{"id":1353,"date":"2025-02-15T09:11:59","date_gmt":"2025-02-15T09:11:59","guid":{"rendered":"https:\/\/www.becybersafe.be\/?post_type=documents&#038;p=1353"},"modified":"2025-04-25T14:21:16","modified_gmt":"2025-04-25T14:21:16","slug":"cybersecurity-incident-response-guide","status":"publish","type":"documents","link":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/","title":{"rendered":"Incident response guide"},"content":{"rendered":"\n<p>Volg deze 7 stappen bij een cybersecurity incident<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Volg deze 7 stappen bij een cybersecurity incident<\/p>\n","protected":false},"author":6,"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"document_tag":[],"class_list":["post-1353","documents","type-documents","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Incident response guide - BeCyberSafe<\/title>\n<meta name=\"description\" content=\"Gehackt? Dit moet je doen! Deze cybersecurity incident response guide helpt je: volg deze 7 stappen bij een cybersecurity incident.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident response guide - BeCyberSafe\" \/>\n<meta property=\"og:description\" content=\"Gehackt? Dit moet je doen! Deze cybersecurity incident response guide helpt je: volg deze 7 stappen bij een cybersecurity incident.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"BeCyberSafe\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T14:21:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/\",\n\t            \"name\": \"Incident response guide - BeCyberSafe\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#website\"\n\t            },\n\t            \"datePublished\": \"2025-02-15T09:11:59+00:00\",\n\t            \"dateModified\": \"2025-04-25T14:21:16+00:00\",\n\t            \"description\": \"Gehackt? Dit moet je doen! Deze cybersecurity incident response guide helpt je: volg deze 7 stappen bij een cybersecurity incident.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"nl-NL\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.becybersafe.be\/nl\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Incident response guide\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#website\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/nl\/\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"description\": \"\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.becybersafe.be\/nl\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"nl-NL\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#organization\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/nl\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"nl-NL\",\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/\",\n\t                \"url\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"contentUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"width\": 1104,\n\t                \"height\": 463,\n\t                \"caption\": \"BeCyberSafe\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/\"\n\t            }\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident response guide - BeCyberSafe","description":"Gehackt? Dit moet je doen! Deze cybersecurity incident response guide helpt je: volg deze 7 stappen bij een cybersecurity incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/","og_locale":"nl_NL","og_type":"article","og_title":"Incident response guide - BeCyberSafe","og_description":"Gehackt? Dit moet je doen! Deze cybersecurity incident response guide helpt je: volg deze 7 stappen bij een cybersecurity incident.","og_url":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/","og_site_name":"BeCyberSafe","article_modified_time":"2025-04-25T14:21:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/","url":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/","name":"Incident response guide - BeCyberSafe","isPartOf":{"@id":"https:\/\/www.becybersafe.be\/nl\/#website"},"datePublished":"2025-02-15T09:11:59+00:00","dateModified":"2025-04-25T14:21:16+00:00","description":"Gehackt? Dit moet je doen! Deze cybersecurity incident response guide helpt je: volg deze 7 stappen bij een cybersecurity incident.","breadcrumb":{"@id":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.becybersafe.be\/nl\/documents\/cybersecurity-incident-response-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.becybersafe.be\/nl\/"},{"@type":"ListItem","position":2,"name":"Incident response guide"}]},{"@type":"WebSite","@id":"https:\/\/www.becybersafe.be\/nl\/#website","url":"https:\/\/www.becybersafe.be\/nl\/","name":"BeCyberSafe","description":"","publisher":{"@id":"https:\/\/www.becybersafe.be\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.becybersafe.be\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.becybersafe.be\/nl\/#organization","name":"BeCyberSafe","url":"https:\/\/www.becybersafe.be\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","contentUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","width":1104,"height":463,"caption":"BeCyberSafe"},"image":{"@id":"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/documents\/1353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/documents"}],"about":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/types\/documents"}],"author":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":2,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/documents\/1353\/revisions"}],"predecessor-version":[{"id":1593,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/documents\/1353\/revisions\/1593"}],"wp:attachment":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/media?parent=1353"}],"wp:term":[{"taxonomy":"document_tag","embeddable":true,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/document_tag?post=1353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}