{"id":2719,"date":"2024-01-24T17:25:20","date_gmt":"2024-01-24T17:25:20","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2719"},"modified":"2025-12-02T13:53:33","modified_gmt":"2025-12-02T13:53:33","slug":"how-to-protect-your-organisation-against-evolving-phishing-attacks","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/","title":{"rendered":"How to Protect your Organisation Against Evolving Phishing Attacks"},"content":{"rendered":"\n<p>As <a href=\"https:\/\/cwsisecurity.com\/phishing-in-2024-five-modern-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a> campaigns continue to improve in sophistication, organisations have trouble educating their users on the latest mechanisms and techniques. To empower your employees to protect themselves from phishing attacks, intelligent simulations are key. In this blog, we take a closer look at the impact of such targeted trainings.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Phishing attacks remain a persistent and pervasive threat in the digital landscape. And with phishing campaigns continuing to improve in sophistication, vigilance and awareness are key. By staying informed, adopting best practices, and fostering a culture of cyber awareness, organisations can effectively combat phishing attacks and safeguard their infrastructure.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Phishing simulations, for example, can be a powerful tool in increasing awareness and cyber resilience. In its annual Digital Defence Report, Microsoft takes a closer look at the end-user behaviour in phishing simulations and shares insights on the impact of such trainings. In this blog, we will walk you through the most important results.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"h-phishing-remains-a-challenge-1\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Phishing remains a challenge<\/mark><\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The fundamentals of phishing haven\u2019t changed over time. No less than 90% of phishing attacks involve social engineering. With humans remaining the primary risk vector in social engineering attacks, the door to cybercrime is wide open. As phishing attack mechanisms are constantly evolving, and bad actors are increasingly creating new tactics, users often click on links and attachments by habit or without conscious consideration of their actions.&nbsp;&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Website-landscape-images-8.png\" alt=\"blue ball in maze\" class=\"wp-image-2720\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>As the Microsoft Digital Defence Report shows, users are particularly vulnerable to drive-by URL attacks. The malicious URL in the message takes the user to a familiar-looking website that silently runs and\/or installs code on the user&#8217;s device. To launch such attacks, cybercriminals inject a malicious component into a security flaw on the website.&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">A tailored approach is required<\/mark><\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Most phishing awareness programs prioritise meeting compliance requirements over delivering an effective behaviour change program. They operate under the misguided assumption that periodic exposure to a simulated attack, accompanied by a brief educational encounter, equips users to identify and avoid advanced and evolving phishing attempts. However, these programs have proven to be insufficient.&nbsp;&nbsp;<\/p>\n\n\n\n<p>To implement an effective awareness strategy, it is vital to adopt objective behavioural measures and contextual experiences that prioritise behaviour change over information delivery. Organisations must recognise that every user is unique and has its own behavioural tendencies. As a result, each user requires a personalised learning experience based on their unique behaviours and profile, such as job function, security posture, and past actions.&nbsp;<\/p>\n\n\n\n<p>By going beyond generic, one-size-\ufb01ts-all training and instead providing tailored and context-aware engagement models that can be implemented at scale, organisations can make a real impact in reducing behavioural risk against modern social engineering attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">A phishing risk-reduction tool<\/mark><\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To support organisations in automatically deploying a security awareness program and measuring behavioural change, Microsoft provides administrators with the possibility of simulating phishing attacks and training their users on phishing prevention via the Attack Simulation Training module in Microsoft Defender.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Want to learn more about this hidden and often unused gem? Catch up on our Security Awareness with Microsoft webinar for a step-by-step guide to successfully setting up and executing a phishing simulation.\u00a0<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex gap-1 mb-3\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"btn btn-outline-primary wp-element-button\" href=\"https:\/\/youtu.be\/AVbf2cD6rog\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Watch Here<\/mark><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Content originated from the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\">Microsoft Digital Defence Report<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As phishing campaigns continue to improve in sophistication, organisations have trouble educating their users on the latest mechanisms and techniques. To empower your employees to protect themselves from phishing attacks, intelligent simulations are key. In this blog, we take a closer look at the impact of such targeted trainings.&nbsp;&nbsp; Phishing attacks remain a persistent and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4,1],"tags":[],"class_list":["post-2719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Protect your Organisation Against Evolving Phishing Attacks - CWSI<\/title>\n<meta name=\"description\" content=\"To empower your employees to protect themselves from phishing attacks, intelligent simulations are key.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect your Organisation Against Evolving Phishing Attacks\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-24T17:25:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T13:53:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/\"},\"headline\":\"How to Protect your Organisation Against Evolving Phishing Attacks\",\"datePublished\":\"2024-01-24T17:25:20+00:00\",\"dateModified\":\"2025-12-02T13:53:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/\"},\"wordCount\":551,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\",\"Uncategorised\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/\",\"name\":\"How to Protect your Organisation Against Evolving Phishing Attacks - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-01-24T17:25:20+00:00\",\"dateModified\":\"2025-12-02T13:53:33+00:00\",\"description\":\"To empower your employees to protect themselves from phishing attacks, intelligent simulations are key.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/how-to-protect-your-organisation-against-evolving-phishing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect your Organisation Against Evolving Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Protect your Organisation Against Evolving Phishing Attacks - CWSI","description":"To empower your employees to protect themselves from phishing attacks, intelligent simulations are key.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/","og_locale":"nl_NL","og_type":"article","og_title":"How to Protect your Organisation Against Evolving Phishing Attacks","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/","og_site_name":"CWSI","article_published_time":"2024-01-24T17:25:20+00:00","article_modified_time":"2025-12-02T13:53:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/"},"headline":"How to Protect your Organisation Against Evolving Phishing Attacks","datePublished":"2024-01-24T17:25:20+00:00","dateModified":"2025-12-02T13:53:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/"},"wordCount":551,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice","Uncategorised"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/","url":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/","name":"How to Protect your Organisation Against Evolving Phishing Attacks - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-01-24T17:25:20+00:00","dateModified":"2025-12-02T13:53:33+00:00","description":"To empower your employees to protect themselves from phishing attacks, intelligent simulations are key.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/how-to-protect-your-organisation-against-evolving-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"How to Protect your Organisation Against Evolving Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2719"}],"version-history":[{"count":0,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}