{"id":37537,"date":"2021-11-12T08:44:00","date_gmt":"2021-11-12T07:44:00","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/"},"modified":"2024-07-10T13:37:54","modified_gmt":"2024-07-10T11:37:54","slug":"connectivity-versus-security-weighing-the-risks","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/connectivity-versus-security-weighing-the-risks\/","title":{"rendered":"Connectivity versus security: weighing the risks"},"content":{"rendered":"<header id=\"header\" class=\"header header--low header--branch\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tConnectivity versus security: weighing the risks\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t\r\n\r\n<h4>Connectivity offers machine builders many advantages, such as the ability to provide more efficient service or even to design data-driven business models. However, any form of connectivity comes with risks and not every end customer is eager for it. That&#039;s why you have to make the right trade-offs between risks and benefits.<br \/><br \/><\/h4>\r\n<h2>Increased demand for connectivity<\/h2>\r\n<p>In times of downtime, the end customer expectations support as quickly as possible to prevent production stagnation. On the other side, the machine builder is struggling with scarcity of PLC skilled staff, limited expertise and increased demand from customers, while willing to organize service more efficiently. In addition, there is a rising demand for machine data to optimize production processes, offer proactive maintenance or to draw lessons for the next series of cheaper, more stable and more efficient machines. This has led to an increase in connectivity to meet both demands.\u00a0<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/ae1hbomr\/ixon_connected_machines_vs_security_risks.png?width=1398&amp;mode=max\" alt=\"More and more machines are connected these days\" width=\"840\" height=\"502\" data-src=\"\/media\/ae1hbomr\/ixon_connected_machines_vs_security_risks.png?width=1398&amp;mode=max\" \/>\r\n<em>More and more machines are connected these days<\/em>\r\n\r\n\r\n<h2>Why connect machines to the internet<\/h2>\r\n<p>There are many reasons why you may want to connect your machines to the internet. The two main reasons are:<\/p>\r\n<h3>Remote service<\/h3>\r\n<p>Connected machines enable you to access your machines remotely which opens a whole new world. You can monitor and control your machines from anywhere at any time, which enables you to provide faster and more efficient service. This saves you a lot of time and money since your engineers don&#039;t have to travel as much as before anymore. At the same time, customer satisfaction will increase significantly.<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/c4npib2x\/industrial-iot-maturity-model.jpg?width=1398&amp;mode=max\" alt=\"Start with connecting your machines to move towards Industry 4.0 and take the next step to data analysis\" width=\"840\" height=\"717\" data-src=\"\/media\/c4npib2x\/industrial-iot-maturity-model.jpg?width=1398&amp;mode=max\" \/>\r\n<em>Start with your connecting machines to move towards Industry 4.0 and take the next step to data analysis<\/em>\r\n\r\n\r\n<h3>Data analysis<\/h3>\r\n<p>Collecting and analyzing your machine data enables you to understand what happens inside your machine. It is crucial information when you want to keep innovating and optimizing your machines. Gain insights about the condition, performance and productivity of your machine, analyze them and create\u00a0<a title=\"4 ways for machine builders to increase revenue with digital services\" href=\"https:\/\/www.ixon.cloud\/knowledge-hub\/revenue-opportunities?utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">new business models<\/a>\u00a0out of it to offer value to your customers and generate recurring revenue.<\/p>\r\n<p>Sounds good, right? But be aware of the risks involved. You have to connect your machine to the outside world, which increases the risks of cyber attacks. The first step in reducing security risks is\u00a0<a title=\"Why cyber security should be top of mind for machine builders\" href=\"https:\/\/www.ixon.cloud\/knowledge-hub\/security-awareness?utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">to be aware of what can happen<\/a>. The second step is to know\u00a0<a title=\"How to keep your machines secure over the next 15 years?\" href=\"https:\/\/www.ixon.cloud\/knowledge-hub\/keep-your-machines-secure?utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">how you can keep your machine secure<\/a>\u00a0during its life cycle. Besides that, you have to determine whether risks are acceptable or not.<br \/><br \/><\/p>\r\n<h2>Weighing the risks against the benefits<\/h2>\r\n<p>As a machine builder, you have to identify the security risks of connectivity so you can look at them objectively and carry out a risk analysis. There are two different risks involved here: technical security risks and business risks.<\/p>\r\n<h3>Technical risks<\/h3>\r\n<p>What can technically go wrong when I connect my machine to the internet? If the firewall isn&#039;t set up strong enough for example, cyber criminals can easily access the factory network. That&#039;s something you want to avoid. Therefore it&#039;s important to determine how likely a risk is to happen and what the impact will be. To classify there&#039;s a special formula which calculates the risk score based on those aspects:\u00a0<br \/><br \/><\/p>\r\n<p><strong>Likelihood x impact = risk score<\/strong><br \/><em><br \/><\/em><\/p>\r\n<p>Determine how likely a risk is to occur, identify what the impact is, and give a score to both variables. Then you multiply these scores and get a value from this: the risk score. You will calculate this risk score for different scenarios that can arise when using connectivity and sort from highest to lowest score.\u00a0<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/poobrtur\/ixon_security_risk_tradeoff.jpg?width=1398&amp;mode=max\" alt=\"Make a risk trade-off and weigh the risks against the benefits\" width=\"840\" height=\"439\" data-src=\"\/media\/poobrtur\/ixon_security_risk_tradeoff.jpg?width=1398&amp;mode=max\" \/>\r\n<em>Make a risk trade-off and weigh the risks against the benefits<\/em>\r\n\r\n\r\n<p>You are going to focus on those with the highest score and choose a strategy to deal with it:<\/p>\r\n<ul>\r\n<li><strong>Avoid<\/strong>: we&#039;re not connecting our machine to the internet, because the risk is too high;<\/li>\r\n<li><strong>Reduce<\/strong>: we&#039;re connecting our machine to the internet, but we have to adjust<\/li>\r\n<li><strong>Insure<\/strong>: we&#039;re connecting our machine to the internet, but we arrange insurance to compensate us if things go wrong.<br \/><br \/><\/li>\r\n<\/ul>\r\n<h3>Business risks<\/h3>\r\n<p>There&#039;s also the risk of lost opportunity: what will I miss when I choose not to connect my machines to the internet? To decide if connectivity is worth the risk, try to think of the benefits it could bring you and determine whether they outweigh the risks.<\/p>\r\n<p>Does it enable you to save costs and increase machine efficiency? Could you generate recurring revenue or will it cost you too much? Will you create added value for your customers and will customer satisfaction increase? Does it enable your company to grow?\u00a0<\/p>\r\n<p>After determining both the technical and the business risks, you can weigh the risks against the benefits and make a well-considered decision.<br \/><br \/><\/p>\r\n<h2>Reducing the risks and convincing your customer<\/h2>\r\n<p>Sometimes you take a risk because you really want to take advantage of the benefits. Think or email. It&#039;s not properly secured by default. It brings huge risks, since you probably receive 50+ emails a day which can include phishing and spoofing. Or you can accidentally send confidential information to the wrong person. But, still we are all using email, because we want the benefits despite the risks.\u00a0<\/p>\r\n<p>This doesn&#039;t mean you have to take the full risk. By securing your email you can at least minimize these risks by using internet security software, a secure password and training your employees to recognize phishing emails.<\/p>\r\n<p>Unfortunately, we can&#039;t give you general advice on how to minimize the security risks of connectivity, because every situation is different. The only advice we can give is to look at which risks are acceptable and how you want to reduce them.\u00a0<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/yfobqpbx\/ixon_conversation_about_security.png?width=1398&amp;mode=max\" alt=\"Communicate with your customers about how you're reducing security risks\" width=\"841\" height=\"519\" data-src=\"\/media\/yfobqpbx\/ixon_conversation_about_security.png?width=1398&amp;mode=max\" \/>\r\n<em>Communicate with your customers about how you&#039;re reducing security risks<\/em>\r\n\r\n\r\n<h3>Engage with your customer<\/h3>\r\n<p>Be aware that the security of connectivity becomes a recurring discussion point with your customers. Make sure you are well prepared and know everything about your machine, cloud environment, connectivity solution and-so-on. Show them you are putting effort into reducing the risks by means of the risk trade-off and tell them about the benefits, the acceptable risks and how you&#039;ll reduce these risks if needed.\u00a0<\/p>\r\n\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/ixon-b-v\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/concurrent-launches-kratos-a-compute-intensive-rugged-plug-in-card\/\" data-id=\"64476\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Competitor Launches Kratos: A Compute-Intensive Rugged Plug-In Card<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial Electronics<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Communication technology<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Design &amp; Embedded<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Digitization<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tParhelia BV\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\t4 March 2025\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/recap-on-matchmaking-event-about-electrification-of-transport\/\" data-id=\"31706\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Recap on matchmaking event about &#039;Electrification of Transport&#039;<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial Electronics<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tFHI, Federation of Technology Industries\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tMarch 25, 2024\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":37538,"template":"","branches":[12],"events":[354,8],"secretariat":[],"categories":[],"themes_tax":[],"content_types":[514],"class_list":["post-37537","news","type-news","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Connectivity versus security: weighing the risks - FHI, federatie van technologiebranches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/nieuws\/connectivity-versus-security-weighing-the-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Connectivity versus security: weighing the risks - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/nieuws\/connectivity-versus-security-weighing-the-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T11:37:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1397\" \/>\n\t<meta property=\"og:image:height\" content=\"862\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/\",\"url\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/\",\"name\":\"Connectivity versus security: weighing the risks - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png\",\"datePublished\":\"2021-11-12T07:44:00+00:00\",\"dateModified\":\"2024-07-10T11:37:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#primaryimage\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png\",\"width\":1397,\"height\":862},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Connectivity versus security: weighing the risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Connectivity versus security: weighing the risks - FHI, federatie van technologiebranches","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/nieuws\/connectivity-versus-security-weighing-the-risks\/","og_locale":"en_GB","og_type":"article","og_title":"Connectivity versus security: weighing the risks - FHI, federatie van technologiebranches","og_url":"https:\/\/fhi.nl\/en\/nieuws\/connectivity-versus-security-weighing-the-risks\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2024-07-10T11:37:54+00:00","og_image":[{"width":1397,"height":862,"url":"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/","url":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/","name":"Connectivity versus security: weighing the risks - FHI, federatie van technologiebranches","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#primaryimage"},"image":{"@id":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png","datePublished":"2021-11-12T07:44:00+00:00","dateModified":"2024-07-10T11:37:54+00:00","breadcrumb":{"@id":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#primaryimage","url":"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/09c7cb2e8488271a11f5c3542307b507-21307ea364dc2798da2289a9192a6957db4e588c-ixon_conversation_about_security.png","width":1397,"height":862},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/nieuws\/connectivity-versus-security-weighing-the-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"Connectivity versus security: weighing the risks"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/37537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/37537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media\/37538"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=37537"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=37537"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=37537"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=37537"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=37537"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=37537"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=37537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}