{"id":115512,"date":"2024-06-06T11:02:10","date_gmt":"2024-06-06T09:02:10","guid":{"rendered":"https:\/\/www.enterpriseoutsourcing.com\/nl\/?page_id=115512"},"modified":"2024-06-24T11:13:47","modified_gmt":"2024-06-24T09:13:47","slug":"key-clues-to-uncover-phishing-emails","status":"publish","type":"page","link":"https:\/\/www.enterpriseoutsourcing.com\/nl\/key-clues-to-uncover-phishing-emails\/","title":{"rendered":"Key Clues To Uncover Phishing Emails"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"115512\" class=\"elementor elementor-115512\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e960da e-flex e-con-boxed e-con e-parent\" data-id=\"6e960da\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4248c24 e-flex e-con-boxed e-con e-child\" data-id=\"4248c24\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7c69f6 e-flex e-con-boxed e-con e-parent\" data-id=\"e7c69f6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9336e9 e-con-full e-flex e-con e-child\" data-id=\"b9336e9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b8ce65c e-con-full e-flex e-con e-child\" data-id=\"b8ce65c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-251d464 e-con-full e-flex e-con e-child\" data-id=\"251d464\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0f82a5 elementor-widget elementor-widget-heading\" data-id=\"b0f82a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enterprise Outsourcing equips businesses with the tools and knowledge needed to effectively combat phishing attacks. By leveraging advanced content inspection tools and prioritizing clear and secure communication, we safeguard your organization from potential scams. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8afe9a3 e-con-full e-flex e-con e-child\" data-id=\"8afe9a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c3194a elementor-widget elementor-widget-heading\" data-id=\"6c3194a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our comprehensive cyber security solutions encompass email authentication, threat detection and workforce education, empowering you to stay ahead of evolving threats in today's digital landscape. Partner with us to enhance your defenses, mitigate risks and foster a cyber-resilient environment for your business.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b7a31d e-con-full e-flex e-con e-child\" data-id=\"0b7a31d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fee7913 e-con-full e-flex e-con e-child\" data-id=\"fee7913\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2db0a5b elementor-widget elementor-widget-heading\" data-id=\"2db0a5b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\"Enterprise Outsourcing provides advanced cyber security, safeguarding businesses from potential scams\"\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e22c111 e-flex e-con-boxed e-con e-parent\" data-id=\"e22c111\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e16319 e-con-full e-flex e-con e-child\" data-id=\"6e16319\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09c2b30 elementor-align-left elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"09c2b30\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back to Insights<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1db7e4f e-con-full e-flex e-con e-child\" data-id=\"1db7e4f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2f191e elementor-align-right elementor-mobile-align-right elementor-widget elementor-widget-button\" data-id=\"e2f191e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cdn.enterpriseoutsourcing.com\/EO\/insights\/2023\/Key%20clues%20to%20uncover%20phishing%20emails%203%20Oct.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Enterprise Outsourcing equips businesses with the tools and knowledge needed to effectively combat phishing attacks. By leveraging advanced content inspection [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":37,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-115512","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Clues To Uncover Phishing Emails | Enterprise Outsourcing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Clues To Uncover Phishing Emails | Enterprise Outsourcing\" \/>\n<meta property=\"og:description\" content=\"Enterprise Outsourcing equips businesses with the tools and knowledge needed to effectively combat phishing attacks. By leveraging advanced content inspection [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"Enterprise Outsourcing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EnterpriseOutsourcing\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T09:13:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-content\/uploads\/2025\/02\/logo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"746\" \/>\n\t<meta property=\"og:image:height\" content=\"184\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@EnterpriseOutsourcing\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\"},\"author\":{\"name\":\"service.enterprise\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/person\/8686f4d7f531893c1ea8e2e33ca7ad82\"},\"headline\":\"Key Clues To Uncover Phishing Emails\",\"datePublished\":\"2024-06-06T09:02:10+00:00\",\"dateModified\":\"2024-06-24T09:13:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\"},\"wordCount\":99,\"publisher\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\",\"url\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\",\"name\":\"Key Clues To Uncover Phishing Emails | Enterprise Outsourcing\",\"isPartOf\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#website\"},\"datePublished\":\"2024-06-06T09:02:10+00:00\",\"dateModified\":\"2024-06-24T09:13:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Key Clues To Uncover Phishing Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#website\",\"url\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/\",\"name\":\"Enterprise Outsourcing\",\"description\":\"For All your IT Outsourcing needs\",\"publisher\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#organization\",\"name\":\"Enterprise Outsourcing\",\"url\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-content\/uploads\/2025\/02\/logo.webp\",\"contentUrl\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-content\/uploads\/2025\/02\/logo.webp\",\"width\":746,\"height\":184,\"caption\":\"Enterprise Outsourcing\"},\"image\":{\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/EnterpriseOutsourcing\",\"https:\/\/x.com\/EnterpriseOutsourcing\",\"https:\/\/www.linkedin.com\/company\/enterpriseoutsourcing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/person\/8686f4d7f531893c1ea8e2e33ca7ad82\",\"name\":\"service.enterprise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7de6cb282e47b6fffb87a0eac24607c74c5da11a4b75022db8b1b8a5251ef05d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7de6cb282e47b6fffb87a0eac24607c74c5da11a4b75022db8b1b8a5251ef05d?s=96&d=mm&r=g\",\"caption\":\"service.enterprise\"},\"sameAs\":[\"http:\/\/www.enterpriseoutsourcing.com\/nl\"],\"url\":\"https:\/\/www.enterpriseoutsourcing.com\/nl\/author\/service-enterprise\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Clues To Uncover Phishing Emails | Enterprise Outsourcing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/","og_locale":"en_US","og_type":"article","og_title":"Key Clues To Uncover Phishing Emails | Enterprise Outsourcing","og_description":"Enterprise Outsourcing equips businesses with the tools and knowledge needed to effectively combat phishing attacks. By leveraging advanced content inspection [&hellip;]","og_url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/","og_site_name":"Enterprise Outsourcing","article_publisher":"https:\/\/www.facebook.com\/EnterpriseOutsourcing","article_modified_time":"2024-06-24T09:13:47+00:00","og_image":[{"width":746,"height":184,"url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-content\/uploads\/2025\/02\/logo.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@EnterpriseOutsourcing","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/#article","isPartOf":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/"},"author":{"name":"service.enterprise","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/person\/8686f4d7f531893c1ea8e2e33ca7ad82"},"headline":"Key Clues To Uncover Phishing Emails","datePublished":"2024-06-06T09:02:10+00:00","dateModified":"2024-06-24T09:13:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/"},"wordCount":99,"publisher":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#organization"},"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/","url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/","name":"Key Clues To Uncover Phishing Emails | Enterprise Outsourcing","isPartOf":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#website"},"datePublished":"2024-06-06T09:02:10+00:00","dateModified":"2024-06-24T09:13:47+00:00","breadcrumb":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/key-clues-to-uncover-phishing-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.enterpriseoutsourcing.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.enterpriseoutsourcing.com\/nl\/insights\/"},{"@type":"ListItem","position":3,"name":"Key Clues To Uncover Phishing Emails"}]},{"@type":"WebSite","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#website","url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/","name":"Enterprise Outsourcing","description":"For All your IT Outsourcing needs","publisher":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enterpriseoutsourcing.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#organization","name":"Enterprise Outsourcing","url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-content\/uploads\/2025\/02\/logo.webp","contentUrl":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-content\/uploads\/2025\/02\/logo.webp","width":746,"height":184,"caption":"Enterprise Outsourcing"},"image":{"@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EnterpriseOutsourcing","https:\/\/x.com\/EnterpriseOutsourcing","https:\/\/www.linkedin.com\/company\/enterpriseoutsourcing"]},{"@type":"Person","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/person\/8686f4d7f531893c1ea8e2e33ca7ad82","name":"service.enterprise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.enterpriseoutsourcing.com\/nl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7de6cb282e47b6fffb87a0eac24607c74c5da11a4b75022db8b1b8a5251ef05d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7de6cb282e47b6fffb87a0eac24607c74c5da11a4b75022db8b1b8a5251ef05d?s=96&d=mm&r=g","caption":"service.enterprise"},"sameAs":["http:\/\/www.enterpriseoutsourcing.com\/nl"],"url":"https:\/\/www.enterpriseoutsourcing.com\/nl\/author\/service-enterprise\/"}]}},"_links":{"self":[{"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/pages\/115512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/comments?post=115512"}],"version-history":[{"count":16,"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/pages\/115512\/revisions"}],"predecessor-version":[{"id":118887,"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/pages\/115512\/revisions\/118887"}],"wp:attachment":[{"href":"https:\/\/www.enterpriseoutsourcing.com\/nl\/wp-json\/wp\/v2\/media?parent=115512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}