{"id":973,"date":"2020-06-25T15:08:38","date_gmt":"2020-06-25T13:08:38","guid":{"rendered":"https:\/\/fin2ition.nl\/cyber-security\/"},"modified":"2020-06-25T15:08:38","modified_gmt":"2020-06-25T13:08:38","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/fin2ition.nl\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><script type=\"text\/javascript\">jQuery(function() { _initLayerSlider( '#layerslider_23_1v6bmx8mx4fyk', {sliderVersion: '6.7.6', responsiveUnder: 950, layersContainer: 0, allowFullscreen: true, slideBGSize: 'auto', hideUnder: 0, hideOver: 100000, pauseOnHover: 1, twoWaySlideshow: true, skin: 'noskin', sliderFadeInDuration: 350, globalBGColor: '#ffffff', useSrcset: true, skinsPath: 'https:\/\/fin2ition.nl\/wp-content\/plugins\/LayerSlider\/assets\/static\/layerslider\/skins\/', performanceMode: true}); });<\/script><link href=\"https:\/\/fonts.googleapis.com\/css?family=Antic+Slab:100,100i,200,200i,300,300i,400,400i,500,500i,600,600i,700,700i,800,800i,900,900i\" rel=\"stylesheet\"><div id=\"layerslider_23_1v6bmx8mx4fyk\"  class=\"ls-wp-container fitvidsignore ls-selectable\" style=\"width:950px;height:275px;margin:0 auto;margin-bottom: 20x;\"><div class=\"ls-slide\" data-ls=\"duration:4000;\"><img decoding=\"async\" width=\"1058\" height=\"575\" src=\"https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered.jpg\" class=\"ls-bg\" alt=\"\" srcset=\"https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-200x109.jpg 200w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-300x163.jpg 300w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-400x217.jpg 400w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-600x326.jpg 600w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-768x417.jpg 768w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-800x435.jpg 800w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered-1024x557.jpg 1024w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/Informatiebeveiliging_rendered.jpg 1058w\" sizes=\"(max-width: 1058px) 100vw, 1058px\" \/><p style=\"padding-top:10px;padding-right:10px;padding-bottom:10px;padding-left:10px;font-family:Antic Slab;font-size:35px;color:#ffffff;background:#85b815;top:100px;left:66px;white-space:normal;\" class=\"ls-l ls-text-layer\" data-ls=\"offsetxin:right;fadein:false;scalexin:1.0;scaleyin:1.0;offsetxout:right;fadeout:false;scalexout:1.0;scaleyout:1.0;parallaxlevel:0;\">Cyber Security<\/p><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;width:30.6666%; margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Every organization has its own palette of relevant risks and accepted level of cyber security. In addition, organizations differ in their compliance needs, depending on their operations in a financial sector, healthcare, education, telecommunication, government, etcetera.<\/p>\n<p>However, not every organization has the in-house knowledge to create a clear view of the level of efforts and investments needed to reach an optimum position between acceptable risk and necessary cyber security measure.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-one-third\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;width:30.6666%; margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><p>This requires experience in assessing not only the current level of cyber security, and the desired end state, but also a clear insight in how to find the optimum balance between security (and it\u2019s cost level) and acceptable risk.<\/p>\n<p>To achieve the intended balance in cyber security, it is important to have a clear strategy, including defined guiding principles. These will set priorities, focus areas, and identify where the organization needs to make choices and agree on tactics to be followed.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;width:30.6666%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><p>Having a temporary support could be a cost-effective way forward in the cyber security field. This is where FIN2ITion specialists could step in to support in the journey. Our consultants and IT architects blend business experience combined with in-depth knowledge of how to get compliant within the frameworks that are relevant for your sector of operations. The technical and organizational insights they bring, will deliver pragmatic answers to your cyber security challenges.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-973","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages\/973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/comments?post=973"}],"version-history":[{"count":0,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages\/973\/revisions"}],"wp:attachment":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/media?parent=973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}