{"id":62475,"date":"2024-11-21T09:53:00","date_gmt":"2024-11-21T08:53:00","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/"},"modified":"2025-01-29T10:35:20","modified_gmt":"2025-01-29T09:35:20","slug":"mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/","title":{"rendered":"MCS on data security: from good intentions to good security"},"content":{"rendered":"<header id=\"header\" class=\"header header--high header--branch\">\n\n\t\t\t\t\t\t\t\t\t\t<div class=\"header__background header__background--high\">\n\t\t\t\t\t<img decoding=\"async\" class=\"header__background-image\" src=\"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg\" alt=\"\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tMCS on data security: from good intentions to good security\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t<p>Last week our partner organized\u00a0<a href=\"https:\/\/mouswaterbeheer.nl\/\" target=\"_blank\" rel=\"noopener\">Mous Water Management<\/a>\u00a0from Balk a Technical Content Day with the theme cybersecurity. Specially organized for their customers, in particular policy officers and (sewer) pumping station managers.<\/p>\r\n<p>MCS was asked to contribute our expertise on how to effectively secure the entire IoT communication chain.<\/p>\r\n<p>So Frank Olsthoorn (Product Specialist Managed IoT) and Jan van Rossum (Operational Director) once again set off together in the old-fashioned way towards beautiful Friesland.<\/p>\r\n<h2>Interesting program at an iconic location<\/h2>\r\n<p>Mous had arranged the location for this day more than well: the iconic UNESCO World Heritage\u00a0<a href=\"https:\/\/www.woudagemaal.nl\/\" target=\"_blank\" rel=\"noopener\">Woudagemaal in Lemmer<\/a>This is the largest still functioning steam pumping station in the world and dates from 1920. This monumental steam giant is still used in times of high water levels by\u00a0<a href=\"https:\/\/www.wetterskipfryslan.nl\/\" target=\"_blank\" rel=\"noopener\">Water Board Friesland<\/a>\u00a0to ensure dry feet in Friesland.<\/p>\r\n<p>So the program was about security. From your installations and equipment (assets) in the field to the data that users see on their monitoring tools and dashboards. In short, the entire IoT chain known to us: from sensor to dashboard.<\/p>\r\n<h2>Spoiler alert: security is far from optimal<\/h2>\r\n<p>Many listeners had the idea that security was well-arranged. Or at least was requested in the right way in tenders or smaller requests for new construction, renovation and\/or monitoring and maintenance of, for example, pumping stations.<\/p>\r\n<p>After two presentations it became immediately clear that there is still a lot unclear, unknown and therefore probably unloved in the field of (data)security. Plenty of room for improvement here!<\/p>\r\n<h3>Impact and practical implementation of NIS2<\/h3>\r\n<p>The kick-off was for\u00a0<a href=\"https:\/\/www.hetwaterschapshuis.nl\/\" target=\"_blank\" rel=\"noopener\">The Water Board House<\/a>, a connecting management organisation for the 21 water boards in the Netherlands. They share their knowledge in the field of digital innovations and information and data provisions.<\/p>\r\n<p>Their presentation focused on the impact and practical implementation of\u00a0<a href=\"https:\/\/www.digitaleoverheid.nl\/overzicht-van-alle-onderwerpen\/nis2-richtlijn\/\" target=\"_blank\" rel=\"noopener\">NIS2 cybersecurity guideline<\/a>\u00a0from the government. In particular, it was examined how the requirements in this directive affect all parties within the water boards that manage data. Also ultimately for suppliers such as MCS. For municipalities as end users within the water world, this requirement is made mandatory.<\/p>\r\n<h2>Big shock with clear message<\/h2>\r\n<p>Now that the regulatory framework had been outlined, it was MCS&#039;s turn. After a brief company introduction by Frank, Jan addressed the various security aspects and questions that you should ask yourself as a customer, user or system integrator. And there were quite a few!<\/p>\r\n<p>Think of the various handy settings and configuration options in the used (mobile) router that brings the pumping station data to the central monitoring software. Or the secure shielded or unsecure public accessibility to your equipment in the field.<\/p>\r\n<h3>Many routers still easily available to the public<\/h3>\r\n<p>You don&#039;t want to think about an invisible, malicious hacker abroad getting control over our water defenses. Jan showed with a demo that many well-known mobile routers are still easily publicly available to everyone on the internet. He did this via the public website\u00a0<a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noopener\">Shodan<\/a>Many in the audience were quite shocked at the amount of public information that was readily available here.<\/p>\r\n<p>The right security policy and processes, alarm settings, shielded (VPN\/APN) connections and device management tools to keep your equipment up-to-date. These are all essential aspects of the entire IoT chain for optimal security of your applications.<\/p>\r\n<p>After the tour of the impressive steam pumping station and the lunch break, the program was continued. There were presentations on data processing and data visualization possibilities, chain and contract management and tendering in the context of security. Jan and I were already on our way back, safely ahead of the crowd.<\/p>\r\n<h2>Learn more about secure mobile communications<\/h2>\r\n<p>Mous, like us, looks back on a very successful and educational day for all attendees. Do you have any questions about security or are you experiencing challenges in this area?<\/p>\r\n<p>We are happy to help you in the field of safe and reliable stable mobile IoT communication. Take\u00a0<a href=\"mailto:f.olsthoorn@mcs-nl.com\" target=\"_blank\" rel=\"noopener\">Contact<\/a>\u00a0with me to discuss the possibilities.<\/p>\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/mcs\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/geneesmiddelen-op-maat-met-farmacogenetica\/\" data-id=\"31682\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Customized medicines with pharmacogenetics<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Laboratory Technology<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Life Science<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tFHI, Federation of Technology Industries\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tMarch 27, 2024\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/enorme-mogelijkheden-waarvan-we-ons-in-veel-gevallen-nog-helemaal-niet-bewust-zijn\/\" data-id=\"33111\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>&quot;Enormous possibilities, of which in many cases we are not yet aware&quot;<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Members content<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tHELU Netherlands\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tJune 27, 2023\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":62476,"template":"","branches":[12],"events":[380],"secretariat":[],"categories":[],"themes_tax":[],"content_types":[514],"class_list":["post-62475","news","type-news","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MCS over databeveiliging: van goede intenties naar goede beveiliging<\/title>\n<meta name=\"description\" content=\"MCS liet zien hoe je effectief de hele IoT-communicatieketen kan beveiligen. Ga mee op reis en ontdek hoe het is gesteld met databeveiliging.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MCS over databeveiliging: van goede intenties naar goede beveiliging\" \/>\n<meta property=\"og:description\" content=\"MCS liet zien hoe je effectief de hele IoT-communicatieketen kan beveiligen. Ga mee op reis en ontdek hoe het is gesteld met databeveiliging.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T09:35:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/\",\"url\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/\",\"name\":\"MCS over databeveiliging: van goede intenties naar goede beveiliging\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg\",\"datePublished\":\"2024-11-21T08:53:00+00:00\",\"dateModified\":\"2025-01-29T09:35:20+00:00\",\"description\":\"MCS liet zien hoe je effectief de hele IoT-communicatieketen kan beveiligen. Ga mee op reis en ontdek hoe het is gesteld met databeveiliging.\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#primaryimage\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg\",\"width\":800,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MCS over databeveiliging: van goede intenties naar goede beveiliging\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MCS on data security: from good intentions to good security","description":"MCS demonstrated how to effectively secure the entire IoT communication chain. Join us on this journey and discover the state of data security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/","og_locale":"en_GB","og_type":"article","og_title":"MCS over databeveiliging: van goede intenties naar goede beveiliging","og_description":"MCS liet zien hoe je effectief de hele IoT-communicatieketen kan beveiligen. Ga mee op reis en ontdek hoe het is gesteld met databeveiliging.","og_url":"https:\/\/fhi.nl\/en\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2025-01-29T09:35:20+00:00","og_image":[{"width":800,"height":480,"url":"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/","url":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/","name":"MCS on data security: from good intentions to good security","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#primaryimage"},"image":{"@id":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#primaryimage"},"thumbnailUrl":"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg","datePublished":"2024-11-21T08:53:00+00:00","dateModified":"2025-01-29T09:35:20+00:00","description":"MCS demonstrated how to effectively secure the entire IoT communication chain. Join us on this journey and discover the state of data security.","breadcrumb":{"@id":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#primaryimage","url":"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2025\/01\/Bezoek-Frank-Mous-klantdag.jpg","width":800,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/nieuws\/mcs-over-databeveiliging-van-goede-intenties-naar-goede-beveiliging\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"MCS over databeveiliging: van goede intenties naar goede beveiliging"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/62475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/62475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media\/62476"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=62475"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=62475"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=62475"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=62475"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=62475"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=62475"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=62475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}