{"id":31321,"date":"2023-10-06T09:00:33","date_gmt":"2023-10-06T09:00:33","guid":{"rendered":"https:\/\/proactive-software.com\/?p=31321"},"modified":"2025-08-15T07:33:27","modified_gmt":"2025-08-15T07:33:27","slug":"cybersecurity-phishing","status":"publish","type":"post","link":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/","title":{"rendered":"De nieuwste phishing-technieken: vishing, smishing en meer"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"31321\" class=\"elementor elementor-31321\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20ba6cf5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20ba6cf5\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-78108dba content_blog\" data-id=\"78108dba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3446c4dd fImage uitgelichte-afbeelding elementor-widget elementor-widget-image\" data-id=\"3446c4dd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"700\" height=\"400\" src=\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png\" class=\"attachment-full size-full wp-image-31322\" alt=\"Afbeelding-man-aan-het-vissen\" srcset=\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png 700w, https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen-300x171.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bd00dfd elementor-widget elementor-widget-heading\" data-id=\"2bd00dfd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">De nieuwste phishing-technieken: vishing, smishing en meer<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56c98839 big_copy elementor-widget elementor-widget-text-editor\" data-id=\"56c98839\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Ben jij op de hoogte van de meest actuele technieken om jouw gegevens te stelen? In deze blog lees je over phishing, vishing en smishing. Zo kun je alert zijn op deze nieuwe vormen van cybercriminaliteit.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ef18827 elementor-widget elementor-widget-heading\" data-id=\"7ef18827\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is phishing?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a79ea9 elementor-widget elementor-widget-text-editor\" data-id=\"40a79ea9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.visma.com\/trust-centre\" target=\"_blank\" rel=\"noopener\">Volgens Visma<\/a> is phishing<\/span><span style=\"font-weight: 400;\">\u00a0een methode die cybercriminelen gebruiken om jouw data te stelen. Dit doen ze vaak met:\u00a0<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nep-berichten zoals emails<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ransomware: kwaadaardige en schadelijke software<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1833b0f elementor-widget elementor-widget-spacer\" data-id=\"1833b0f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d990cda elementor-widget elementor-widget-heading\" data-id=\"d990cda\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Waarom heet dit phising?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a06eb7 elementor-widget elementor-widget-text-editor\" data-id=\"2a06eb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Waarom het phishing heet, is niet helemaal duidelijk. Volgens <a style=\"background-color: #fafafa;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Wikipedia <\/span><\/a>en <a style=\"background-color: #fafafa;\" href=\"https:\/\/www.mentalfloss.com\/article\/654582\/why-are-online-scams-called-phishing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Mentalfloss <\/span><\/a>kan het een combinatie zijn tussen \u2018fishing\u2019 en \u2018phone phreak\u2019. De term phone phreak werd in 1970 gebruikt voor mensen die telefoonlijnen hackten om gratis te kunnen bellen. En cybercriminelen \u2018vissen\u2019 natuurlijk naar jouw persoonlijke gegevens.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fbc8bb9 elementor-widget elementor-widget-heading\" data-id=\"5fbc8bb9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is social engineering?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecefda5 elementor-widget elementor-widget-text-editor\" data-id=\"ecefda5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Phishing is een vorm van social engineering. Dat is het psychologisch manipuleren van mensen, zodat ze doen wat je wilt of je geven wat je wilt. Op gebied van IT focust social engineering zich specifiek op het mensen zo ver krijgen dat ze vertrouwelijke informatie weggeven. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f9b58 elementor-widget elementor-widget-heading\" data-id=\"c9f9b58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is bulk phishing?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4cbf31 elementor-widget elementor-widget-text-editor\" data-id=\"e4cbf31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">De klassieke email phishing methode wordt ook wel bulk phishing genoemd. Dit zijn mails die niet gepersonaliseerd worden en in bulk worden verstuurd. Zo gooien cybercriminelen een breed net uit in de hoop dat er tenminste iemand klikt. Voorbeelden van bulk phishingmails zijn:\u00a0<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mails waarin staat dat je iets gewonnen hebt<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mails waarin staat dat je geld krijgt, via een erfenis bijvoorbeeld<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mails van je bank waarin ze je om gegevens vragen<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mails van een postbezorgingsservice<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1142a9 elementor-widget elementor-widget-spacer\" data-id=\"f1142a9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35fd2bd elementor-widget elementor-widget-text-editor\" data-id=\"35fd2bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Wat deze emails vaak gemeen hebben, is dat ze urgent overkomen. Je moet snel handelen, omdat \u2018de iPhone die je gewonnen hebt anders aan iemand anders wordt gegeven\u2019. Of omdat \u2018je nu meteen je wachtwoord voor je bankaccount moet wijzigen, anders wordt je account gesloten\u2019. Of omdat \u2018je pakketje anders retour wordt gestuurd.\u2019 Cybercriminelen gebruiken allerlei manieren om jou zo snel mogelijk een onjuiste keuze te laten maken.\u00a0<\/p><p><span style=\"font-weight: 400;\">Daarnaast gebruiken ze ook deze phishing scams:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mails van software die je mogelijk gebruikt, zoals Gmail, Microsoft, LinkedIn, PayPal of Dropbox<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">QR-codes die naar phishing landingspagina\u2019s leiden<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a81502d elementor-widget elementor-widget-spacer\" data-id=\"a81502d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4927065 elementor-widget elementor-widget-heading\" data-id=\"4927065\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is spear phishing?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c66816 elementor-widget elementor-widget-text-editor\" data-id=\"7c66816\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Spear phishing doe je met een mail die w\u00e9l gepersonaliseerd is. Een mail die specifiek naar \u00e9\u00e9n iemand wordt gestuurd om die persoon te overtuigen. Cybercriminelen steken in dat geval veel tijd in informatie achterhalen over hun doelwit, zodat ze de phishingmail zo geloofwaardig mogelijk kunnen maken. Het gaat dan om informatie die echt alleen relevant voor het doelwit is, zoals waar ze werken en wie hun manager is. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22e852b elementor-widget elementor-widget-heading\" data-id=\"22e852b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is vishing?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae4d5ad elementor-widget elementor-widget-text-editor\" data-id=\"ae4d5ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Vishing is een vorm van phishing die geen gebruik maakt van email, maar vaak van een \u2018voice message\u2019 of telefoontje is. Hierbij lijkt het alsof een werknemer om je gegevens vraagt van bijvoorbeeld je Microsoft account, terwijl het eigenlijk een opgenomen bericht is.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8de5735 elementor-widget elementor-widget-heading\" data-id=\"8de5735\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is smishing?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6780b32 elementor-widget elementor-widget-text-editor\" data-id=\"6780b32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Smishing is een vorm van phishing die geen gebruik maakt van email, maar van een SMS. In deze berichten staan vaak urgente vragen om je gegevens, bijvoorbeeld zogenaamd van je baas, je bank of een postbezorgingsservice. Zodra je op de link klikt, vragen de cybercriminelen om je gegevens.<br><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b59e4c7 elementor-widget elementor-widget-heading\" data-id=\"b59e4c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing met emailthreads of Google Drive uitnodigingen<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fedf38 elementor-widget elementor-widget-text-editor\" data-id=\"8fedf38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Geavanceerde mails zijn de meest lastige vorm van phishing. Denk aan emails die een thread of chain kapen van mails die je daadwerkelijk met iemand hebt uitgewisseld. Dat maakt het lastig om te zien dat het om phishing gaat. Deze methode wordt ook wel <strong>\u2018Man-In-The-Middle\u2019<\/strong> genoemd.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Of mails die lijken op een <\/span><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-campaign-uses-google-drive-to-bypass-email-gateways\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"><strong>uitnodiging om een Google Drive<\/strong><\/span><\/a><span style=\"font-weight: 400;\"> map of bestand te bekijken. Deze zien er realistisch uit, maar de link klopt niet. Ook de afzender klopt uiteraard niet. Dat is iets makkelijk te controleren dan de link.\u00a0<\/span><\/p><p>Deze phishing mails worden helaas niet door het spamfilter tegengehouden, omdat ze via Google\u2019s eigen netwerk verzonden worden. Cybercriminelen zouden ook gebruik kunnen maken van een phishingmail die eruitziet als een <a href=\"https:\/\/help.wetransfer.com\/hc\/en-us\/articles\/208554176-Phishing-attempts-and-other-weird-WeTransfer-imitations\" target=\"_blank\" rel=\"noopener\">WeTransfer<\/a> uitnodiging om bestanden te downloaden of van communicatie die lijkt alsof het bij <a href=\"https:\/\/www.csoonline.com\/article\/1306712\/phishing-attack-uses-compromised-sendgrid-accounts-to-target-additional-users.html\" target=\"_blank\" rel=\"noopener\">SendGrid<\/a> vandaan komt.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb59579 elementor-widget elementor-widget-heading\" data-id=\"eb59579\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat is malvertising?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-281fde9 elementor-widget elementor-widget-text-editor\" data-id=\"281fde9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Volgens <\/span><a href=\"https:\/\/www.terranovasecurity.com\/blog\/phishing-email-signs\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Terranova Security<\/span><\/a><span style=\"font-weight: 400;\"> is malvertising een phishingtechniek die online advertenties of pop-ups gebruikt om je te laten klikken. Denk bijvoorbeeld aan de bovenste resultaten in een Google-search. De link achter de reclame leidt je dan naar een site waar je malware download, in plaats van de software die je eigenlijk wilde hebben. Een bekend voorbeeld is het downloaden van de Google Drive desktop versie. Controleer dus altijd de URL van een advertentie voordat je doorklikt, of klik op een van de zoekresultaten die geen advertentie is. Advertenties kun je herkennen aan dat er \u2018Ad\u2019 boven de titel staat, links van de URL.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac3bac elementor-widget elementor-widget-heading\" data-id=\"bac3bac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Waar kan ik meer cybersecurity informatie over de Spend Cloud vinden?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-028352f elementor-widget elementor-widget-text-editor\" data-id=\"028352f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Meer over hoe je phishing kunt voorkomen, kun je lezen in deze <\/span><a href=\"https:\/\/www.visma.com\/resources\/content\/how-to-avoid-social-engineering-attacks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Visma cybersecurity-blog<\/span><\/a><span style=\"font-weight: 400;\">. Het belangrijkste is om altijd je gezonde verstand te gebruiken. Vraag jezelf af hoe logisch het is dat je gevraagd wordt op een link te klikken of om je gegevens weg te geven.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Ben je nog niet overtuigd dat cybersecurity jouw prioriteit moet zijn? Lees dan meer in deze blog over <\/span><a href=\"https:\/\/proactive-software.com\/nl\/blog\/spend-cloud-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">\u2018de 3 redenen waarom cybersecurity ook voor jou belangrijk is\u2019<\/span><\/a><span style=\"font-weight: 400;\">. Cybersecurity is een gedeelde verantwoordelijkheid en iedereen kan slachtoffer worden. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81e5326 elementor-widget elementor-widget-heading\" data-id=\"81e5326\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hoe kan ik phishing voorkomen?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab82cb7 elementor-widget elementor-widget-text-editor\" data-id=\"ab82cb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Door bewust om te gaan met jouw cybersecurity, is de kans groter dat je phishing ontdekt voor het te laat is. Wil je meer informatie over dit onderwerp? Bekijk dan onze&nbsp;<\/span><a href=\"https:\/\/proactive-software.com\/nl\/cybersecurity-spend-cloud\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">cybersecurity-pagina<\/span><\/a>&nbsp;en de <a href=\"https:\/\/www.visma.com\/trust-centre\" target=\"_blank\" rel=\"noopener\">Visma Trust Center<\/a><span style=\"font-weight: 400;\">. Op onze cybersecurity-pagina kun je ook de beveiligingsfactsheet downloaden met n\u00f3g meer diepgaande informatie. Succes!<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5c094d92\" data-id=\"5c094d92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-431291a sticky elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"431291a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3bc94f0\" data-id=\"3bc94f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73fdee0 elementor-widget elementor-widget-image\" data-id=\"73fdee0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"573\" height=\"484\" src=\"https:\/\/proactive-software.com\/wp-content\/uploads\/2025\/05\/cyber-whitepaper.png\" class=\"attachment-large size-large wp-image-38868\" alt=\"\" srcset=\"https:\/\/proactive-software.com\/wp-content\/uploads\/2025\/05\/cyber-whitepaper.png 573w, https:\/\/proactive-software.com\/wp-content\/uploads\/2025\/05\/cyber-whitepaper-300x253.png 300w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-467ce01 big_copy elementor-widget elementor-widget-text-editor\" data-id=\"467ce01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Benieuwd naar meer Cybersecurity tips?<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da7e25 elementor-widget elementor-widget-text-editor\" data-id=\"1da7e25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Lees meer over onze cybersecurity tips in de whitepaper!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94b0bc9 elementor-widget elementor-widget-sb_button\" data-id=\"94b0bc9\" data-element_type=\"widget\" data-widget_type=\"sb_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<div class=\"elementor-widget-container elementor-align-justified\">\n    <div class=\"elementor-button-wrapper\">\n        <a class=\"elementor-button elementor-button--default elementor-button--medium\" href=\"?downloadcyberwhitepaper\" target=\"_self\"  >\n            Download whitepaper        <\/a>\n    <\/div>\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a636240 stop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a636240\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-2e0a4cf\" data-id=\"2e0a4cf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4de7eb8\" data-id=\"4de7eb8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ae0cbd9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae0cbd9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2166ef8\" data-id=\"2166ef8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73ca83f elementor-widget elementor-widget-text-editor\" data-id=\"73ca83f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Benieuwd wat de Spend Cloud voor jouw organisatie kan betekenen?&nbsp;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ff746f elementor-widget elementor-widget-sb_button\" data-id=\"2ff746f\" data-element_type=\"widget\" data-widget_type=\"sb_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<div class=\"elementor-widget-container elementor-align-center\">\n    <div class=\"elementor-button-wrapper\">\n        <a class=\"elementor-button elementor-button--default elementor-button--large\" href=\"?contactalgemeen\" target=\"_self\"  >\n            Neem contact op        <\/a>\n    <\/div>\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ac7c93e\" data-id=\"ac7c93e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f721973 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f721973\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a40d432\" data-id=\"a40d432\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f16cc34 elementor-widget elementor-widget-spacer\" data-id=\"f16cc34\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.<\/p>\n","protected":false},"author":7,"featured_media":31322,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[90],"tags":[],"back_end_gevuld":[],"class_list":["post-31321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovatie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>De nieuwste phishing-technieken: vishing, smishing en meer - Visma | ProActive<\/title>\n<meta name=\"description\" content=\"Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"De nieuwste phishing-technieken: vishing, smishing en meer - Visma | ProActive\" \/>\n<meta property=\"og:description\" content=\"Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Visma | ProActive\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-06T09:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T07:33:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jennifer Wagemans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jennifer Wagemans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\"},\"author\":{\"name\":\"Jennifer Wagemans\",\"@id\":\"https:\/\/proactive-software.com\/nl\/#\/schema\/person\/0574673ac52cff136442be73be51e4d4\"},\"headline\":\"De nieuwste phishing-technieken: vishing, smishing en meer\",\"datePublished\":\"2023-10-06T09:00:33+00:00\",\"dateModified\":\"2025-08-15T07:33:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\"},\"wordCount\":951,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/#organization\"},\"image\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png\",\"articleSection\":[\"Innovatie\"],\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\",\"url\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\",\"name\":\"De nieuwste phishing-technieken: vishing, smishing en meer - Visma | ProActive\",\"isPartOf\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png\",\"datePublished\":\"2023-10-06T09:00:33+00:00\",\"dateModified\":\"2025-08-15T07:33:27+00:00\",\"description\":\"Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.\",\"breadcrumb\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage\",\"url\":\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png\",\"contentUrl\":\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png\",\"width\":700,\"height\":400,\"caption\":\"Afbeelding-man-aan-het-vissen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/proactive-software.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De nieuwste phishing-technieken: vishing, smishing en meer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proactive-software.com\/nl\/#website\",\"url\":\"https:\/\/proactive-software.com\/nl\/\",\"name\":\"Visma | ProActive\",\"description\":\"Your Ultimate Spend Assistant\",\"publisher\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proactive-software.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proactive-software.com\/nl\/#organization\",\"name\":\"Visma | Proactive\",\"url\":\"https:\/\/proactive-software.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/proactive-software.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/07\/logo-pa.svg\",\"contentUrl\":\"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/07\/logo-pa.svg\",\"width\":627,\"height\":73,\"caption\":\"Visma | Proactive\"},\"image\":{\"@id\":\"https:\/\/proactive-software.com\/nl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/proactive-software.com\/nl\/#\/schema\/person\/0574673ac52cff136442be73be51e4d4\",\"name\":\"Jennifer Wagemans\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"De nieuwste phishing-technieken: vishing, smishing en meer - Visma | ProActive","description":"Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/","og_locale":"nl_NL","og_type":"article","og_title":"De nieuwste phishing-technieken: vishing, smishing en meer - Visma | ProActive","og_description":"Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.","og_url":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/","og_site_name":"Visma | ProActive","article_published_time":"2023-10-06T09:00:33+00:00","article_modified_time":"2025-08-15T07:33:27+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png","type":"image\/png"}],"author":"Jennifer Wagemans","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Jennifer Wagemans","Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#article","isPartOf":{"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/"},"author":{"name":"Jennifer Wagemans","@id":"https:\/\/proactive-software.com\/nl\/#\/schema\/person\/0574673ac52cff136442be73be51e4d4"},"headline":"De nieuwste phishing-technieken: vishing, smishing en meer","datePublished":"2023-10-06T09:00:33+00:00","dateModified":"2025-08-15T07:33:27+00:00","mainEntityOfPage":{"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/"},"wordCount":951,"commentCount":6,"publisher":{"@id":"https:\/\/proactive-software.com\/nl\/#organization"},"image":{"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png","articleSection":["Innovatie"],"inLanguage":"nl-NL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/","url":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/","name":"De nieuwste phishing-technieken: vishing, smishing en meer - Visma | ProActive","isPartOf":{"@id":"https:\/\/proactive-software.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage"},"image":{"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png","datePublished":"2023-10-06T09:00:33+00:00","dateModified":"2025-08-15T07:33:27+00:00","description":"Ben jij op de hoogte van de meest actuele manieren waarop mensen jouw gegevens kunnen stelen? In deze cybersecurityblog lees je meer.","breadcrumb":{"@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#primaryimage","url":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png","contentUrl":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/10\/Afbeelding-man-aan-het-vissen.png","width":700,"height":400,"caption":"Afbeelding-man-aan-het-vissen"},{"@type":"BreadcrumbList","@id":"https:\/\/proactive-software.com\/nl\/blog\/cybersecurity-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/proactive-software.com\/nl\/"},{"@type":"ListItem","position":2,"name":"De nieuwste phishing-technieken: vishing, smishing en meer"}]},{"@type":"WebSite","@id":"https:\/\/proactive-software.com\/nl\/#website","url":"https:\/\/proactive-software.com\/nl\/","name":"Visma | ProActive","description":"Your Ultimate Spend Assistant","publisher":{"@id":"https:\/\/proactive-software.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proactive-software.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/proactive-software.com\/nl\/#organization","name":"Visma | Proactive","url":"https:\/\/proactive-software.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/proactive-software.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/07\/logo-pa.svg","contentUrl":"https:\/\/proactive-software.com\/wp-content\/uploads\/2023\/07\/logo-pa.svg","width":627,"height":73,"caption":"Visma | Proactive"},"image":{"@id":"https:\/\/proactive-software.com\/nl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/proactive-software.com\/nl\/#\/schema\/person\/0574673ac52cff136442be73be51e4d4","name":"Jennifer Wagemans"}]}},"_links":{"self":[{"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/posts\/31321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/comments?post=31321"}],"version-history":[{"count":0,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/posts\/31321\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/media\/31322"}],"wp:attachment":[{"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/media?parent=31321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/categories?post=31321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/tags?post=31321"},{"taxonomy":"back_end_gevuld","embeddable":true,"href":"https:\/\/proactive-software.com\/nl\/wp-json\/wp\/v2\/back_end_gevuld?post=31321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}