{"id":47631,"date":"2020-08-19T14:38:20","date_gmt":"2020-08-19T12:38:20","guid":{"rendered":"https:\/\/cyberant.com\/waarom-cyberant\/"},"modified":"2024-04-09T14:27:11","modified_gmt":"2024-04-09T12:27:11","slug":"why-cyberant","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/why-cyberant\/","title":{"rendered":"Why CyberAnt"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1wwjstk-3d6b4108eca2f3b69c3153af95fbf11a\">\n.avia-section.av-1wwjstk-3d6b4108eca2f3b69c3153af95fbf11a{\nmargin-top:0px;\nmargin-bottom:23px;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-1wwjstk-3d6b4108eca2f3b69c3153af95fbf11a main_color avia-section-large avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47631'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-1ujaizs-abed271a6928cf911e0794dacfb20657 sc-av_one_half av-equal-height-column-flextable'><div  class='flex_column av-1ujaizs-abed271a6928cf911e0794dacfb20657 av_one_half  avia-builder-el-1  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-l9prgap3-2784efe24f9167578a0ba6d1f5eae14a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div>\n<div>\n<h2>Why CyberAnt<\/h2>\n<\/div>\n<\/div>\n<div>\n<div>\n<div>\n<div>\n<p>With more than 10 billion euros of damage from cybercrime annually, it is time for a reliable cyber security partner.<\/p>\n<p>Cybersecurity is securing networks, systems and other digital infrastructure from malicious attacks. Figures from the Central Bureau of Statistics (CBS) show that &#8220;habitual&#8221; theft costs society 1 billion euros annually. A lot of money, but it stands in stark contrast to the damage caused by cybercrime on an annual basis: more than 10 billion euros. And that number certainly does not appear to be diminishing in the coming years.<\/p>\n<p>It&#8217;s no wonder banks, tech companies, hospitals, government agencies and just about every other sector are investing in cybersecurity to protect their organizations and the millions of customers who trust them with their data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezuokx4-c00542d8d3de2352a48c8b7b1517eca2-wrap avia-button-left  avia-builder-el-3  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezuokx4-c00542d8d3de2352a48c8b7b1517eca2\">\n#top #wrap_all .avia-button.av-lezuokx4-c00542d8d3de2352a48c8b7b1517eca2{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezuokx4-c00542d8d3de2352a48c8b7b1517eca2:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lezuokx4-c00542d8d3de2352a48c8b7b1517eca2:hover .avia-svg-icon svg:first-child{\nfill:white;\nstroke:white;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/contact\/'  class='avia-button av-lezuokx4-c00542d8d3de2352a48c8b7b1517eca2 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Contact\"><span class='avia_iconbox_title' >Contact<\/span><span class='avia_button_icon avia_button_icon_right avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello' ><\/span><\/a><\/div><\/p><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-39pfg8-27e231032571b4ed2d88bdc2b224fb6e\">\n.flex_column.av-39pfg8-27e231032571b4ed2d88bdc2b224fb6e{\nbackground:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cybersecurity-11-1030x686.jpeg) 50% 50% no-repeat scroll ;\n}\n<\/style>\n<div  class='flex_column av-39pfg8-27e231032571b4ed2d88bdc2b224fb6e av_one_half  avia-builder-el-4  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-top avia-full-stretch  '     ><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ivx1zs-1d56e3ed5b84f736a6c48f0df9a357de\">\n.avia-section.av-ivx1zs-1d56e3ed5b84f736a6c48f0df9a357de{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cybersecurity-25.jpeg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\nmargin-top:0px;\nmargin-bottom:23px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-ivx1zs-1d56e3ed5b84f736a6c48f0df9a357de main_color avia-section-large avia-no-border-styling  avia-builder-el-5  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll container_wrap sidebar_right'  data-section-bg-repeat='stretch'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47631'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-9hkmmg-76e3d96f52972eb57cbe62fc8c9c936d av_one_half  avia-builder-el-6  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-11q6ysp-ede5ff537006f5919be8b83a4a69d5f4\">\n.flex_column.av-11q6ysp-ede5ff537006f5919be8b83a4a69d5f4{\npadding:20px 20px 20px 20px;\nbackground-color:#f2f2f2;\n}\n<\/style>\n<div  class='flex_column av-11q6ysp-ede5ff537006f5919be8b83a4a69d5f4 av_one_half  avia-builder-el-7  el_after_av_one_half  avia-builder-el-last  flex_column_div  '     ><section  class='av_textblock_section av-k96i6h-e4f153ebeadb514aa83f015a84470b5e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>CyberAnt makes cybersecurity understandable and affordable<\/h2>\n<p>Malware, DDoS attacks, hacks, spyware, data breaches. All terms you hear every day in the news. Cybercrime is everywhere and does not just affect large organizations such as banks and government agencies. Increasingly, small and medium-sized businesses are also victims, with all the consequences that entails. Yet many organizations still view cybersecurity as complex and &#8220;far from my bed. We think this is unjustified, which is why we have developed a <a href=\"https:\/\/cyberantcom.wpengine.com\/website-security-check\/\">Website Security Check<\/a> that explains in clear and understandable language what the results are and what our advice is.<\/p>\n<p>As experienced cybersecurity experts, we know better than anyone how hackers operate. In fact, we do it the same way. We use general and our own scanners to look for vulnerabilities in ICT systems. These are then assessed by our experts for probability and impact and incorporated into a clear report with a clear recommendation on how to fix the problem.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezqe0zy-c59a0800c09bf3446fedf6bab90ba05d-wrap avia-button-left  avia-builder-el-9  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezqe0zy-c59a0800c09bf3446fedf6bab90ba05d\">\n#top #wrap_all .avia-button.av-lezqe0zy-c59a0800c09bf3446fedf6bab90ba05d{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezqe0zy-c59a0800c09bf3446fedf6bab90ba05d:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lezqe0zy-c59a0800c09bf3446fedf6bab90ba05d:hover .avia-svg-icon svg:first-child{\nfill:white;\nstroke:white;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/quickscan\/'  class='avia-button av-lezqe0zy-c59a0800c09bf3446fedf6bab90ba05d av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Direct scanning\"><span class='avia_iconbox_title' >Direct scanning<\/span><span class='avia_button_icon avia_button_icon_right avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello' ><\/span><\/a><\/div><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5mbrns-9dc63535b8c8bcf6f389655cdd132b91\">\n.avia-section.av-5mbrns-9dc63535b8c8bcf6f389655cdd132b91{\nmargin-top:0px;\nmargin-bottom:23px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-5mbrns-9dc63535b8c8bcf6f389655cdd132b91 main_color avia-section-large avia-no-border-styling  avia-builder-el-10  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47631'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-4vmwm0-edf6bf6abf452b2d23e3c39fbf2e16b6 sc-av_one_half av-equal-height-column-flextable'><div  class='flex_column av-4vmwm0-edf6bf6abf452b2d23e3c39fbf2e16b6 av_one_half  avia-builder-el-11  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-2tyxxk-78e4782a144543da4e4123cee38288e1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Pentesting<\/h2>\n<p>The vast majority of companies and agencies have their websites checked for vulnerabilities through what is known as a pen test<em>(penetration test, manual search for vulnerabilities<\/em>). This is generally a very comprehensive solution, but also time-consuming and thus costly, while not always necessary.<\/p>\n<p>Because we have automated part of the pen test, we can automatically identify and assess the majority of all common vulnerabilities in less time. This can be one-time, quarterly or monthly. In this way, you can protect yourself against cyber attacks at low cost.<\/p>\n<p>Want to know more about the difference between a Pentest and a Website Security Check? Then read our <a href=\"https:\/\/cyberant.com\/kennisbank\/cyber-security\/pentest-vs-vm\/\">blog post<\/a>.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezuy5x5-e04ea1d919356488a5b030dc3ad590f5-wrap avia-button-left  avia-builder-el-13  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezuy5x5-e04ea1d919356488a5b030dc3ad590f5\">\n#top #wrap_all .avia-button.av-lezuy5x5-e04ea1d919356488a5b030dc3ad590f5{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezuy5x5-e04ea1d919356488a5b030dc3ad590f5:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lezuy5x5-e04ea1d919356488a5b030dc3ad590f5:hover .avia-svg-icon svg:first-child{\nfill:white;\nstroke:white;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/contact\/'  class='avia-button av-lezuy5x5-e04ea1d919356488a5b030dc3ad590f5 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Contact\"><span class='avia_iconbox_title' >Contact<\/span><span class='avia_button_icon avia_button_icon_right avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello' ><\/span><\/a><\/div><\/p><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1w5iks-993684e4bbbcc5f04dac0bf9d5bd6bbe\">\n.flex_column.av-1w5iks-993684e4bbbcc5f04dac0bf9d5bd6bbe{\nbackground:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Computer-Hacker.png) 50% 50% no-repeat scroll ;\n}\n<\/style>\n<div  class='flex_column av-1w5iks-993684e4bbbcc5f04dac0bf9d5bd6bbe av_one_half  avia-builder-el-14  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-top avia-full-stretch  '     ><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_3'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47631'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-47631","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47631"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47631\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}