{"id":6407,"date":"2025-04-03T12:44:32","date_gmt":"2025-04-03T10:44:32","guid":{"rendered":"https:\/\/opensight.indivontwikkelt.nl\/campagne\/crowdstrike-the-small-business-cybersecurity-survival-guide\/"},"modified":"2025-04-03T12:44:32","modified_gmt":"2025-04-03T10:44:32","slug":"crowdstrike-the-small-business-cybersecurity-survival-guide","status":"publish","type":"campagne","link":"https:\/\/opensight.indivontwikkelt.nl\/en\/campagne\/crowdstrike-the-small-business-cybersecurity-survival-guide\/","title":{"rendered":"Crowdstrike | The Small Business Cybersecurity Survival Guide"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-center\">Small Business Cybersecurity Survival Guide<\/h2>\n\n\n\n<p>SMEs are today&#8217;s targets. It is easy to assume that cybercriminals only target large organizations. These large organizations hold mountains of valuable and sensitive data in their and their critical environments &#8211; operations that, if disrupted or stopped, could result in millions of dollars in lost revenue and reputational damage. But while breaches in large organizations grab the headlines, small businesses are also at risk. Find out more in the Small Business Cybersecurity Survival Guide.    <\/p>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n    <div class=\"indiv-block colored-elements-campagne position-relative my-5 pb-4\">\n        <div class=\"image position-absolute d-none d-md-block\">\n                            <img decoding=\"async\" src=\"https:\/\/opensight.indivontwikkelt.nl\/wp-content\/themes\/opensight\/assets\/img\/colored-hexagon-green.png\" alt=\"\"  \/>\n                    <\/div>\n        <div class=\"container\">\n            <div class=\"row justify-content-center\">\n                <div class=\"col-12 col-md-8 technology\">\n                    <h2 class=\"title text-center\">\n                        Downloaden                    <\/h2>\n                    \n<form action=\"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/ws-form\/v1\/submit\" class=\"wsf-form wsf-form-canvas\" id=\"ws-form-1\" data-id=\"12\" method=\"POST\" data-instance-id=\"1\"><\/form>\n\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":4762,"menu_order":0,"template":"","campagne_categorie":[72],"class_list":["post-6407","campagne","type-campagne","status-publish","has-post-thumbnail","hentry","campagne_categorie-technology-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/campagne\/6407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/campagne"}],"about":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/types\/campagne"}],"version-history":[{"count":1,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/campagne\/6407\/revisions"}],"predecessor-version":[{"id":6408,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/campagne\/6407\/revisions\/6408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media\/4762"}],"wp:attachment":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media?parent=6407"}],"wp:term":[{"taxonomy":"campagne_categorie","embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/campagne_categorie?post=6407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}