{"id":8265,"date":"2026-03-30T11:15:56","date_gmt":"2026-03-30T10:15:56","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=8265"},"modified":"2026-03-30T11:15:58","modified_gmt":"2026-03-30T10:15:58","slug":"security-gaps-dont-come-from-attacks-they-come-from-drift","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/","title":{"rendered":"Security gaps don\u2019t come from attacks, they come from drift"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p>Most organisations don\u2019t lack controls. On paper, the right policies are in place; access is defined, tools are configured and frameworks like Cyber Essentials Plus are mapped out.<\/p>\n\n\n\n<p>And yet, gaps still appear.<\/p>\n\n\n\n<p>Not because something was missed at the start, but because things changed along the way.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-drift-actually-looks-like\"><strong><strong>What drift actually looks like<\/strong><\/strong><\/h2>\n\n\n\n<p>Drift is rarely dramatic, it usually builds quietly.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access granted for a project that never quite ended<\/li>\n\n\n\n<li>New tools introduced to solve an immediate problem<\/li>\n\n\n\n<li>Temporary permissions that quietly became permanent<\/li>\n\n\n\n<li>Teams evolving, while access stays the same<\/li>\n\n\n\n<li>Policies written once, then left to age<\/li>\n<\/ul>\n\n\n\n<p>None of this feels urgent in isolation, but together, it creates a picture that no longer matches reality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-it-s-easy-to-miss\"><strong><strong>Why it\u2019s easy to miss<\/strong><\/strong><\/h2>\n\n\n\n<p>Most teams are busy keeping things running.<\/p>\n\n\n\n<p>Ownership is often spread across departments and visibility is partial. Everyone sees a piece of the picture, but not the whole. So, drift doesn\u2019t look like a problem. It just looks like normal change.<\/p>\n\n\n\n<p>Until something brings it into focus like an audit, an incident or sometimes just a simple question that turns out to be harder to answer than expected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-where-ce-fits-into-this\"><strong><strong>Where CE+ fits into this<\/strong><\/strong><\/h2>\n\n\n\n<p>Cyber Essentials Plus often surfaces drift, even when that\u2019s not the intention.<\/p>\n\n\n\n<p>Organisations don\u2019t usually struggle because they ignored the framework. They struggle because their environment has moved on. Controls that were once aligned are now slightly out of step.<\/p>\n\n\n\n<p>CE+ highlights that gap.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-underlying-issue\"><strong><strong>The underlying issue<\/strong><\/strong><\/h2>\n\n\n\n<p>It\u2019s tempting to respond by tightening the rules with more policies, more checks and more effort.<\/p>\n\n\n\n<p>But stronger rules don\u2019t fix drift, they often add to the workload without addressing the cause. The real issue is consistency over time. Security is not a one-off exercise, it\u2019s something that needs to keep pace with how the business changes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-more-practical-way-to-approach-it\"><strong><strong>A more practical way to approach it<\/strong><\/strong><\/h2>\n\n\n\n<p>Good security tends to look fairly simple from the outside.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access reflects real roles, not historical ones<\/li>\n\n\n\n<li>Sensitive data is visible and understood<\/li>\n\n\n\n<li>Changes are tracked, not assumed<\/li>\n\n\n\n<li>Controls adapt as the environment evolves<\/li>\n<\/ul>\n\n\n\n<p>This isn\u2019t about adding complexity. It\u2019s about reducing the small gaps that build up over time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-quick-sense-check\"><strong>A quick sense check<\/strong><\/h2>\n\n\n\n<p><a>If any of these sound familiar, drift may already be in play:<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You\u2019re not entirely sure who has access to what<\/li>\n\n\n\n<li>Permissions are rarely reviewed unless there\u2019s an issue<\/li>\n\n\n\n<li>New tools appear faster than they\u2019re governed<\/li>\n\n\n\n<li>CE+ feels like a periodic hurdle rather than a steady process<\/li>\n<\/ul>\n\n\n\n<p>Again, none of this is unusual. It\u2019s simply what happens without continuous oversight.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keeping-things-steady\"><strong><strong>Keeping things steady<\/strong><\/strong><\/h2>\n\n\n\n<p>Once you can see what\u2019s really happening, the focus shifts.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regular access reviews become part of the rhythm<\/li>\n\n\n\n<li>Changes are easier to track and manage<\/li>\n\n\n\n<li>Policies start to reflect reality, not just intention<\/li>\n<\/ul>\n\n\n\n<p>Over time, things feel more predictable and less reactive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-if-you-d-rather-not-manage-this-alone\"><strong>If you\u2019d rather not manage this alone<\/strong><\/h2>\n\n\n\n<p>We often see teams who know where the gaps are, but don\u2019t have the time to stay on top of them.<\/p>\n\n\n\n<p>That\u2019s where we tend to help:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DataGuard<\/strong>\u00a0for ongoing visibility and control<\/li>\n\n\n\n<li><strong>Experts on Demand<\/strong>\u00a0for steady guidance as things evolve<\/li>\n\n\n\n<li><strong>Assurance Support<\/strong>\u00a0when you need to sense-check where you stand<\/li>\n<\/ul>\n\n\n\n<p>Nothing complicated. Just a way to keep things aligned as your environment changes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-outcome\"><strong>The outcome<\/strong><\/h2>\n\n\n\n<p>When drift is under control, security stops feeling like a moving target. There\u2019s less firefighting, fewer surprises and more confidence that what\u2019s in place still reflects reality.<\/p>\n\n\n\n<p>And CE+ becomes what it should be. A confirmation of good practice, not a moment of truth.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-if-this-feels-familiar\"><strong>If this feels familiar<\/strong><\/h2>\n\n\n\n<p>You\u2019re not the only one seeing this.<\/p>\n\n\n\n<p>We can take a look together and give you a clearer view of where things stand, and what\u2019s worth doing next.<\/p>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2026-03-30\/2rcjvf\" width=\"100%\" height=\"700\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>Most organisations don\u2019t lack controls. On paper, the right policies are in place; access is defined, tools are configured and frameworks like Cyber Essentials Plus are mapped out. And yet, gaps still appear. Not because something was missed at the start, but because things changed along the way. What drift actually looks like Drift is [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[],"class_list":["post-8265","post","type-post","status-publish","format-standard","hentry","category-insights","category-our-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security gaps don\u2019t come from attacks, they come from drift - CWSI<\/title>\n<meta name=\"description\" content=\"Security gaps rarely start with a breach. They build over time. Uncover how drift happens and what it takes to stay in control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security gaps don\u2019t come from attacks, they come from drift\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-30T10:15:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T10:15:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-security-made-human-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Margot Van Laet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/\"},\"headline\":\"Security gaps don\u2019t come from attacks, they come from drift\",\"datePublished\":\"2026-03-30T10:15:56+00:00\",\"dateModified\":\"2026-03-30T10:15:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/\"},\"wordCount\":648,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/\",\"name\":\"Security gaps don\u2019t come from attacks, they come from drift - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"datePublished\":\"2026-03-30T10:15:56+00:00\",\"dateModified\":\"2026-03-30T10:15:58+00:00\",\"description\":\"Security gaps rarely start with a breach. They build over time. Uncover how drift happens and what it takes to stay in control.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/security-gaps-dont-come-from-attacks-they-come-from-drift\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security gaps don\u2019t come from attacks, they come from drift\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/ac6fd123bc832d6b235e2a9e3569c887\",\"name\":\"Margot Van Laet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a4bdec0e4c6ba6772bfc594d68d8c91f0e43aff8cf9eddd2399495ad845d2b2f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a4bdec0e4c6ba6772bfc594d68d8c91f0e43aff8cf9eddd2399495ad845d2b2f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a4bdec0e4c6ba6772bfc594d68d8c91f0e43aff8cf9eddd2399495ad845d2b2f?s=96&d=mm&r=g\",\"caption\":\"Margot Van Laet\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security gaps don\u2019t come from attacks, they come from drift - CWSI","description":"Security gaps rarely start with a breach. They build over time. Uncover how drift happens and what it takes to stay in control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/","og_locale":"nl_NL","og_type":"article","og_title":"Security gaps don\u2019t come from attacks, they come from drift","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/","og_site_name":"CWSI","article_published_time":"2026-03-30T10:15:56+00:00","article_modified_time":"2026-03-30T10:15:58+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-security-made-human-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Margot Van Laet","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/"},"headline":"Security gaps don\u2019t come from attacks, they come from drift","datePublished":"2026-03-30T10:15:56+00:00","dateModified":"2026-03-30T10:15:58+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/"},"wordCount":648,"commentCount":0,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/","url":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/","name":"Security gaps don\u2019t come from attacks, they come from drift - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"datePublished":"2026-03-30T10:15:56+00:00","dateModified":"2026-03-30T10:15:58+00:00","description":"Security gaps rarely start with a breach. They build over time. Uncover how drift happens and what it takes to stay in control.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/security-gaps-dont-come-from-attacks-they-come-from-drift\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Security gaps don\u2019t come from attacks, they come from drift"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/ac6fd123bc832d6b235e2a9e3569c887","name":"Margot Van Laet","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/a4bdec0e4c6ba6772bfc594d68d8c91f0e43aff8cf9eddd2399495ad845d2b2f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a4bdec0e4c6ba6772bfc594d68d8c91f0e43aff8cf9eddd2399495ad845d2b2f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a4bdec0e4c6ba6772bfc594d68d8c91f0e43aff8cf9eddd2399495ad845d2b2f?s=96&d=mm&r=g","caption":"Margot Van Laet"}}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/8265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=8265"}],"version-history":[{"count":3,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/8265\/revisions"}],"predecessor-version":[{"id":8268,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/8265\/revisions\/8268"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=8265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=8265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=8265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}