{"id":15372,"date":"2019-12-06T12:27:00","date_gmt":"2019-12-06T12:27:00","guid":{"rendered":"https:\/\/www.dionach.com\/?post_type=project&#038;p=15372"},"modified":"2024-10-11T15:05:55","modified_gmt":"2024-10-11T14:05:55","slug":"security-testing-how-to-choose-the-right-provider","status":"publish","type":"project","link":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/","title":{"rendered":"Security Testing &#8211; How to Choose the Right Provider"},"content":{"rendered":"\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the information security assurance your business needs. Building up and retaining the team can be costly and time-consuming, and in reality it\u2019s often a better option to bring in an independent third-party to help you plan, manage and deliver a successful testing program.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>So how do you go about choosing the right provider, aside from trusting your gut instinct and talking to others in the industry to assess their reputation?<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Here are nine key factors that can help to guide your selection process.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the information security assurance your business needs.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">1. Credentials<\/h2>\n\n\n\n<p>Depending on your requirements, you should look for a team that has certifications including CREST (CPSA, CRT and CCT), PCI, and ISO 27001. The team available to you should be diverse, offering a range of cross-sector backgrounds, and they should be able to demonstrate their usage of the latest industry-leading tools and techniques. It\u2019s worth checking that they can provide a holistic service, with the right expertise across a range of assurance, compliance and response services to guide your information security journey.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Any weak links in your security posture exposes you to immediate risk.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">2. Experience<\/h2>\n\n\n\n<p>You can ask your potential provider about the experience of the specific team members who you will be working with. Do they have positive feedback, testimonials and references from clients that include the type of testing you require? Although a large amount of information surrounding information security projects is likely to be sensitive and therefore confidential, providers should be able to demonstrate their capabilities in an anonymised form and provide client recommendations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Independence<\/h2>\n\n\n\n<p>You will obtain the best value from your information security provider if they are brand agnostic; in other words, they are not reliant on vendor partnerships and can therefore provide objective advice. This is crucial if they are to review and make valuable recommendations based on your needs, rather than recommending a restricted range of services that they resell.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Capacity<\/h2>\n\n\n\n<p>What is the size of the team and will this meet your needs? You may need them to be flexible especially if they are to manage your peaks and troughs of activity, and provide quick turnaround times. What\u2019s more, if you are looking for a company as a potential long-term information security partner, choose an organisation that can grow with the needs of your business. Does the organisation operate just in the UK or globally? Access to a wider pool of talented testers with global knowledge of the latest security trends could prove highly useful.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Approach<\/h2>\n\n\n\n<p>Does the provider use a proven testing methodology? Ask for a written overview of their process. In the case of penetration testing, does the team rely largely on manual techniques as well as automation? Are they using a combination of commercial, non-commercial and in-house developed tools to ensure that testing is comprehensive? An automated vulnerability scan or assessment is not a true penetration test. Ensure your vendor can explain the difference between the two and demonstrate which is the most applicable based upon your specific needs. Finally \u2013 do you sense the provider is pragmatic and will match their recommendations to your budget?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>An automated vulnerability scan or assessment is not a true penetration test.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">6. Reporting<\/h2>\n\n\n\n<p>Cyber security testing and consultancy is an intangible service. High quality reporting is critical. Ask to see sample reports that they\u2019ve conducted for similar projects. A test report should not be a simple list of problems, without prioritisation or remediation guidance. Reports need to be detailed and comprehensive yet clear, concise, actionable and \u2013 above all else \u2013 pragmatic. Check that they are specific to your solution or environment, and contain a detailed description of all identified issues, possible ramifications, and recommendations to rectify them. Any issues raised should be categorised, with priorities and urgent actions clearly defined.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. Remediation Work<\/h2>\n\n\n\n<p>Can the company provide ongoing recommendations and strategic guidance? For most organisations, a service provider who disappears off into the sunset after report delivery will not provide you with the greatest value. In our experience, most customers want to know that their testing partners can work with them through to the remediation phase of the project.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8. Attitude<\/h2>\n\n\n\n<p>Relating to the points above, the ideal outsource specialist is usually one that wants to become your information security partner \u2013 as opposed to delivering a one-off service \u2013 giving strategic guidance as well as tactical implementation. In practice, this means they should provide you with a team with sufficient depth of knowledge across a range of assurance compliance and response services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">9. Innovation<\/h2>\n\n\n\n<p>Maintaining the highest possible levels of information security requires keeping a constant eye on ever-evolving threats and the technological developments to combat them. You need to be confident that your chosen partner\u2019s skills and tools are continually reviewed and updated, and this relies on them demonstrating ongoing commitment to Research and Development \u2013 an area into which every team member should invest time.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>You need to be confident that your chosen partner\u2019s skills and tools are continually reviewed and updated.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the information security assurance your business needs. Building up and retaining the team can be costly and time-consuming, and in reality it\u2019s often a better option to bring in [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":17516,"template":"","class_list":["post-15372","project","type-project","status-publish","has-post-thumbnail","hentry","wpbf-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Testing - How to Choose the Right Provider - Dionach<\/title>\n<meta name=\"description\" content=\"For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Testing - How to Choose the Right Provider - Dionach\" \/>\n<meta property=\"og:description\" content=\"For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-11T14:05:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/08\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1058\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/\"},\"author\":{\"name\":\"Dionach by Nomios\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/cda8ad8b5715b4d431547564ed6a9ca9\"},\"headline\":\"Security Testing &#8211; How to Choose the Right Provider\",\"datePublished\":\"2019-12-06T12:27:00+00:00\",\"dateModified\":\"2024-10-11T14:05:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/\"},\"wordCount\":889,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1\",\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/\",\"name\":\"Security Testing - How to Choose the Right Provider - Dionach\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1\",\"datePublished\":\"2019-12-06T12:27:00+00:00\",\"dateModified\":\"2024-10-11T14:05:55+00:00\",\"description\":\"For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1\",\"width\":2048,\"height\":1058},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/security-testing-how-to-choose-the-right-provider\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Testing &#8211; How to Choose the Right Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/cda8ad8b5715b4d431547564ed6a9ca9\",\"name\":\"Dionach by Nomios\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"caption\":\"Dionach by Nomios\"},\"sameAs\":[\"http:\\\/\\\/Dionach\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Testing - How to Choose the Right Provider - Dionach","description":"For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/","og_locale":"nl_NL","og_type":"article","og_title":"Security Testing - How to Choose the Right Provider - Dionach","og_description":"For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the","og_url":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_modified_time":"2024-10-11T14:05:55+00:00","og_image":[{"width":2048,"height":1058,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/08\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@dionachcyber","twitter_misc":{"Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/"},"author":{"name":"Dionach by Nomios","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9"},"headline":"Security Testing &#8211; How to Choose the Right Provider","datePublished":"2019-12-06T12:27:00+00:00","dateModified":"2024-10-11T14:05:55+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/"},"wordCount":889,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/08\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1","inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/","url":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/","name":"Security Testing - How to Choose the Right Provider - Dionach","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/08\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1","datePublished":"2019-12-06T12:27:00+00:00","dateModified":"2024-10-11T14:05:55+00:00","description":"For most companies, it simply isn\u2019t possible \u2013 or desirable \u2013 to rely solely on an in-house security team to conduct all testing exercises to provide the","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/08\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/08\/AdobeStock_305152135.jpeg?fit=2048%2C1058&ssl=1","width":2048,"height":1058},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/project\/security-testing-how-to-choose-the-right-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/dionach.com\/nl\/project\/"},{"@type":"ListItem","position":3,"name":"Security Testing &#8211; How to Choose the Right Provider"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9","name":"Dionach by Nomios","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","caption":"Dionach by Nomios"},"sameAs":["http:\/\/Dionach"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/project\/15372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/project"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/project\/15372\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/17516"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=15372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}