{"id":785,"date":"2014-08-16T23:08:54","date_gmt":"2014-08-16T23:08:54","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=785"},"modified":"2016-09-11T00:57:42","modified_gmt":"2016-09-11T00:57:42","slug":"what-we-do","status":"publish","type":"page","link":"https:\/\/evosec.eu\/nl\/what-we-do\/","title":{"rendered":"Wat We Doen"},"content":{"rendered":"<h2><a href=\"\/security\"><i class=\"fa fa-shield fa-fw\"><\/i>IT-BEVEILIGING<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Snelle SMB Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>WebSite veiligheid Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Netwerk Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Server Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Embedded apparaat beveiligingscontrole<\/li>\n<\/ul>\n<h2><a href=\"\/operations\"><i class=\"fa fa-heartbeat fa-fw\"><\/i>IT-ACTIVITEITEN<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Netwerken<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Linux Servers<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Back-ups \/ Ransomware-proof back-ups<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Bewaking van websites, IPs\/IP Ranges, apparaten enz<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>3e partij\/verouderde protocollen update\/integraties<\/li>\n<\/ul>\n<h2><a href=\"\/automation\"><i class=\"fa fa-cogs fa-fw\"><\/i>IT AUTOMATISERING<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Gegevens kruipen\/ontleden<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Geautomatiseerde E-mails<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Aangepaste ontwikkelde toepassingen, scripts of oplossingen kunnen worden uitgevoerd op in het algemeen-ingesloten borden &#8211; Raspberry PI, Arduino enz<\/li>\n<\/ul>\n<h2><a href=\"\/web-support\"><i class=\"fa fa-user fa-fw\"><\/i>WEBONDERSTEUNING<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Update, Monitor &#038; Patch: WordPress-gebaseerde Sites &#038; Plugins<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Update, Monitor &#038; Patch: Joomla-gebaseerde Sites, Plugins &#038; onderdelen<\/li>\n<\/ul>\n<h2><a href=\"\/iot-devices-security-assessment\"><i class=\"fa fa-wifi fa-fw\"><\/i>IoT apparaten beveiliging<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Configuratie controleren\/oplossen<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Onbeveiligde protocollen\/platte-tekst-wachtwoorden<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Ge\u00efnvesteerd in reverse engineering protocollen<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Vaste wachtwoorden, backdoors, standaardinstellingen<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>IT-BEVEILIGING Snelle SMB Check WebSite veiligheid Audit Netwerk Security Audit Server Security Audit Embedded apparaat beveiligingscontrole IT-ACTIVITEITEN Netwerken Linux Servers Back-ups \/ Ransomware-proof back-ups Bewaking van websites, IPs\/IP Ranges, apparaten enz 3e partij\/verouderde protocollen update\/integraties IT AUTOMATISERING Gegevens kruipen\/ontleden Geautomatiseerde E-mails Aangepaste ontwikkelde toepassingen, scripts of oplossingen kunnen worden uitgevoerd &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-785","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"nl","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages\/785\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages\/785\/revisions\/2132"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/media?parent=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}