{"id":101218,"date":"2018-08-02T08:00:40","date_gmt":"2018-08-02T07:00:40","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=101218"},"modified":"2024-06-20T14:13:54","modified_gmt":"2024-06-20T13:13:54","slug":"petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/","title":{"rendered":"Petites entreprises et cyberattaques : les 10 menaces les plus fr\u00e9quentes"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-101220\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg\" alt=\"Petites entreprises et cyberattaques | Stormshield\" width=\"800\" height=\"581\" \/><\/p>\n<p><strong>Connect\u00e9es mais souvent peu prot\u00e9g\u00e9es, les petites entreprises repr\u00e9sentent une aubaine pour les cybercriminels et les hackers. E-mails, r\u00e9seau wifi, cl\u00e9s USB\u2026 d\u00e9couvrez les 10 portes d\u2019entr\u00e9e des cyberattaques les plus courantes dans les PME et TPE. Liste non-exhaustive.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019e-mail<\/h2>\n<p>L\u2019e-mail est sans conteste le moyen le plus courant de se faire pirater. Une <a href=\"https:\/\/breachfighter.stormshieldcs.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">pi\u00e8ce-jointe malveillante<\/a> est souvent le vecteur privil\u00e9gi\u00e9 pour des actions de <em>phishing<\/em> (ou \u00ab hame\u00e7onnage \u00bb) ou de <em>ransomware<\/em>.<\/p>\n<h2>La banni\u00e8re publicitaire<\/h2>\n<p>Certains encarts publicitaires, notamment sur les sites gratuits, peuvent \u00eatre pirat\u00e9s et renvoyer, apr\u00e8s un clic, vers un site malveillant, voire d\u00e9clencher le t\u00e9l\u00e9chargement d\u2019un <em>malware<\/em>.<\/p>\n<h2>Le r\u00e9seau informatique de l\u2019entreprise<\/h2>\n<p>Un r\u00e9seau informatique mal prot\u00e9g\u00e9, coupl\u00e9 \u00e0 des postes de travail ou des serveurs sur lesquels les mises \u00e0 jour de s\u00e9curit\u00e9 n\u2019ont pas \u00e9t\u00e9 effectu\u00e9es, peut \u00eatre un point d\u2019entr\u00e9e notamment pour des vers informatiques. Contrairement aux virus, ils ont la capacit\u00e9 de se propager automatiquement, sans action directe de l\u2019utilisateur.<\/p>\n<h2>Le web<\/h2>\n<p>Menace r\u00e9elle, la technique du <em>watering hole<\/em> consiste \u00e0 pirater un site r\u00e9put\u00e9 et \u00e0 fort trafic, afin de propager un <em>malware<\/em> sur l\u2019ordinateur des internautes qui le consultent ou de rediriger ces derniers vers un site malveillant.<\/p>\n<h2>Les applications<\/h2>\n<p>Les applications, notamment sous Android, moins s\u00e9curis\u00e9es et contr\u00f4l\u00e9es que sur iOS, mais aussi les <em>scarewares<\/em> (logiciels malveillants affichant des notifications techniques anxiog\u00e8nes) sont des vecteurs privil\u00e9gi\u00e9s par les hackers.<\/p>\n<h2>Le wifi<\/h2>\n<p>L\u2019acc\u00e8s <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/securite-reseaux-wifi-connexion-a-haut-risque\/\">\u00e0 des bornes wifi non s\u00e9curis\u00e9es<\/a> \u2013 comme les bornes wifi publiques \u2013 reste une porte d\u2019entr\u00e9e de choix pour les cyberattaques. C\u2019est le moyen id\u00e9al d\u2019intercepter des communications, voire de r\u00e9cup\u00e9rer des donn\u00e9es ou des mots de passe.<\/p>\n<h2>Les objets connect\u00e9s<\/h2>\n<p>Accessibles \u00e0 distance, les objets connect\u00e9s sont tr\u00e8s vuln\u00e9rables et peuvent permettre aux cybercriminels de \u00ab rebondir \u00bb sur le r\u00e9seau de l\u2019entreprise ou de d\u00e9tourner ces objets pour lancer des attaques massives de type d\u00e9ni de service. Et si l\u2019<a href=\"https:\/\/www.stormshield.com\/fr\/actus\/assistants-vocaux-et-cyber-securite-et-si-le-ver-etait-deja-dans-la-pomme\/\">assistant vocal<\/a> que vous venez tout juste d\u2019installer au milieu de l\u2019<em>open space<\/em> n\u2019\u00e9tait pas une si bonne id\u00e9e ?<\/p>\n<h2>La cl\u00e9 USB<\/h2>\n<p>Une cl\u00e9 USB inconnue, laiss\u00e9e \u00e0 disposition intentionnellement, peut comporter un logiciel malveillant. Attention \u00e0 ne pas l\u2019ouvrir sur son poste de travail mais sur une machine destin\u00e9e \u00e0 cet usage et id\u00e9alement isol\u00e9e de tout r\u00e9seau.<\/p>\n<h2>L\u2019\u00e9cosyst\u00e8me<\/h2>\n<p>La relation de confiance entre une entreprise et ses fournisseurs, prestataires ou clients favorise souvent quelques imprudences. Si l\u2019un des acteurs de la cha\u00eene est mal prot\u00e9g\u00e9, il peut devenir le maillon faible qu\u2019exploiteront les hackers pour p\u00e9n\u00e9trer l\u2019ensemble de l\u2019\u00e9cosyst\u00e8me.<\/p>\n<h2>L\u2019humain<\/h2>\n<p>Se faire passer pour le pr\u00e9sident d\u2019une entreprise afin de soutirer de l\u2019argent, via son service comptable par exemple, est une pratique plus fr\u00e9quente qu\u2019on ne le croit. Or, souvent, c\u2019est en trouvant une multitude d\u2019informations sur le web que des personnes malveillantes peuvent perp\u00e9trer ce type de d\u00e9lit.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Le conseil d\u2019expert - Matthieu Bonenfant, directeur marketing de Stormshield<\/strong><\/p>\n<p>\u00ab <em>Pour les petites entreprises, souvent peu prot\u00e9g\u00e9es, les failles de s\u00e9curit\u00e9 sont nombreuses et gravitent souvent autour des usages quotidiens les plus anodins, comme acc\u00e9der \u00e0 une borne wifi publique ou installer la cl\u00e9 USB d\u2019un tiers sur son ordinateur. Les points d\u2019entr\u00e9e pour les cybercriminels sont nombreux et \u00e9voluent sans cesse, occasionnant des attaques aux cons\u00e9quences parfois dramatiques \u2013 notamment pour les TPE et PME, plus fragiles que les grandes entreprises. C\u2019est pourquoi il est essentiel pour les entreprises de s\u2019\u00e9quiper en cons\u00e9quence et de r\u00e9aliser fr\u00e9quemment les mises \u00e0 jour des syst\u00e8mes d\u2019exploitation et des applications. La sauvegarde r\u00e9guli\u00e8re des donn\u00e9es est \u00e9galement primordiale. Il faut enfin d\u00e9velopper une culture de la vigilance et rester attentif aux comportements suspects observ\u00e9s sur Internet ou sur ses ressources informatiques. Ce que les entreprises doivent comprendre, c\u2019est qu\u2019il n\u2019y a pas une solution, mais un ensemble d\u2019outils et de bonnes pratiques, \u00e0 partager au maximum avec les collaborateurs<\/em> \u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Connect\u00e9es mais souvent peu prot\u00e9g\u00e9es, les petites entreprises repr\u00e9sentent une aubaine pour les cybercriminels et les hackers. E-mails, r\u00e9seau wifi, cl\u00e9s USB\u2026 d\u00e9couvrez les 10 portes d\u2019entr\u00e9e des cyberattaques les plus courantes dans les PME et TPE. Liste non-exhaustive. &nbsp; L\u2019e-mail L\u2019e-mail est sans conteste&#8230;<\/p>\n","protected":false},"author":31,"featured_media":101220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4363],"business_size":[681],"industry":[701],"help_mefind":[],"features":[],"type_security":[754,756,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,1570,1565,1530],"class_list":["post-101218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-premiers-pas","business_size-pme","industry-operateurs-et-mssp","type_security-donnees","type_security-postes-et-serveurs","type_security-reseaux","listing_product-breach-fighter-fr","listing_product-sds-fr","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaques : 10 failles courantes dans les TPE | Stormshield<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez 10 points d\u2019entr\u00e9e classiques des cyberattaques contre les TPE et renforcez la s\u00e9curit\u00e9 informatique de votre entreprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques : 10 failles courantes dans les TPE | Stormshield\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez 10 points d\u2019entr\u00e9e classiques des cyberattaques contre les TPE et renforcez la s\u00e9curit\u00e9 informatique de votre entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-02T07:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:13:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"726\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"Petites entreprises et cyberattaques : les 10 menaces les plus fr\u00e9quentes\",\"datePublished\":\"2018-08-02T07:00:40+00:00\",\"dateModified\":\"2024-06-20T13:13:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/\"},\"wordCount\":744,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_206957227.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/\",\"name\":\"Cyberattaques : 10 failles courantes dans les TPE | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_206957227.jpg\",\"datePublished\":\"2018-08-02T07:00:40+00:00\",\"dateModified\":\"2024-06-20T13:13:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"D\u00e9couvrez 10 points d\u2019entr\u00e9e classiques des cyberattaques contre les TPE et renforcez la s\u00e9curit\u00e9 informatique de votre entreprise.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_206957227.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_206957227.jpg\",\"width\":1000,\"height\":726},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Petites entreprises et cyberattaques : les 10 menaces les plus fr\u00e9quentes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques : 10 failles courantes dans les TPE | Stormshield","description":"D\u00e9couvrez 10 points d\u2019entr\u00e9e classiques des cyberattaques contre les TPE et renforcez la s\u00e9curit\u00e9 informatique de votre entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques : 10 failles courantes dans les TPE | Stormshield","og_description":"D\u00e9couvrez 10 points d\u2019entr\u00e9e classiques des cyberattaques contre les TPE et renforcez la s\u00e9curit\u00e9 informatique de votre entreprise.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/","og_site_name":"Stormshield","article_published_time":"2018-08-02T07:00:40+00:00","article_modified_time":"2024-06-20T13:13:54+00:00","og_image":[{"width":1000,"height":726,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"Petites entreprises et cyberattaques : les 10 menaces les plus fr\u00e9quentes","datePublished":"2018-08-02T07:00:40+00:00","dateModified":"2024-06-20T13:13:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/"},"wordCount":744,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/","name":"Cyberattaques : 10 failles courantes dans les TPE | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg","datePublished":"2018-08-02T07:00:40+00:00","dateModified":"2024-06-20T13:13:54+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"D\u00e9couvrez 10 points d\u2019entr\u00e9e classiques des cyberattaques contre les TPE et renforcez la s\u00e9curit\u00e9 informatique de votre entreprise.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_206957227.jpg","width":1000,"height":726},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/petites-entreprises-et-cyberattaques-les-10-menaces-les-plus-frequentes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Petites entreprises et cyberattaques : les 10 menaces les plus fr\u00e9quentes"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/101218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=101218"}],"version-history":[{"count":14,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/101218\/revisions"}],"predecessor-version":[{"id":548879,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/101218\/revisions\/548879"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/101220"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=101218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=101218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=101218"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=101218"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=101218"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=101218"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=101218"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=101218"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=101218"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=101218"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=101218"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=101218"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=101218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}