{"id":117743,"date":"2018-12-03T08:30:05","date_gmt":"2018-12-03T07:30:05","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=117743"},"modified":"2024-06-20T14:24:35","modified_gmt":"2024-06-20T13:24:35","slug":"vol-de-donnees-des-entreprises-une-menace-sous-estimee","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/","title":{"rendered":"Vol de donn\u00e9es des entreprises : une menace sous-estim\u00e9e"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-117744\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg\" alt=\"Le vol de donn\u00e9es, menace majeure pour les entreprises | Stormshield\" width=\"800\" height=\"538\" \/><\/p>\n<p><strong>\u00c0 tort, le vol de donn\u00e9es reste souvent associ\u00e9 au vol des coordonn\u00e9es bancaires ou \u00e0 l\u2019usurpation d\u2019identit\u00e9 des particuliers. Pourtant, avec l\u2019\u00e9mergence de l\u2019internet des objets ou de l\u2019internet industriel, les nouvelles m\u00e9thodes ne manquent pas pour s\u2019attaquer aux donn\u00e9es des entreprises. Voir \u00e0 celles, pouvant sembler parfois insignifiantes, de leurs collaborateurs. Avec des impacts \u00e9conomiques parfois d\u00e9vastateurs.<\/strong><\/p>\n<p>Avec 2,6 milliards de donn\u00e9es vol\u00e9es en 2017 (selon l\u2019indice <a href=\"https:\/\/breachlevelindex.com\/assets\/Breach-Level-Index-Report-2017-Gemalto.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Breach Level Index<\/a>), le vol de donn\u00e9es reste une menace forte et croissante (+ 88 % par rapport \u00e0 2016). Et selon le r\u00e9cent <a href=\"https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/Rapport-2018_ IT-Security-economy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">rapport Kaspersky sur les budgets de s\u00e9curit\u00e9 informatique<\/a>, le cou\u0302t moyen d'une violation de donne\u0301es pour les entreprises est aujourd\u2019hui d'un peu plus de 1,2 million de dollars, soit une augmentation de 24 % par rapport a\u0300 2017 et de 38 % par rapport a\u0300 2016.<\/p>\n<p>&nbsp;<\/p>\n<h2>Vol de donn\u00e9es : un risque omnipr\u00e9sent pour les entreprises<\/h2>\n<p>Parmi les vecteurs privil\u00e9gi\u00e9s par les cybercriminels pour mener leurs attaques, le vol des mots de passe est une arme de choix. \u00ab <em>Les <a href=\"https:\/\/thisissecurity.stormshield.com\/2018\/08\/28\/acridrain-stealer\/\" target=\"_blank\" rel=\"noopener noreferrer\">password stealers<\/a> sont plus que jamais actifs, car cette technique est simple \u00e0 mettre en place et peu ch\u00e8re<\/em> \u00bb, constate un membre de l\u2019\u00e9quipe de Security Intelligence de Stormshield, en charge d\u2019analyser les outils utilis\u00e9s dans les cyberattaques. Un m\u00e9canisme g\u00e9n\u00e9rateur de revenus, que ce soit par l\u2019utilisation directe de ces mots de passe ou par la revente de ceux-ci. Mais les autres m\u00e9thodes malveillantes ne manquent pas. <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/phishing-vers-lengagement-de-la-responsabilite-des-entreprises\/\">Phishing<\/a> ou (hame\u00e7onnage), faux site internet, faux r\u00e9seau wifi ou encore cl\u00e9 USB infect\u00e9e, toutes ces techniques s\u2019emploient \u00e0 voler ou chiffrer des donn\u00e9es contre ran\u00e7on, ou tout simplement \u00e0 nuire \u00e0 un syst\u00e8me informatique. Sans compter que l\u2019essor de l\u2019internet des objets (IoT) ouvre de nouvelles failles. \u00ab <em>L\u2019IoT a brouill\u00e9 les limites traditionnelles des infrastructures informatiques (\u2026). De nombreux p\u00e9riph\u00e9riques ne sont pas conformes aux normes (\u2026), ce qui complique l'ing\u00e9nierie, la s\u00e9curit\u00e9 et la gestion de ces terminaux et de l'ensemble du syst\u00e8me<\/em> \u00bb, remarque The SANS Institute et ForeScout Technologies en conclusion d\u2019une <a href=\"https:\/\/forescout-wpengine.netdna-ssl.com\/wp-content\/uploads\/2018\/07\/2018-SANS-Industrial-IoT-Security-Survey.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u00e9tude sur la s\u00e9curit\u00e9 de l\u2019IoT industriel<\/a> publi\u00e9e en juillet 2018.<\/p>\n<p>Dans le monde industriel, la donne \u00e9volue \u00e9galement. Avec l\u2019\u00e9mergence de l\u2019internet industriel et l\u2019int\u00e9gration de machines complexes dot\u00e9es de capteurs en r\u00e9seau et de logiciels, l\u2019OT (operational technology) manipule en effet \u00ab <em>des donn\u00e9es qui, si elles sont subtilis\u00e9es, peuvent avoir de v\u00e9ritables impacts \u00e9conomiques : chantage ou revente de secret industriel, espionnage industriel ou humain\u2026<\/em> \u00bb, explique Robert Wakim, Offer Manager Industry chez Stormshield. \u00ab <em>Le probl\u00e8me est plus critique encore <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/hopital-connecte-et-e-sante-la-data-une-arme-a-double-tranchant\/\">dans le monde de la sant\u00e9<\/a>, o\u00f9 les informations sensibles comme les donn\u00e9es personnelles sont manipul\u00e9es tr\u00e8s r\u00e9guli\u00e8rement. L'atteinte \u00e0 la r\u00e9putation d'une personne (homme politique, dirigeant d\u2019entreprise\u2026) peut par exemple constituer un vrai motif de vol des donn\u00e9es de sant\u00e9 pour les h\u00f4pitaux<\/em> \u00bb, ajoute-t-il.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les collaborateurs au c\u0153ur des donn\u00e9es des entreprises<\/h2>\n<p>Espionnage \u00e9conomique, sabotage, d\u00e9stabilisation, \u00ab arnaque au Pr\u00e9sident \u00bb\u2026 Les attaques malveillantes envers les entreprises ne cessent donc de se multiplier.<\/p>\n<p>Or les canaux utilis\u00e9s sont parfois sous-estim\u00e9s, comme les r\u00e9seaux sociaux par exemple. \u00ab <em>Pour d\u00e9jouer la vigilance humaine, les cybercriminels concentrent leurs efforts sur le travail en amont. Ils passent ainsi de plus en plus de temps pour conna\u00eetre les centres d\u2019int\u00e9r\u00eat de personnes appartenant \u00e0 telle ou telle entreprise et leur envoyer un e-mail cibl\u00e9 leur permettant d\u2019entrer dans le syst\u00e8me de l\u2019entreprise et d\u2019y voler des donn\u00e9es<\/em> \u00bb, explique St\u00e9phane Pr\u00e9vost, Product Marketing Manager chez Stormshield.<\/p>\n<blockquote><p><em>Si le ph\u00e9nom\u00e8ne de l\u2019\u00ab arnaque au Pr\u00e9sident \u00bb semble aujourd\u2019hui passer en dessous du radar m\u00e9diatique, il n\u2019en reste pas moins un risque \u00e9lev\u00e9 pour les entreprises comme pour les organismes publics.<\/em><\/p><\/blockquote>\n<p>Et tous les collaborateurs de l\u2019entreprise peuvent \u00eatre cibl\u00e9s. L\u2019\u00ab arnaque au Pr\u00e9sident \u00bb est en effet une attaque typique de ce genre de proc\u00e9d\u00e9, qui cible les entreprises en se faisant passer pour leur pr\u00e9sident(e). Si le ph\u00e9nom\u00e8ne semble aujourd\u2019hui passer en dessous du radar m\u00e9diatique, il n\u2019en reste pas moins un risque \u00e9lev\u00e9 pour les entreprises comme pour les organismes publics. En t\u00e9moigne l\u2019escroquerie dont a \u00e9t\u00e9 r\u00e9cemment victime le d\u00e9partement du Nord ; un cybercriminel ayant r\u00e9ussi <a href=\"http:\/\/www.lefigaro.fr\/flash-eco\/2018\/10\/04\/97002-20181004FILWWW00044-nord-le-departement-victime-d-une-arnaque-a-800-000-euros.php\" target=\"_blank\" rel=\"noopener noreferrer\">\u00e0 d\u00e9tourner 800 000 euros<\/a> en se faisant passer pour une entreprise participant au chantier du contournement de Valenciennes. En mars 2018, c\u2019est l\u2019entreprise Path\u00e9 qui a \u00e9t\u00e9 la cible d\u2019une telle attaque, <a href=\"https:\/\/www.bfmtv.com\/economie\/une-arnaque-au-president-coute-plus-de-19-millions-d-euros-a-pathe-1563585.html\" target=\"_blank\" rel=\"noopener noreferrer\">pour un montant de plus de 19 millions d\u2019euros<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"fr\">Cibl\u00e9 par un r\u00e9seau d\u2019escrocs, le groupe Path\u00e9 a perdu plus de 19\u00a0millions d\u2019euros <a href=\"https:\/\/t.co\/rJxnEwdIxh\">https:\/\/t.co\/rJxnEwdIxh<\/a><\/p>\n<p>\u2014 Le Monde (@lemondefr) <a href=\"https:\/\/twitter.com\/lemondefr\/status\/1061280102141620226?ref_src=twsrc%5Etfw\">10 novembre 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00ab <em>Les entreprises continuent \u00e0 se faire escroquer avec maintenant d\u2019autres m\u00e9thodes plus simples et rapides. Une de ces m\u00e9thodes consiste \u00e0 intercepter des documents en piratant des messageries, puis \u00e0 les falsifier avec de fausses coordonn\u00e9es bancaires ou \u00e0 cr\u00e9er de vraies fausses factures que les clients r\u00e8glent. C\u2019est ce dernier proc\u00e9d\u00e9 qui a \u00e9t\u00e9 utilis\u00e9 dans l\u2019arnaque au d\u00e9partement du Nord<\/em> \u00bb, explique Pierre-Yves Hentzen, pr\u00e9sident de Stormshield, lui-m\u00eame cible de <a href=\"https:\/\/business.lesechos.fr\/directions-financieres\/comptabilite-et-gestion\/gestion-des-risques\/021848929832-comment-j-ai-dejoue-deux-tentatives-de-fraude-209840.php\" target=\"_blank\" rel=\"noopener noreferrer\">deux tentatives de fraude au Pr\u00e9sident<\/a> qu\u2019il a r\u00e9ussi toutefois \u00e0 d\u00e9jouer. Dans l\u2019exemple du d\u00e9partement du Nord, de simples informations sur les travaux command\u00e9s ont permis de monter l\u2019acte malveillant. Des informations qui semblent pourtant anodines, face aux coordonn\u00e9es bancaires et autres pi\u00e8ces d\u2019identit\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<p>Pour renforcer la protection de leurs donn\u00e9es face aux attaques malveillantes, les entreprises peuvent mener quelques actions simples. \u00c0 commencer par la mise en place d\u2019actions de pr\u00e9vention et de sensibilisation des collaborateurs face aux risques de vol des donn\u00e9es. Mais face aux limites de la vigilance humaine, il est primordial d\u2019utiliser aussi <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/partage-de-donnees-sensibles-securite-adaptee\/\">des outils de protection efficaces<\/a>, comme le chiffrement des donn\u00e9es sensibles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c0 tort, le vol de donn\u00e9es reste souvent associ\u00e9 au vol des coordonn\u00e9es bancaires ou \u00e0 l\u2019usurpation d\u2019identit\u00e9 des particuliers. Pourtant, avec l\u2019\u00e9mergence de l\u2019internet des objets ou de l\u2019internet industriel, les nouvelles m\u00e9thodes ne manquent pas pour s\u2019attaquer aux donn\u00e9es des entreprises. Voir \u00e0&#8230;<\/p>\n","protected":false},"author":31,"featured_media":117744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4368],"business_size":[682,683,681],"industry":[695,689,691,699,697],"help_mefind":[],"features":[],"type_security":[754],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1572,1570],"class_list":["post-117743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-par-stormshield","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-administrations-publiques","industry-banque-et-finance","industry-defense-et-organisations-militaires","industry-industrie-fr","industry-sante-et-etablissements-de-soin","type_security-donnees","listing_product-sds-enterprise-fr","listing_product-sds-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le vol de donn\u00e9es, menace majeure pour les entreprises<\/title>\n<meta name=\"description\" content=\"Loin d\u2019\u00eatre r\u00e9serv\u00e9 aux particuliers, le vol de donn\u00e9es repr\u00e9sente une menace forte pour les entreprises. Comment renforcer la protection de leurs donn\u00e9es ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le vol de donn\u00e9es, menace majeure pour les entreprises\" \/>\n<meta property=\"og:description\" content=\"Loin d\u2019\u00eatre r\u00e9serv\u00e9 aux particuliers, le vol de donn\u00e9es repr\u00e9sente une menace forte pour les entreprises. Comment renforcer la protection de leurs donn\u00e9es ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-03T07:30:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:24:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"673\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"Vol de donn\u00e9es des entreprises : une menace sous-estim\u00e9e\",\"datePublished\":\"2018-12-03T07:30:05+00:00\",\"dateModified\":\"2024-06-20T13:24:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\"},\"wordCount\":1049,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\",\"name\":\"Le vol de donn\u00e9es, menace majeure pour les entreprises\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg\",\"datePublished\":\"2018-12-03T07:30:05+00:00\",\"dateModified\":\"2024-06-20T13:24:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"Loin d\u2019\u00eatre r\u00e9serv\u00e9 aux particuliers, le vol de donn\u00e9es repr\u00e9sente une menace forte pour les entreprises. Comment renforcer la protection de leurs donn\u00e9es ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage\",\"url\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg\",\"contentUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg\",\"width\":1000,\"height\":673},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vol de donn\u00e9es des entreprises : une menace sous-estim\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le vol de donn\u00e9es, menace majeure pour les entreprises","description":"Loin d\u2019\u00eatre r\u00e9serv\u00e9 aux particuliers, le vol de donn\u00e9es repr\u00e9sente une menace forte pour les entreprises. Comment renforcer la protection de leurs donn\u00e9es ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/","og_locale":"fr_FR","og_type":"article","og_title":"Le vol de donn\u00e9es, menace majeure pour les entreprises","og_description":"Loin d\u2019\u00eatre r\u00e9serv\u00e9 aux particuliers, le vol de donn\u00e9es repr\u00e9sente une menace forte pour les entreprises. Comment renforcer la protection de leurs donn\u00e9es ?","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/","og_site_name":"Stormshield","article_published_time":"2018-12-03T07:30:05+00:00","article_modified_time":"2024-06-20T13:24:35+00:00","og_image":[{"width":1000,"height":673,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"Vol de donn\u00e9es des entreprises : une menace sous-estim\u00e9e","datePublished":"2018-12-03T07:30:05+00:00","dateModified":"2024-06-20T13:24:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/"},"wordCount":1049,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/","name":"Le vol de donn\u00e9es, menace majeure pour les entreprises","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg","datePublished":"2018-12-03T07:30:05+00:00","dateModified":"2024-06-20T13:24:35+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"Loin d\u2019\u00eatre r\u00e9serv\u00e9 aux particuliers, le vol de donn\u00e9es repr\u00e9sente une menace forte pour les entreprises. Comment renforcer la protection de leurs donn\u00e9es ?","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1052140007.jpg","width":1000,"height":673},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/vol-de-donnees-des-entreprises-une-menace-sous-estimee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Vol de donn\u00e9es des entreprises : une menace sous-estim\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/117743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=117743"}],"version-history":[{"count":8,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/117743\/revisions"}],"predecessor-version":[{"id":548897,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/117743\/revisions\/548897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/117744"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=117743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=117743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=117743"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=117743"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=117743"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=117743"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=117743"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=117743"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=117743"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=117743"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=117743"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=117743"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=117743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}