=\"64\">Blogs<\/span><\/div><\/div><\/div><\/div><div class=\"wpgb-card-content wpgb-scheme-dark\"><div class=\"wpgb-card-body\"><div class=\"wpgb-block-5\">30 oktober 2025<\/div><h3 class=\"wpgb-block-1 wpgb-idle-scheme-1 wpgb-hover-accent-1\"><a href=\"https:\/\/www.solvinity.com\/nl\/blog\/in-house-security-of-uitbesteden-dit-kiezen-nederlandse-organisaties\/\">In-house security of uitbesteden: dit kiezen Nederlandse organisaties<\/a><\/h3><p class=\"wpgb-block-2 wpgb-idle-scheme-2\">Organisaties staan voor een keuze: investeren in een eigen intern securityteam, uitbesteden aan een externe partij,...<\/p><a class=\"wpgb-block-3 grid-more-info-green\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/in-house-security-of-uitbesteden-dit-kiezen-nederlandse-organisaties\/\">READ MORE <i aria-hidden=\"true\" class=\"grid-more-info-green fas fa-arrow-right\"><\/i><\/a><\/div><\/div><a class=\"wpgb-card-layer-link\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/in-house-security-of-uitbesteden-dit-kiezen-nederlandse-organisaties\/\"><\/a><\/div><\/div><\/article>\t\t<\/div>\n\t<\/div>\n\t<\/div>\n\t<\/div>\n\t\t<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.<\/p>\n","protected":false},"featured_media":31282,"parent":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-31149","blog","type-blog","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-nl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>De stille dreiging van schijnveiligheid - Solvinity<\/title>\n<meta name=\"description\" content=\"Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"De stille dreiging van schijnveiligheid - Solvinity\" \/>\n<meta property=\"og:description\" content=\"Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/\" \/>\n<meta property=\"og:site_name\" content=\"Solvinity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-11T09:58:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/\",\"url\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/\",\"name\":\"De stille dreiging van schijnveiligheid - Solvinity\",\"isPartOf\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png\",\"datePublished\":\"2025-11-11T09:41:17+00:00\",\"dateModified\":\"2025-11-11T09:58:12+00:00\",\"description\":\"Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#primaryimage\",\"url\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png\",\"contentUrl\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png\",\"width\":1200,\"height\":800,\"caption\":\"De stille dreiging van schijnveiligheid\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.solvinity.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De stille dreiging van schijnveiligheid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/#website\",\"url\":\"https:\/\/www.solvinity.com\/nl\/\",\"name\":\"Solvinity\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.solvinity.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/#organization\",\"name\":\"Solvinity\",\"url\":\"https:\/\/www.solvinity.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png\",\"contentUrl\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png\",\"width\":344,\"height\":72,\"caption\":\"Solvinity\"},\"image\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"De stille dreiging van schijnveiligheid - Solvinity","description":"Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/","og_locale":"nl_NL","og_type":"article","og_title":"De stille dreiging van schijnveiligheid - Solvinity","og_description":"Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.","og_url":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/","og_site_name":"Solvinity","article_modified_time":"2025-11-11T09:58:12+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/","url":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/","name":"De stille dreiging van schijnveiligheid - Solvinity","isPartOf":{"@id":"https:\/\/www.solvinity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#primaryimage"},"image":{"@id":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png","datePublished":"2025-11-11T09:41:17+00:00","dateModified":"2025-11-11T09:58:12+00:00","description":"Ontdek waarom organisaties wel in maatregelen investeren, maar vaak het overzicht en de kennis missen om hun data goed te beschermen.","breadcrumb":{"@id":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#primaryimage","url":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png","contentUrl":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2025\/11\/Blog-3-visual.png","width":1200,"height":800,"caption":"De stille dreiging van schijnveiligheid"},{"@type":"BreadcrumbList","@id":"https:\/\/www.solvinity.com\/nl\/blog\/de-stille-dreiging-van-schijnveiligheid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.solvinity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"De stille dreiging van schijnveiligheid"}]},{"@type":"WebSite","@id":"https:\/\/www.solvinity.com\/nl\/#website","url":"https:\/\/www.solvinity.com\/nl\/","name":"Solvinity","description":"","publisher":{"@id":"https:\/\/www.solvinity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solvinity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.solvinity.com\/nl\/#organization","name":"Solvinity","url":"https:\/\/www.solvinity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png","contentUrl":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png","width":344,"height":72,"caption":"Solvinity"},"image":{"@id":"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/blog\/31149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/types\/blog"}],"version-history":[{"count":38,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/blog\/31149\/revisions"}],"predecessor-version":[{"id":31313,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/blog\/31149\/revisions\/31313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/media\/31282"}],"wp:attachment":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/media?parent=31149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/categories?post=31149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/tags?post=31149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}