{"id":3952,"date":"2025-08-22T15:11:38","date_gmt":"2025-08-22T14:11:38","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=3952"},"modified":"2025-12-02T13:52:26","modified_gmt":"2025-12-02T13:52:26","slug":"preventing-data-leaks-in-the-age-of-shadow-ai","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/","title":{"rendered":"Preventing Data Leaks in the Age of Shadow AI"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Artificial Intelligence has become an essential part of modern work, driving productivity and innovation across industries. But alongside these benefits comes a new and growing challenge: the uncontrolled use of generative AI tools by employees outside the oversight of IT and security teams. This phenomenon, known as\u00a0<em>Shadow AI<\/em>, is more common than many organisations realise. In fact, research shows that nearly eight out of ten employees admit to bringing their own AI tools into the workplace. While often well-intentioned, this practice can expose companies to serious risks, from sensitive data leaks and regulatory non-compliance to reputational damage that can impact customer trust and even financial performance.<\/p>\n\n\n\n<p>To help you turn Shadow AI from a hidden risk into a managed advantage, this blog explores how Microsoft\u2019s security ecosystem can give IT and security teams the visibility and control they need to keep AI adoption safe and compliant.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/08\/Website-long-Images-23.png\" alt=\"\" class=\"wp-image-3953\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">When Good Intentions Go Wrong<\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The rise of generative AI has created a powerful temptation for employees. Instant answers, polished summaries, and creative input at the click of a button. In fast-paced environments where deadlines are tight, turning to these tools can feel like a harmless shortcut, even a smart way to get the job done more efficiently. Yet good intentions do not always equal safe practices.<\/p>\n\n\n\n<p>A recent example illustrates this danger. At a company rolling out Microsoft 365 Copilot, employees decided to bypass the sanctioned tool and use an external consumer AI app instead. Believing they would get a quicker or more accurate result, they pasted confidential project details into the platform. What seemed like a minor time-saver quickly escalated into a serious incident: highly sensitive information was prematurely exposed, resulting in negative publicity and a sharp drop in market confidence.<\/p>\n\n\n\n<p>This is the reality of Shadow AI. Even when organisations put clear policies in place, or attempt outright bans on unsanctioned applications, employees often look for workarounds. They may use unmanaged personal devices, connect through unsecured networks, or log in with private accounts. Each of these routes bypasses established security controls, leaving IT blind to where data is going and who has access. Over time, these hidden practices accumulate, creating a parallel ecosystem of AI usage that sits outside governance frameworks. For security leaders, this means a growing risk that is difficult to quantify and even harder to contain.<\/p>\n\n\n\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft\u2019s Blueprint for Safe AI Adoption<\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To address the growing risks of Shadow AI, Microsoft has developed a comprehensive blueprint that helps organisations move from reactive bans to proactive, secure adoption of AI.&nbsp;<\/p>\n\n\n\n<p>Structured around a series of phases \u2013 from discovering how AI is being used, to controlling access, protecting sensitive data, and governing interactions \u2013 this approach shows how visibility, control, and governance come together to form a secure foundation for AI adoption.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8083d9\" class=\"has-inline-color\">\u00a01.<\/mark> Gain Visibility<\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The first step is gaining insight into which AI applications are being used and how employees are interacting with them. With Microsoft Defender for Cloud Apps, organisations can analyse network logs and detect both sanctioned and unsanctioned AI usage. Microsoft Purview\u2019s Data Security Posture Management for AI further enriches this view, providing detailed reports on whether sensitive information is being shared in AI prompts and highlighting potential oversharing risks.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8083d9\" class=\"has-inline-color\">2. <\/mark>Control Access<\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Once visibility is established, the next challenge is controlling access. Microsoft makes it possible to block unsanctioned AI apps outright, or to apply more nuanced restrictions, such as limiting usage to specific groups, or blocking high-risk users altogether through Entra conditional access policies. Intune adds another layer of enforcement by preventing the installation of unauthorised AI apps on managed devices, ensuring that the rules extend all the way to the endpoint.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8083d9\" class=\"has-inline-color\">3. <\/mark>Protect Sensitive Data<\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Access control alone is not enough. Protecting the data that flows into sanctioned AI apps is equally critical. Microsoft Purview plays a central role here, applying sensitivity labels and encryption that prevent confidential files from being copied into consumer AI tools. Data Loss Prevention (DLP) policies can block copy-paste actions, uploads, or unsafe prompts in browsers such as Microsoft Edge, while network policies extend protection to non-Microsoft environments. This ensures that even when employees use approved AI solutions like Microsoft 365 Copilot, the organisation maintains full control over how sensitive content is handled.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8083d9\" class=\"has-inline-color\">4.<\/mark> Enforce Governance<\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The final piece of the puzzle is governance. With Purview Audit and eDiscovery capabilities, organisations can capture and review AI interactions, detect inappropriate prompts, and retain or delete data in line with compliance requirements. Insider Risk Management templates add another layer by flagging risky or suspicious AI activity, while Adaptive Protection automatically adjusts controls based on the user\u2019s behaviour and risk profile.\u00a0<\/p>\n\n\n\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8083d9\" class=\"has-inline-color\">How CWSI Can Help\u00a0<\/mark><\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Shadow AI doesn\u2019t have to remain an unmanaged threat. With Microsoft\u2019s layered approach, spanning Defender, Entra, Intune, and Purview, organisations can turn a potential liability into a competitive advantage. By combining visibility with proactive controls and strong governance, IT and security leaders can enable safe, compliant, and responsible AI adoption at scale.<\/p>\n\n\n\n<p>At CWSI, we help organisations put this blueprint into practice. From assessing your AI risk exposure to deploying Microsoft\u2019s security and compliance tools effectively, our role is to ensure that AI becomes a trusted part of your digital workplace.<\/p>\n\n\n\n<p>If you\u2019d like to explore how we can support your organisation in transforming shadow IT from a hidden risk into a driver of secure innovation, simply fill out the contact form to speak with one of our AI experts.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2025-08-22\/26tcym\" width=\"100%\" height=\"700\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>Artificial Intelligence has become an essential part of modern work, driving productivity and innovation across industries. But alongside these benefits comes a new and growing challenge: the uncontrolled use of generative AI tools by employees outside the oversight of IT and security teams. This phenomenon, known as\u00a0Shadow AI, is more common than many organisations realise. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3954,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[],"class_list":["post-3952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Preventing Data Leaks in the Age of Shadow AI | CWSI<\/title>\n<meta name=\"description\" content=\"This blog explores how Microsoft\u2019s security ecosystem can give IT teams the visibility and control they need to keep AI adoption safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing Data Leaks in the Age of Shadow AI\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-22T14:11:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T13:52:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/\"},\"headline\":\"Preventing Data Leaks in the Age of Shadow AI\",\"datePublished\":\"2025-08-22T14:11:38+00:00\",\"dateModified\":\"2025-12-02T13:52:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/\"},\"wordCount\":916,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/\",\"name\":\"Preventing Data Leaks in the Age of Shadow AI | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2025-08-22T14:11:38+00:00\",\"dateModified\":\"2025-12-02T13:52:26+00:00\",\"description\":\"This blog explores how Microsoft\u2019s security ecosystem can give IT teams the visibility and control they need to keep AI adoption safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/preventing-data-leaks-in-the-age-of-shadow-ai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preventing Data Leaks in the Age of Shadow AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Preventing Data Leaks in the Age of Shadow AI | CWSI","description":"This blog explores how Microsoft\u2019s security ecosystem can give IT teams the visibility and control they need to keep AI adoption safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/","og_locale":"nl_NL","og_type":"article","og_title":"Preventing Data Leaks in the Age of Shadow AI","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/","og_site_name":"CWSI","article_published_time":"2025-08-22T14:11:38+00:00","article_modified_time":"2025-12-02T13:52:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"5 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/"},"headline":"Preventing Data Leaks in the Age of Shadow AI","datePublished":"2025-08-22T14:11:38+00:00","dateModified":"2025-12-02T13:52:26+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/"},"wordCount":916,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/","url":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/","name":"Preventing Data Leaks in the Age of Shadow AI | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#primaryimage"},"thumbnailUrl":"","datePublished":"2025-08-22T14:11:38+00:00","dateModified":"2025-12-02T13:52:26+00:00","description":"This blog explores how Microsoft\u2019s security ecosystem can give IT teams the visibility and control they need to keep AI adoption safe.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/preventing-data-leaks-in-the-age-of-shadow-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Preventing Data Leaks in the Age of Shadow AI"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=3952"}],"version-history":[{"count":0,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3952\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=3952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=3952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=3952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}