{"id":788,"date":"2025-07-26T09:13:31","date_gmt":"2025-07-26T07:13:31","guid":{"rendered":"https:\/\/www.yepyr.com\/cybersecurity-and-policy\/"},"modified":"2025-10-13T08:59:09","modified_gmt":"2025-10-13T06:59:09","slug":"cybersecurity-and-policy","status":"publish","type":"page","link":"https:\/\/www.yepyr.com\/en\/cybersecurity-and-policy\/","title":{"rendered":"Cybersecurity and Policy"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_0 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_0 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_cta_0 et_pb_promo et_pb_bg_layout_dark et_pb_module et_flex_module\"><div class=\"et_pb_promo_description\"><h1 class=\"et_pb_module_header\">Cybersecurity and policy for organizations that take it seriously\u2014from SMEs to large enterprises and government.<\/h1><div class=\"et_pb_promo_content\"><p style=\"text-align: left;\"><strong>From risk assessment to implementation: practical guidance on standards such as ISO 27001, NIS2, and the GDPR, tailored to your reality.<\/strong><\/p>\n<p style=\"text-align: left;\">Digital security is not a side issue. YEPYR helps organizations set up cybersecurity and policy in a practical and effective way. Whether you are a growing SME without an internal CISO, a municipality preparing for NIS2, or a large enterprise seeking additional strategic or technical capacity.  <\/p>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_1 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_1 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_1 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_0 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h1 class=\"et_pb_module_header\">What We Do<\/h1><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_2 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_2 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_0 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_off et_pb_animation_off_tablet et_pb_animation_off_phone\">\uf505<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Policy and risk-based advisory<\/h4><div class=\"et_pb_blurb_description\"><ul>\n<li>Setting up an ISMS, including a <em>light<\/em> version without certification pressure<\/li>\n<li>Risk analyses and maturity scans<\/li>\n<li>Security roadmaps and realistic implementation planning<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_3 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_1 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_off et_pb_animation_off_tablet et_pb_animation_off_phone\">i<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Compliance and frameworks<\/h4><div class=\"et_pb_blurb_description\"><ul>\n<li>ISO 27001, GDPR, AVG, NIS2, BIO, Cyber Essentials Plus<\/li>\n<li>Advisory on the AI Act and MiCAR for, among others, financial institutions and tech startups<\/li>\n<li>Audit preparation and compliance checks<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_4 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_2 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_off et_pb_animation_off_tablet et_pb_animation_off_phone\">i<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Practical implementation<\/h4><div class=\"et_pb_blurb_description\"><ul>\n<li>Access control, password policy, logging, encryption, DLP<\/li>\n<li>Secure setup of Microsoft 365, Google Workspace, Cloud, and SaaS<\/li>\n<li>Awareness programs and phishing simulations<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_2 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_3 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_5 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_1 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Who Is This For?<\/h2><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_4 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_6 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_toggle_0 et_pb_toggle et_pb_toggle_item et_pb_toggle_open et_pb_module et_flex_module\"><h5 class=\"et_pb_toggle_title\">Small and medium-sized enterprises (SMEs)<\/h5><div class=\"et_pb_toggle_content clearfix et_flex_module\"><p>SMEs without an in-house IT security department seeking practical guidance.<\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_toggle_1 et_pb_toggle et_pb_toggle_item et_pb_toggle_close et_pb_module et_flex_module\"><h5 class=\"et_pb_toggle_title\">Large enterprises<\/h5><div class=\"et_pb_toggle_content clearfix et_flex_module\"><p>Large enterprises needing temporary reinforcement, standard implementation, or policy optimization.<\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_toggle_2 et_pb_toggle et_pb_toggle_item et_pb_toggle_close et_pb_module et_flex_module\"><h5 class=\"et_pb_toggle_title\">Government and institutions<\/h5><div class=\"et_pb_toggle_content clearfix et_flex_module\"><p>Government bodies and institutions subject to NIS2 or BIO that seek support with policy, awareness, and technical measures.<\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_toggle_3 et_pb_toggle et_pb_toggle_item et_pb_toggle_close et_pb_module et_flex_module\"><h5 class=\"et_pb_toggle_title\">Startups and scale-ups<\/h5><div class=\"et_pb_toggle_content clearfix et_flex_module\"><p>Startups and scale-ups that process privacy-sensitive data and aim to grow professionally.<\/p>\n<\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_7 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_testimonial_0 et_pb_testimonial et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_testimonial_inner\"><div class=\"et_pb_testimonial_portrait\" style=\"background-image:url(https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/07\/PHK_6732-square.jpg)\"><\/div><div class=\"et_pb_testimonial_description et_flex_module\"><div class=\"et_pb_testimonial_description_inner\"><div class=\"et_pb_testimonial_content\"><p>Yepyr speaks the language of executives and technical security teams\u2014we build bridges between policy and practice.<\/p>\n<\/div><\/div><div class=\"et_pb_testimonial_author\">Jean-Paul de Jong<\/div><div class=\"et_pb_testimonial_meta\"><span class=\"et_pb_testimonial_position\">Founder<\/span><span class=\"et_pb_testimonial_separator\">, <\/span><span class=\"et_pb_testimonial_company\">Yepyr B.V.<\/span><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_3 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_5 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_8 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_2 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h1 class=\"et_pb_module_header\">Why Yepyr?<\/h1><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_6 et_pb_row et-vb-row--no-module et_flex_row\">\n<div class=\"et_pb_column_9 et_pb_column et-last-child et_flex_column et_pb_column_empty et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\"><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_4 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_7 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_10 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_3 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h1 class=\"et_pb_module_header\">Examples<\/h1><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_8 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_11 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_slider_0 et_pb_slider et_pb_slider_fullwidth_off et_pb_module et_flex_module\"><div class=\"et_pb_slides\">\n<div class=\"et_pb_slide_0 et_pb_slide et_pb_media_alignment_center et_pb_bg_layout_light\" data-slide-id=\"divi\/slide-0\"><div class=\"et_pb_container\"><div class=\"et_pb_slider_container_inner\"><div class=\"et_pb_slide_description et_flex_module\"><h2 class=\"et_pb_slide_title\">SaaS scale-up<\/h2><div class=\"et_pb_slide_content\"><p>At Yepyr, we provide comprehensive support to legal-tech scale-ups, from initial development to ISO 27001 certification, including annual audits and recertification. Throughout this period, we ensure no data loss occurs\u2014whether due to personnel or within the managed Microsoft 365 and Azure infrastructure\u2014effectively integrating hybrid on-premises and BYOD cultures. Our team ensures cybersecurity and compliance are seamlessly integrated into your growth, allowing you to focus on achieving your business objectives.  <\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_slide_1 et_pb_slide et_pb_media_alignment_center et_pb_bg_layout_dark\" data-slide-id=\"divi\/slide-1\"><div class=\"et_pb_container\"><div class=\"et_pb_slider_container_inner\"><div class=\"et_pb_slide_description et_flex_module\"><h2 class=\"et_pb_slide_title\">Government institution<\/h2><div class=\"et_pb_slide_content\"><p>At Yepyr, we support government institutions not only in meeting BIO requirements, but also in creating a solid baseline of staff knowledge, enhancing the effectiveness of awareness training. We do more than measure progress: we implement advanced technical solutions such as logging systems and phishing simulations. As a result, your organization is not only compliant, but also resilient and well prepared for today\u2019s cyber threats. Together, we build a secure digital future.   <\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_slide_2 et_pb_slide et_pb_media_alignment_center et_pb_bg_layout_light\" data-slide-id=\"divi\/slide-2\"><div class=\"et_pb_container\"><div class=\"et_pb_slider_container_inner\"><div class=\"et_pb_slide_description et_flex_module\"><h2 class=\"et_pb_slide_title\">Multinational<\/h2><div class=\"et_pb_slide_content\"><p>At Yepyr, we offer comprehensive support to multinationals preparing for NIS2, including an in-depth gap analysis, technical policy objectives, and clear board-level reporting. We focus not only on the necessary measures, but also invest in educating international teams to ensure the importance of cybersecurity and compliance is understood. Our approach is practical and tailored, enabling us to respond effectively to the unique challenges and opportunities of large organizations in an increasingly complex digital landscape.  <\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Consultancy and execution in information security, ISO 27001, NIS2, the AI Act, policy development, awareness, and risk management.<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-788","page","type-page","status-publish","hentry"],"dsm_author":{"name":"Jean-Paul de Jong","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/1c79a5cffaf46e38fd1a83845c1ea8df78404f46a26b2158ad70c72f85658326?s=96&d=mm&r=g","archive_link":"https:\/\/www.yepyr.com\/en\/author\/jp\/","biodata":""},"dsm_categories":[],"dsm_attachment_categories":[],"dsm_featured_image":null,"_links":{"self":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/comments?post=788"}],"version-history":[{"count":1,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/788\/revisions"}],"predecessor-version":[{"id":789,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/788\/revisions\/789"}],"wp:attachment":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/media?parent=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}