{"id":37757,"date":"2021-10-21T15:24:00","date_gmt":"2021-10-21T13:24:00","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/"},"modified":"2024-07-10T13:39:14","modified_gmt":"2024-07-10T11:39:14","slug":"how-to-keep-your-machines-secure-over-the-next-15-years","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/how-to-keep-your-machines-secure-over-the-next-15-years\/","title":{"rendered":"How to keep your machines secure over the next 15 years?"},"content":{"rendered":"<header id=\"header\" class=\"header header--low header--branch\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tHow to keep your machines secure over the next 15 years?\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t\r\n<h2>How to keep your machines secure over the next 15 years?<\/h2>\r\n\r\n\r\n\r\n\r\n\r\n\r\n<p>Connectivity is becoming a commodity forming a risk for machine builders and factory owners. Nowadays, an average machine is connected to an internal network, to talk to SCADA and MES systems, or to the internet for remote access and data analysis.<\/p>\r\n<p>However, software running in the machines&#039; controllers and operating systems gets older and new vulnerabilities are discovered to make such systems insecure. In worst case scenarios this leads to\u00a0<a title=\"Why cyber security should be top of mind for machine builders\" href=\"https:\/\/www.ixon.cloud\/knowledge-hub\/security-awareness?utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">production stops<\/a>. So, how do you guarantee that your installed machines are protected now and in the future?<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/5pae5qod\/ixon_blog_increase_cyberattacks.jpg?width=1398&amp;mode=max\" alt=\"High increase in industrial cyber attacks (source: Otorio)\" width=\"890\" height=\"508\" data-src=\"\/media\/5pae5qod\/ixon_blog_increase_cyberattacks.jpg?width=1398&amp;mode=max\" \/>\r\n<em>High increase in industrial cyber attacks (source: Otorio)<\/em>\r\n\r\n\r\n<h2>&#039;Never touch a running system&#039;<\/h2>\r\n<p>&#039;Never touch a running system&#039; is probably the motto of many machine builders. When an OEM machine builder makes the software he doesn&#039;t want to change it, unless there is a problem. They can&#039;t just turn machines off for an update and risk the machine working differently after a security patch. The impact can be high. Think of losing the machine&#039;s quality\/safety certification, long lasting downtime or lower quality output of the end product.\u00a0<\/p>\r\n<p>But have you thought about the fact that outdated software running in your operating system can cause major security risks?\u00a0<\/p>\r\n<h3>Machine lifecycle versus IT system lifecycle<\/h3>\r\n<p>Do you still have machines running on Windows XP? Your machines have a life expectancy of probably more than 10 years, but most operating systems only live for 5 to 7 years. So the operating system, software, libraries and code making up the machine&#039;s firmware might be state-of-the-art now, but will be hopelessly outdated before your machine is decommissioned. Therefore the risk of vulnerabilities and cyber attacks increase overtime if you don&#039;t think upfront to prevent this.<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/02wc5ou5\/ixon_blog_machine_vs_itsystem.jpg?width=1398&amp;mode=max\" alt=\"IT systems have a shorter life expectancy than your machine\" width=\"840\" height=\"479\" data-src=\"\/media\/02wc5ou5\/ixon_blog_machine_vs_itsystem.jpg?width=1398&amp;mode=max\" \/>\r\n<em>IT systems have a shorter life expectancy than your machine<\/em>\r\n\r\n\r\n<p>According to IT, you should always use the latest security patch configurations to keep your machines secure. However, installing patches or updating the operating system almost always results in downtime or production stops as the PLC has to be updated, reset and tested.\u00a0<br \/><br \/><\/p>\r\n<h2>Risks machine builders are facing today<\/h2>\r\n<p>The machine builder needs (remote) connectivity to guarantee a higher uptime, but connectivity always brings some risks. That&#039;s why you need to have the right security in place to minimize these risks.<\/p>\r\n<p>Machines with outdated software run the risk that they contain known vulnerabilities that can be exploited by a hacker. Even without a connection to the internet you run security risks, such as:<\/p>\r\n<ul>\r\n<li>An external service technician connects his laptop to your machine for diagnostic purposes which exposes you to unnecessary risks and threats such as viruses or access to internal confidential data;<\/li>\r\n<li>Someone with bad intentions has physical access to the machine and changes the configuration or extracts personal data;<\/li>\r\n<li>Employees make unintended configuration changes via tools that don&#039;t require authentication;<\/li>\r\n<li>Incorrect firmware has been downloaded to your machine.<\/li>\r\n<\/ul>\r\n<p>The possible consequences of these risks may vary from downtime and virus installations that damage your systems to stealing and spreading sensitive data.<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/xcngl02c\/ixon_blog_cyberattack_trends.jpg?width=1398&amp;mode=max\" alt=\"Trends in kind of cyber attacks in 2020 (source: IT Supply Chain)\" width=\"840\" height=\"480\" data-src=\"\/media\/xcngl02c\/ixon_blog_cyberattack_trends.jpg?width=1398&amp;mode=max\" \/>\r\n<em>Trends in kind of cyber attacks in 2020 (source: IT Supply Chain)<\/em>\r\n\r\n\r\n<p>You have to be aware of the risks and pay attention with proper expertise and restrictions to prevent them from happening. Let&#039;s see how you can keep everything secure during the entire lifetime of your machine.<br \/><br \/><\/p>\r\n<h2>Secure machines in the long term with edge connectivity<\/h2>\r\n<p>By opening as few network ports as possible from outside to your machine or opposite, you minimize security risks. A big challenge, since this isn&#039;t feasible when you want to benefit from remote connectivity. Although, edge connectivity can help you to secure your machines.\u00a0<\/p>\r\n<p>To optimally secure your machine, you need to separate the machine network and OT (Operational Technology) with a firewall or edge gateway. An edge gateway is a multifunctional device which includes a router to separate networks, a modem to connect securely to the internet and a firewall to block unwanted connections.<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/5fhords2\/ixon_blog_-machine_security.jpg?width=1398&amp;mode=max\" alt=\"Optimally secure your machines with edge connectivity\" width=\"841\" height=\"480\" data-src=\"\/media\/5fhords2\/ixon_blog_-machine_security.jpg?width=1398&amp;mode=max\" \/>\r\n<em>Optimally secure your machines with edge connectivity<\/em>\r\n\r\n\r\n<h3>Best of both worlds to protect IT\/OT networks<\/h3>\r\n<p>An edge gateway has an IT part (which is connected to the larger OT network, eg SCADA\/MES\/ERP systems) and runs the latest firmware versions with the latest security patches. It can be updated without you having to think about it.<\/p>\r\n<p>The OT part of the edge gateway (the machine network) is not updated, but separated from the outside world and therefore safe. This means machine systems like PLCs and industrial PCs don&#039;t have to be extra secured and updated as well.\u00a0<\/p>\r\n<p>Using an edge gateway takes the best of IT (latest security patches) and OT (not modifying the machine). This minimizes the security risks, without influencing the machine or quality of the production process.\u00a0<br \/><br \/><\/p>\r\n<h2>Choosing an IT approved connectivity solution<\/h2>\r\n<p>When looking for a connectivity solution or IoT partner, the machine builder has to consider if he can securely connect his machines to the connectivity\/IoT solution to scale his business case. You need at least a solution which securely separates your machine from the rest of the OT network to make sure old unsecure and unpatched operating systems on the machines are not a threat during its lifecycle.\u00a0<\/p>\r\n<p>The separation can be done with the\u00a0<a title=\"IXrouter: Edge Gateway\" href=\"https:\/\/www.ixon.cloud\/iiot-platform\/connectivity-products\/ixrouter-edge-gateway?utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">IXrouter<\/a>. This is IXON&#039;s industrial edge device to establish a secure remote connection from the PLC, industrial PCs, robots and HMIs to the web-based IXON Cloud platform. With this edge-to-cloud setup you can benefit from everything an Industrial IoT solution brings. It has a built-in firewall that separates the machine network from the factory network.\u00a0<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/fqwaae0m\/ixon_security_connection_machine_to_cloud.png?width=1398&amp;mode=max\" alt=\"Secure connectivity from machine to cloud\" width=\"840\" height=\"292\" data-src=\"\/media\/fqwaae0m\/ixon_security_connection_machine_to_cloud.png?width=1398&amp;mode=max\" \/>\r\n<em>Secure connectivity from machine to cloud<\/em>\r\n\r\n\r\n<p>By installing an IXrouter in all your machinery, you&#039;ll ensure that your machines are protected during their lifetime, with less maintenance efforts and with minimized risks for your end customers.<\/p>\r\n<p>In our\u00a0<a title=\"Security white paper\" href=\"https:\/\/go.ixon.cloud\/whitepaper-security?_ga=2.221084638.755318012.1635144364-1999535967.1617191518&amp;utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">security whitepaper<\/a>\u00a0you can read about the security measures in place at IXON to support machine builders and their customers. Would you like to discover more about our IXrouter?\u00a0<\/p>\r\n\r\n\r\n\r\n\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/ixon-b-v\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/nieuwe-workshop-microbiologie\/\" data-id=\"44295\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>New microbiology workshop<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Laboratory Technology<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tFHI, Federation of Technology Industries\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tNovember 1, 2018\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/advanced-pulser-charging-and-pressure-control-system-for-tno-developed-by-carya-automatisering\/\" data-id=\"67598\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Advanced Pulser Charging and Pressure Control System for TNO developed by Carya Automatisering<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial Electronics<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Design Automation &amp; Embedded Systems Event<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Design &amp; Embedded<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Digitization<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tCN Rood\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\t13 May 2025\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":37758,"template":"","branches":[12],"events":[354,8],"secretariat":[],"categories":[],"themes_tax":[],"content_types":[514],"class_list":["post-37757","news","type-news","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to keep your machines secure over the next 15 years? - FHI, federatie van technologiebranches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to keep your machines secure over the next 15 years? - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T11:39:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1398\" \/>\n\t<meta property=\"og:image:height\" content=\"486\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/\",\"url\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/\",\"name\":\"How to keep your machines secure over the next 15 years? - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png\",\"datePublished\":\"2021-10-21T13:24:00+00:00\",\"dateModified\":\"2024-07-10T11:39:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#primaryimage\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png\",\"width\":1398,\"height\":486},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to keep your machines secure over the next 15 years?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to keep your machines secure over the next 15 years? - FHI, federatie van technologiebranches","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/","og_locale":"en_GB","og_type":"article","og_title":"How to keep your machines secure over the next 15 years? - FHI, federatie van technologiebranches","og_url":"https:\/\/fhi.nl\/en\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2024-07-10T11:39:14+00:00","og_image":[{"width":1398,"height":486,"url":"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/","url":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/","name":"How to keep your machines secure over the next 15 years? - FHI, federatie van technologiebranches","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#primaryimage"},"image":{"@id":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#primaryimage"},"thumbnailUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png","datePublished":"2021-10-21T13:24:00+00:00","dateModified":"2024-07-10T11:39:14+00:00","breadcrumb":{"@id":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#primaryimage","url":"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/408976944bc02c575cc731114fed2658-db653c264f09d48df83c3102797abd7861cbaee4-ixon_security_connection_machine_to_cloud.png","width":1398,"height":486},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/nieuws\/how-to-keep-your-machines-secure-over-the-next-15-years\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"How to keep your machines secure over the next 15 years?"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/37757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/37757\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media\/37758"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=37757"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=37757"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=37757"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=37757"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=37757"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=37757"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=37757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}