{"id":4901,"date":"2017-06-02T11:42:31","date_gmt":"2017-06-02T09:42:31","guid":{"rendered":"https:\/\/news.save.ch\/?p=4901"},"modified":"2023-03-14T08:57:03","modified_gmt":"2023-03-14T07:57:03","slug":"7-schritte-zur-verbesserung-der-cyber-sicherheit","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/","title":{"rendered":"7 \u00e9tapes pour une meilleure cybers\u00e9curit\u00e9"},"content":{"rendered":"<figure id=\"attachment_4902\" aria-describedby=\"caption-attachment-4902\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4902\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg\" alt=\"\" width=\"680\" height=\"408\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015-375x225.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-4902\" class=\"wp-caption-text\">\u00a9 depositphotos<\/figcaption><\/figure>\n<p>Cette forme de cyberattaque est d\u00e9j\u00e0 si populaire qu'elle est m\u00eame propos\u00e9e en tant que \"ransomware-as-a-service\", o\u00f9 l'on peut composer son propre ransomware personnalis\u00e9 sur le r\u00e9seau Tor, les personnes \u00e0 l'origine de l'extorsion demandant une commission sur le produit du chantage, \u00e9crit <a href=\"https:\/\/www.barracuda.com\">Barracuda Networks<\/a>.<\/p>\n<p>Pour am\u00e9liorer la cybers\u00e9curit\u00e9, l'entreprise recommande sept \u00e9tapes :<br \/>\n<strong><br \/>\n1. la cybers\u00e9curit\u00e9 comme question de performance et de conformit\u00e9 de l'entreprise<\/strong><br \/>\nLa cybers\u00e9curit\u00e9 est souvent consid\u00e9r\u00e9e comme un probl\u00e8me purement informatique et les cadres ont souvent peu de visibilit\u00e9 sur les normes et les risques de s\u00e9curit\u00e9 \u00e9prouv\u00e9s. En outre, en l'absence d'experts dans l'\u00e9quipe, le personnel informatique de base est trop souvent laiss\u00e9 \u00e0 lui-m\u00eame pour s'occuper du vaste domaine de la cybers\u00e9curit\u00e9, alors que la s\u00e9curit\u00e9 informatique n\u00e9cessite une approche centralis\u00e9e avec des responsabilit\u00e9s claires. Les personnes cl\u00e9s, \u00e0 commencer par les membres de la direction, doivent s'engager dans ce domaine afin de permettre une prise de d\u00e9cision et une culture du personnel \u00e0 l'\u00e9chelle de l'entreprise, ax\u00e9es sur le traitement confidentiel des donn\u00e9es des clients et sur une bonne gestion des donn\u00e9es. Une \u00e9valuation professionnelle initiale des risques est essentielle pour identifier les menaces sp\u00e9cifiques et mettre en \u0153uvre des solutions. Ce processus doit inclure une \u00e9valuation pr\u00e9cise des co\u00fbts directs li\u00e9s \u00e0 une violation de la s\u00e9curit\u00e9 et de ses cons\u00e9quences pour l'ensemble de l'entreprise. Pour ce faire, travaillez avec des sp\u00e9cialistes et utilisez des services g\u00e9r\u00e9s pour acc\u00e9l\u00e9rer la mise en \u0153uvre de proc\u00e9dures et de technologies de s\u00e9curit\u00e9 \u00e9prouv\u00e9es. Les fournisseurs sp\u00e9cialis\u00e9s peuvent aider \u00e0 identifier les vuln\u00e9rabilit\u00e9s potentielles et \u00e0 \u00e9laborer une strat\u00e9gie r\u00e9fl\u00e9chie de protection contre les cyber-attaques.<\/p>\n<p><strong>2. mise en \u0153uvre de bonnes pratiques de s\u00e9curit\u00e9<\/strong><br \/>\nD\u00e9finissez des lignes directrices concr\u00e8tes pour les outils de messagerie \u00e9lectronique, web, de collaboration et de m\u00e9dias sociaux, ainsi que pour d'autres outils utilis\u00e9s dans divers processus de travail. Veillez \u00e0 ce que ces directives incluent les exigences l\u00e9gales et r\u00e9glementaires en mati\u00e8re de cryptage du contenu des e-mails contenant des donn\u00e9es sensibles. En outre, l'utilisation de terminaux mobiles priv\u00e9s tels que les ordinateurs portables, les tablettes ou les smartphones (BYOD) pour acc\u00e9der aux syst\u00e8mes de l'entreprise doit \u00eatre surveill\u00e9e ou contr\u00f4l\u00e9e. Informez vos collaborateurs sur les outils et les applications qu'ils doivent utiliser pour acc\u00e9der aux ressources de l'entreprise. Interdisez par exemple l'utilisation de cl\u00e9s de donn\u00e9es ou de logiciels \u00e9trangers sur l'infrastructure de l'entreprise.<\/p>\n<p><strong>3. mesures de surveillance et de pr\u00e9vention<\/strong><br \/>\nMettre en place des syst\u00e8mes de d\u00e9tection et d'\u00e9limination des attaques de phishing et de ransomware. Les logiciels de surveillance doivent offrir une grande visibilit\u00e9 et permettre aux \u00e9quipes informatiques d'analyser r\u00e9guli\u00e8rement les bo\u00eetes aux lettres et de remonter jusqu'\u00e0 un appareil sp\u00e9cifique. Des mesures pr\u00e9ventives devraient \u00e9galement \u00eatre prises, notamment la recherche de vuln\u00e9rabilit\u00e9s dans les applications web et les logiciels espions existants, ainsi que l'utilisation d'outils avanc\u00e9s pour d\u00e9tecter les menaces.<br \/>\n<strong><br \/>\n4. sauvegarde des donn\u00e9es<\/strong><br \/>\nUn plan de reprise apr\u00e8s sinistre est vital pour la continuit\u00e9 de l'entreprise. Examinez donc votre proc\u00e9dure de sauvegarde pour vous assurer que les donn\u00e9es peuvent \u00eatre restaur\u00e9es sur toutes les plateformes. De cette mani\u00e8re, vous vous assurez que vous disposez d'une strat\u00e9gie coh\u00e9rente pour limiter les d\u00e9g\u00e2ts. Les syst\u00e8mes de sauvegarde bas\u00e9s sur le cloud conviennent par exemple pour r\u00e9pondre de mani\u00e8re \u00e9conomique \u00e0 l'exigence d'une sauvegarde hors site en cas de catastrophe.<\/p>\n<p><strong>5. cryptage des donn\u00e9es et s\u00e9curit\u00e9 du cloud<\/strong><br \/>\nUn concept de s\u00e9curit\u00e9 complet devrait \u00e9galement inclure des approches avanc\u00e9es telles que des r\u00e8gles de cryptage des donn\u00e9es pour prot\u00e9ger les espaces de stockage priv\u00e9s et les syst\u00e8mes de sauvegarde en nuage. Elle inclut \u00e9galement des outils d'analyse heuristique pour d\u00e9tecter les commandes susceptibles d'indiquer une activit\u00e9 malveillante, ainsi que des \u00e9mulateurs de syst\u00e8mes bas\u00e9s sur le cloud qui ouvrent et analysent les fichiers dans une sandbox afin de prot\u00e9ger les syst\u00e8mes contre le risque de pi\u00e8ces jointes malveillantes.<\/p>\n<p><strong>6. sensibilisation du personnel<\/strong><br \/>\nIl est \u00e9galement possible de sensibiliser le personnel, car les cybercriminels s'attaquent g\u00e9n\u00e9ralement \u00e0 la cible la plus facile du r\u00e9seau : l'utilisateur. Le courrier \u00e9lectronique est l'une des portes d'entr\u00e9e les plus fr\u00e9quentes pour de nombreux types d'attaques, mais de nombreux employ\u00e9s sont submerg\u00e9s d'informations, il est donc peu probable qu'ils v\u00e9rifient leur courrier en d\u00e9tail pour voir s'il y a hame\u00e7onnage. La promotion de la sensibilisation \u00e0 la s\u00e9curit\u00e9 est un \u00e9l\u00e9ment cl\u00e9 de l'am\u00e9lioration de la protection. Les r\u00e9sultats d'un r\u00e9cent rapport d'Osterman Research confirment que la probabilit\u00e9 d'\u00eatre victime d'une attaque de spear phishing est plus faible pour les entreprises dont les employ\u00e9s sont bien pr\u00e9par\u00e9s. Il est important d'organiser des formations r\u00e9guli\u00e8res pour apprendre \u00e0 g\u00e9rer les fraudes ou les attaques par e-mail, \u00e0 adopter de bonnes pratiques en mati\u00e8re d'e-mail et \u00e0 adopter un comportement s\u00fbr lors de la navigation sur Internet.<\/p>\n<p><strong>7. maintenir vos syst\u00e8mes \u00e0 jour<\/strong><br \/>\nToutes les applications et tous les syst\u00e8mes d'exploitation devraient \u00eatre r\u00e9guli\u00e8rement contr\u00f4l\u00e9s quant aux failles de s\u00e9curit\u00e9 et mis \u00e0 jour \u00e0 l'aide des correctifs actuels des fournisseurs respectifs. Edgescan a constat\u00e9 que 63 % de toutes les vuln\u00e9rabilit\u00e9s auraient pu \u00eatre \u00e9limin\u00e9es par une mise \u00e0 jour de s\u00e9curit\u00e9.<\/p>\n<p><em>Source : Barracuda Networks<\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Diese Form von Cyberangriff bereits so popul\u00e4r, dass sie sogar als \u201eRansomware-as-a-Service\u201c angeboten wird, bei der man sich im Tor-Netz eine eigene, personalisierte Ransomware zusammenstellen kann, wobei die Hinterm\u00e4nner Kommission auf die Erpressungserl\u00f6se verlangen, schreibt Barracuda Networks. Zur Verbesserung der Cyber-Sicherheit empfiehlt das Unternehmen sieben Schritte: 1.\u00a0Cyber-Sicherheit als Frage der Unternehmens-Performance und -Compliance Cyber-Sicherheit wird [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4902,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96],"class_list":["post-4901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Barracuda Networks empfiehlt sieben Schritte zur Verbesserung der Cyber-Sicherheit.","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Schritte f\u00fcr mehr Cyber-Sicherheit - Save<\/title>\n<meta name=\"description\" content=\"Cyberangriff\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Schritte f\u00fcr mehr Cyber-Sicherheit - Save\" \/>\n<meta property=\"og:description\" content=\"Cyberangriff\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-02T09:42:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"7 Schritte f\u00fcr mehr Cyber-Sicherheit\",\"datePublished\":\"2017-06-02T09:42:31+00:00\",\"dateModified\":\"2023-03-14T07:57:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Depositphotos_13601536_m-2015.jpg\",\"keywords\":[\"Cyber-Crime\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/\",\"name\":\"7 Schritte f\u00fcr mehr Cyber-Sicherheit - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Depositphotos_13601536_m-2015.jpg\",\"datePublished\":\"2017-06-02T09:42:31+00:00\",\"dateModified\":\"2023-03-14T07:57:03+00:00\",\"description\":\"Cyberangriff\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Depositphotos_13601536_m-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Depositphotos_13601536_m-2015.jpg\",\"width\":1000,\"height\":600,\"caption\":\"\u00a9 depositphotos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/7-schritte-zur-verbesserung-der-cyber-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Schritte f\u00fcr mehr Cyber-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 \u00e9tapes pour une meilleure cybers\u00e9curit\u00e9 - Save","description":"Cyber-attaque","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/","og_locale":"fr_FR","og_type":"article","og_title":"7 Schritte f\u00fcr mehr Cyber-Sicherheit - Save","og_description":"Cyberangriff","og_url":"https:\/\/news.save.ch\/fr\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/","og_site_name":"Save","article_published_time":"2017-06-02T09:42:31+00:00","article_modified_time":"2023-03-14T07:57:03+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"7 Schritte f\u00fcr mehr Cyber-Sicherheit","datePublished":"2017-06-02T09:42:31+00:00","dateModified":"2023-03-14T07:57:03+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg","keywords":["Cyber-Crime"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/","url":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/","name":"7 \u00e9tapes pour une meilleure cybers\u00e9curit\u00e9 - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg","datePublished":"2017-06-02T09:42:31+00:00","dateModified":"2023-03-14T07:57:03+00:00","description":"Cyber-attaque","breadcrumb":{"@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/06\/Depositphotos_13601536_m-2015.jpg","width":1000,"height":600,"caption":"\u00a9 depositphotos"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/7-schritte-zur-verbesserung-der-cyber-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"7 Schritte f\u00fcr mehr Cyber-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/4901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=4901"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/4901\/revisions"}],"predecessor-version":[{"id":17506,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/4901\/revisions\/17506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/4902"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=4901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=4901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=4901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}