{"id":3011,"date":"2024-05-14T10:21:41","date_gmt":"2024-05-14T09:21:41","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=3011"},"modified":"2026-04-08T10:54:03","modified_gmt":"2026-04-08T09:54:03","slug":"five-key-threat-actor-groups","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/","title":{"rendered":"Five Key Threat Actor Groups\u00a0"},"content":{"rendered":"\n<p>In an age where digital connectivity is key for organisations to operate, the ever-evolving landscape of cyber threats increases. Threat actors are continuously orchestrating malicious actions to compromise IT security, posing a constant challenge, making it paramount they have the correct protection.&nbsp;<\/p>\n\n\n\n<p>To make sure your organisation stays free of cyber threats, it is essential to look out for threat actors who are awaiting their turn to attack, when you least expect it.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It is essential that organisations are prepared. This blog aims to shed some light on these key threat actor groups, empowering organisations to recognise potential cyber threats before they materialise.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">What are the 5 Types of Threat Actors?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Within the latest <a href=\"https:\/\/cwsisecurity.com\/microsoft-digital-defence-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft&#8217;s Digital Defence Report<\/a>, five categories of threat actors are defined:&nbsp;<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Nation-state actors.<\/strong><\/li>\n\n\n\n<li><strong>Financially motivated actors.<\/strong><\/li>\n\n\n\n<li><strong>Cyber mercenaries or private sector offensive actors.<\/strong><\/li>\n\n\n\n<li><strong>Influence operations.<\/strong><\/li>\n\n\n\n<li><strong>Groups in development.<\/strong><\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-nation-state-actors\">Nation-state actors<\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This group of actors operate on behalf of or is directed by a nation\/state-aligned program, irrespective of whether the goal is espionage, financial gain, or retribution. Microsoft observed that the majority of nation-state actors will focus their operations and attacks on government agencies, intergovernmental organisations, nongovernmental organisations, and think tanks for traditional espionage or surveillance objectives.<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Financially motivated actors<\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Actors who are driven by financial motives account for cyber campaigns or groups who are guided by criminal organisations for monetary gain. These groups do not associate with high confidence, to a non-nation state or commercial entities. This group of actors encompasses <a href=\"https:\/\/cwsisecurity.com\/cwsi-blog-boost-your-resilience-against-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> operators, business email compromise, <a href=\"https:\/\/cwsisecurity.com\/phishing-in-2024-five-modern-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a>, as well as other groups who only have financial or extortion motivations.<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Private sector offensive actors (PSOAs)<\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Private sector offensive actors (PSOAs) are commonly known as cyber mercenaries, this refers to commercial actors who are legitimate legal entities that create and sell cyberweapons to customers and in turn select specific targets and operate the cyberweapons for attack.<\/p>\n\n\n\n<p>It has been observed that these tools target and surveil dissidents, human rights defenders, journalists, civil society advocates, and other private citizens, posing a threat to many global human rights efforts.<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Influence operations<\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Influence operations encompass information campaigns that communicate through various channels on and offline in a manipulative approach. Their primary aim is to shift perception, behaviours, or decisions by target audiences to further a group or a nation\u2019s interests and objectives.<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Groups in development<\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Activities posing threats that are unidentified, emerging, or in the developing stages fall under the temporary designation \u2018groups in development.\u2019 This allows Microsoft to monitor a group as a discrete set of information until higher confidence is reached about the origin or identity of the actor behind the operation. Once the specific criteria are met, a group in development is transferred to a named actor or merged into existing names.<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Name taxonomy of threat actors<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In April 2023, Microsoft has decided to transform their naming categorisation aligning it with the theme of weather in response to the increasing complexity, scale, and volume of threats. This allows customers to understand threats quicker and clearer.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The updated categorisation brings better context to security researchers that are already confronted with a consuming amount of threat intelligence data. Using weather terms offers a more organised, memorable, and easy way to reference adversary groups, allowing organisations to prioritise threats and protect themselves more efficiently. The adoption of these weather-centric terms ensures that security professionals can understand the nature of the threat actor simply by reading their name. If you&#8217;d like more information about the naming of threat actors, we recommend reading <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/intelligence\/microsoft-threat-actor-naming?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft&#8217;s threat actors guidance<\/a>.<\/p>\n\n\n\n<p>The table below shows an overview of the actor categories, their type and the weather term that is assigned to them. Nation-state actors are assigned to a family name according to a country\/region of origin, Typhoon for example indicates the origin or attribution to China. The family name of other actors represents a motivation, like Tempest, which indicates financially motivated actors.&nbsp;<\/p>\n\n\n\n<p>Threat actors that belong to the same weather family have received an adjective to distinguish the actor groups within distinct tactics, techniques, and procedures (TTPs), infrastructure, objectives, or other identified patterns. Groups in development have received a temporary designation of Storm with a four-digit number where there is a newly discovered, unknown, emerging, or developing cluster of threat activity.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/05\/threat-actor-table-1024x636.png\" alt=\"Threat Actor Table\" class=\"wp-image-3012\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Contact Us to Discuss Threat Actor Groups<\/h2>\n\n\n\n<p>If you require more information on how to keep your organisation secure, or you have more questions around the different types of threat actors, we recommend contacting us via the form below.<\/p>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-06-03\/fdpz6\" width=\"100%\" height=\"650\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>In an age where digital connectivity is key for organisations to operate, the ever-evolving landscape of cyber threats increases. Threat actors are continuously orchestrating malicious actions to compromise IT security, posing a constant challenge, making it paramount they have the correct protection.&nbsp; To make sure your organisation stays free of cyber threats, it is essential [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":509,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4,1],"tags":[],"class_list":["post-3011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Five Key Threat Actor Groups | CWSI<\/title>\n<meta name=\"description\" content=\"In this detailed blog, discover the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materialise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Key Threat Actor Groups\u00a0\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T09:21:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T09:54:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-393@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"160\" \/>\n\t<meta property=\"og:image:height\" content=\"197\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/\"},\"headline\":\"Five Key Threat Actor Groups\u00a0\",\"datePublished\":\"2024-05-14T09:21:41+00:00\",\"dateModified\":\"2026-04-08T09:54:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-393@2x.png\",\"articleSection\":[\"Insights\",\"Our Voice\",\"Uncategorised\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/\",\"name\":\"Five Key Threat Actor Groups | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-393@2x.png\",\"datePublished\":\"2024-05-14T09:21:41+00:00\",\"dateModified\":\"2026-04-08T09:54:03+00:00\",\"description\":\"In this detailed blog, discover the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materialise.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-393@2x.png\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-393@2x.png\",\"width\":160,\"height\":197},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/five-key-threat-actor-groups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Key Threat Actor Groups\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Five Key Threat Actor Groups | CWSI","description":"In this detailed blog, discover the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materialise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/","og_locale":"nl_NL","og_type":"article","og_title":"Five Key Threat Actor Groups\u00a0","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/","og_site_name":"CWSI","article_published_time":"2024-05-14T09:21:41+00:00","article_modified_time":"2026-04-08T09:54:03+00:00","og_image":[{"width":160,"height":197,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-393@2x.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/"},"headline":"Five Key Threat Actor Groups\u00a0","datePublished":"2024-05-14T09:21:41+00:00","dateModified":"2026-04-08T09:54:03+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/"},"wordCount":760,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-393@2x.png","articleSection":["Insights","Our Voice","Uncategorised"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/","url":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/","name":"Five Key Threat Actor Groups | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-393@2x.png","datePublished":"2024-05-14T09:21:41+00:00","dateModified":"2026-04-08T09:54:03+00:00","description":"In this detailed blog, discover the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materialise.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#primaryimage","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-393@2x.png","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-393@2x.png","width":160,"height":197},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/five-key-threat-actor-groups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Five Key Threat Actor Groups\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=3011"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3011\/revisions"}],"predecessor-version":[{"id":8357,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3011\/revisions\/8357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media\/509"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=3011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=3011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=3011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}