{"id":815524,"date":"2022-01-27T13:19:45","date_gmt":"2022-01-27T12:19:45","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=815524"},"modified":"2023-03-28T10:48:31","modified_gmt":"2023-03-28T09:48:31","slug":"fa3-microsoft-security-iedereen-is-icter-blog-overzicht","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa3-microsoft-security-iedereen-is-icter-blog-overzicht\/","title":{"rendered":"Microsoft Security: Iedereen is ICT\u2019er \u2013 blog overzicht."},"content":{"rendered":"<p><span data-contrast=\"auto\">Hieronder staat het totale overzicht van al onze blogs. Klik op de titel om het blog te lezen.<\/span><\/p>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse; width: 65.3866%; height: 448px;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 100%; height: 23px; text-align: left;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-aan-wie-vertrouw-jij-je-data-toe\/\">Aan wie vertrouw jij je data toe?<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; height: 10px; text-align: left;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-hackers-hoeven-niet-te-hacken-ze-loggen-gewoon-in\/\">Hackers hoeven niet te hacken, ze loggen gewoon in<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; height: 24px; text-align: left;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-opeens-weet-je-het-ik-word-ethisch-hacker\/\">Opeen weet je het: ik word ethisch hacker!<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; text-align: left; height: 24px;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-op-kantoor-geen-stekkertjes-meer-in-de-muur\/\">Op kantoor geen stekkertje meer in de muur<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; height: 24px; text-align: left;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-met-desinformatie-hack-je-de-mens\/\">Met desinformatie hack je &#8216;de mens&#8217;<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; height: 24px; text-align: left;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-hacken-is-altijd-een-combinatie-van-online-en-offline\/\">Hacken is altijd een combinatie van online en offline<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; text-align: left; height: 24px;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-met-platform-approach-maak-je-het-hackers-moeilijk\/\">Met Platform Approach maak je het hacker moeilijk<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 100%; height: 24px; text-align: left;\"><a href=\"https:\/\/pulse.microsoft.com\/nl-nl\/work-productivity-nl-nl\/na\/fa2-nation-state-threats\/\">Nation State Threats<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Hieronder staat het totale overzicht van al onze blogs. Klik op de titel om het blog te lezen. &nbsp; Aan wie vertrouw jij je data toe? Hackers hoeven niet te hacken, ze loggen gewoon in Opeen weet je het: ik word ethisch hacker! Op kantoor geen stekkertje meer in de muur Met desinformatie hack je [&hellip;]<\/p>\n","protected":false},"author":766,"featured_media":815537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"class_list":["post-815524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","specials-work-productivity-nl-nl","stories-managing-your-data-nl-nl","stories-hoe-kan-ik-veilig-gegevens-beheren-gegevensbeheer","businessPriorities-data-ai-nl-nl"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/posts\/815524"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/users\/766"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/comments?post=815524"}],"version-history":[{"count":14,"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/posts\/815524\/revisions"}],"predecessor-version":[{"id":815833,"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/posts\/815524\/revisions\/815833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/media\/815537"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/media?parent=815524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/nl-nl\/wp-json\/wp\/v2\/categories?post=815524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}