{"id":86,"date":"2021-10-27T11:26:34","date_gmt":"2021-10-27T11:26:34","guid":{"rendered":"https:\/\/actualis-informatique.fr\/blog\/?p=86"},"modified":"2021-12-08T12:17:28","modified_gmt":"2021-12-08T12:17:28","slug":"le-phishing-cyberattaques-en-2021","status":"publish","type":"post","link":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/","title":{"rendered":"Le phishing en 2021"},"content":{"rendered":"\n<p>En 2021, 80% des cyberattaques proviennent d&rsquo;un e-mail de phishing. <\/p>\n\n\n\n<p>Le phishing est une&nbsp;action malveillante qui consiste \u00e0 r\u00e9cup\u00e9rer les informations personnelles d&rsquo;une entreprise.<\/p>\n\n\n\n<p>Cela peut entra\u00eener des dommages colossaux pour une entreprise : <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ran\u00e7ongiciels : Une ran\u00e7on de 1.000.000\u20ac pay\u00e9e en France en 2019<\/li><li>D\u00e9gradation de l&rsquo;image dans les m\u00e9dias de mani\u00e8re durable<\/li><li>Perte de patrimoine immat\u00e9riel : M\u00e9thodes, brevets, informations confidentielles<\/li><li>Perte de confiance aupr\u00e8s des partenaires, des \u00e9quipes, des fournisseurs&#8230; <\/li><li>Potentiel blocage de la production, des exp\u00e9ditions, de la comptabilit\u00e9&#8230;<\/li><\/ul>\n\n\n\n<p>Dans cet article nous allons parler d&rsquo;une solution qui peut vous \u00e9viter cela. <\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><a href=\"https:\/\/avantdecliquer.com\/\"><img decoding=\"async\" class=\"wp-image-87\" style=\"width: 650px;\" src=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/Logo-rectangle-AvantdeCliquer.jpg\" alt=\"\"><\/a><\/h2>\n\n\n\n<p class=\"has-text-align-left\">AvantdeCliquer.com d\u00e9veloppe un algorithme de ciblage pour am\u00e9liorer rapidement les comp\u00e9tences des collaborateurs. Ils re\u00e7oivent des e-mails de mise en situation en fonction de leur niveau de vigilance. La sensibilisation s\u2019effectue sur la dur\u00e9e et non de mani\u00e8re ponctuelle, en proposant un programme de formation \u00e9volutif sur un an. Les d\u00e9cideurs acc\u00e8dent aux rapports de progression en temps r\u00e9el.<\/p>\n\n\n\n<p>Cette solution qui a \u00e9t\u00e9 mise en avant par<strong> BPIFrance<\/strong> a pour but de diviser par 10 le risque de cyberattaques par phishing. L&rsquo;audit est r\u00e9alis\u00e9e sur mesure pour chaque entreprise. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">La m\u00e9thode :<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><em>Audit<\/em><\/strong> : Un envoi de 1 \u00e0 4 e-mails (phishing) par utilisateur sur une p\u00e9riode 5 jours ouvr\u00e9s. Plusieurs solutions s&rsquo;offrent apr\u00e8s l&rsquo;envoi de ce dernier : Le collaborateur ne se fait pas avoir, il est donc f\u00e9licit\u00e9 ; Le collaborateur clique sur le lien du phishing, il est redirig\u00e9 vers une vid\u00e9o e-learning. <\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"433\" src=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-6.png\" alt=\"\" class=\"wp-image-92\" srcset=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-6.png 769w, https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-6-300x169.png 300w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><figcaption>Exemple de message AvantDeCliquer.com<\/figcaption><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><em>Communication<\/em><\/strong> : L&rsquo;envoi d&rsquo;un plan de communication contenant un e-mail informatif ainsi qu&rsquo;une infographie pr\u00e9sentant le r\u00e9sultat de l&rsquo;audit. Une invitation pour chaque utilisateur \u00e0 suivre un module de e-learning, r\u00e9ception r\u00e9guli\u00e8re de faux e-mails de phishing et la proc\u00e9dure \u00e0 suivre en cas de r\u00e9ception d&rsquo;e-mail de phishing. Ajout du bouton \u00ab\u00a0Alerte Phishing\u00a0\u00bb<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"675\" src=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-7.png\" alt=\"\" class=\"wp-image-93\" srcset=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-7.png 633w, https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-7-281x300.png 281w\" sizes=\"auto, (max-width: 633px) 100vw, 633px\" \/><figcaption>Exemple \u00ab\u00a0Alerte Phishing\u00a0\u00bb<\/figcaption><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li><em><strong>E-learning<\/strong><\/em> : Un acc\u00e8s \u00e0 la plateforme e-learning cybers\u00e9curit\u00e9 avec un module de 30 minutes sur le phishing et sur la cybers\u00e9curit\u00e9 sous forme de vid\u00e9os de 1 \u00e0 5 minutes abordant les mots de passe, le poste de travail, la cybers\u00e9curit\u00e9 dans la vie personnelle afin de vous entra\u00eener au mieux sur le sujet.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"924\" height=\"473\" src=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-8.png\" alt=\"\" class=\"wp-image-94\" srcset=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-8.png 924w, https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-8-300x154.png 300w, https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/image-8-768x393.png 768w\" sizes=\"auto, (max-width: 924px) 100vw, 924px\" \/><figcaption>Exemple des vid\u00e9os e-learning AvantDeCliquer.com<\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><em>Mise en situation<\/em><\/strong> : Un suivi tout au long de l&rsquo;ann\u00e9e pour vous accompagner avec l&rsquo;envoi d&rsquo;e-mails de phishing afin de sensibiliser au mieux ses collaborateurs. <\/li><\/ul>\n\n\n\n<p> \u2705  Pour d\u00e9couvrir plus en d\u00e9tail cette solution, contactez-nous&nbsp;:<\/p>\n\n\n\n<p><br>\ud83d\udce9&nbsp;<a href=\"mailto:contact@actualis-info.fr\">contact@actualis-info.fr<\/a><\/p>\n\n\n\n<p><br>\ud83d\udcde +33 (0)3 72 39 52 90<\/p>\n\n\n\n<p>Retrouvez notre dernier article sur les 11 nouveaut\u00e9s sur Windows 11 :  <a href=\"https:\/\/actualis-informatique.fr\/blog\/11-nouveautes-sur-windows-11\/\">https:\/\/actualis-informatique.fr\/blog\/11-nouveautes-sur-windows-11\/<\/a><\/p>\n\n\n\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Retrouvez la pr\u00e9sentation de notre nouveau partenaire : AvantdeCliquer.com<\/p>\n","protected":false},"author":2,"featured_media":110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[4,15,16,13,5,14,12,17,18],"class_list":["post-86","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-monde-de-linformatique","tag-actualis-informatique","tag-cyberattaques","tag-e-mail","tag-hameconnage","tag-informatique","tag-it","tag-phishing","tag-securite","tag-spams"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le phishing en 2021 (Cyberattaques) - Actualis Informatique<\/title>\n<meta name=\"description\" content=\"Le phishing en 2021 En 2021, 80% des cyberattaques proviennent d&#039;un e-mail de phishing - D\u00e9couvrez AvantdeCliquer.com\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le phishing en 2021 (Cyberattaques) - Actualis Informatique\" \/>\n<meta property=\"og:description\" content=\"Le phishing en 2021 En 2021, 80% des cyberattaques proviennent d&#039;un e-mail de phishing - D\u00e9couvrez AvantdeCliquer.com\" \/>\n<meta property=\"og:url\" content=\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"Actualis Informatique\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-27T11:26:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-08T12:17:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"457\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin Actualis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin Actualis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\"},\"author\":{\"name\":\"Admin Actualis\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/person\/f3b75a09b6e042fe0cef4bec921097fc\"},\"headline\":\"Le phishing en 2021\",\"datePublished\":\"2021-10-27T11:26:34+00:00\",\"dateModified\":\"2021-12-08T12:17:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png\",\"keywords\":[\"actualis informatique\",\"cyberattaques\",\"e-mail\",\"hame\u00e7onnage\",\"informatique\",\"it\",\"phishing\",\"s\u00e9curit\u00e9\",\"spams\"],\"articleSection\":[\"Monde de l'informatique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\",\"url\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\",\"name\":\"Le phishing en 2021 (Cyberattaques) - Actualis Informatique\",\"isPartOf\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png\",\"datePublished\":\"2021-10-27T11:26:34+00:00\",\"dateModified\":\"2021-12-08T12:17:28+00:00\",\"description\":\"Le phishing en 2021 En 2021, 80% des cyberattaques proviennent d'un e-mail de phishing - D\u00e9couvrez AvantdeCliquer.com\",\"breadcrumb\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage\",\"url\":\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png\",\"contentUrl\":\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png\",\"width\":312,\"height\":223},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/actualis-informatique.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le phishing en 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#website\",\"url\":\"https:\/\/actualis-informatique.fr\/blog\/\",\"name\":\"Actualis Informatique\",\"description\":\"Votre partenaire MSP\",\"publisher\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/actualis-informatique.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#organization\",\"name\":\"Actualis Informatique\",\"url\":\"https:\/\/actualis-informatique.fr\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/09\/cropped-logox240.jpg\",\"contentUrl\":\"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/09\/cropped-logox240.jpg\",\"width\":240,\"height\":64,\"caption\":\"Actualis Informatique\"},\"image\":{\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/person\/f3b75a09b6e042fe0cef4bec921097fc\",\"name\":\"Admin Actualis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bffc5567dcb5ac5b9f4df62f65ac3b0b9ffc9391f80965c0a483e6c1481390bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bffc5567dcb5ac5b9f4df62f65ac3b0b9ffc9391f80965c0a483e6c1481390bb?s=96&d=mm&r=g\",\"caption\":\"Admin Actualis\"},\"url\":\"https:\/\/actualis-informatique.fr\/blog\/author\/adrien_pkmt51\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le phishing en 2021 (Cyberattaques) - Actualis Informatique","description":"Le phishing en 2021 En 2021, 80% des cyberattaques proviennent d'un e-mail de phishing - D\u00e9couvrez AvantdeCliquer.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/","og_locale":"fr_FR","og_type":"article","og_title":"Le phishing en 2021 (Cyberattaques) - Actualis Informatique","og_description":"Le phishing en 2021 En 2021, 80% des cyberattaques proviennent d'un e-mail de phishing - D\u00e9couvrez AvantdeCliquer.com","og_url":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/","og_site_name":"Actualis Informatique","article_published_time":"2021-10-27T11:26:34+00:00","article_modified_time":"2021-12-08T12:17:28+00:00","og_image":[{"width":640,"height":457,"url":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-1.png","type":"image\/png"}],"author":"Admin Actualis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Admin Actualis","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#article","isPartOf":{"@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/"},"author":{"name":"Admin Actualis","@id":"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/person\/f3b75a09b6e042fe0cef4bec921097fc"},"headline":"Le phishing en 2021","datePublished":"2021-10-27T11:26:34+00:00","dateModified":"2021-12-08T12:17:28+00:00","mainEntityOfPage":{"@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/"},"wordCount":447,"publisher":{"@id":"https:\/\/actualis-informatique.fr\/blog\/#organization"},"image":{"@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png","keywords":["actualis informatique","cyberattaques","e-mail","hame\u00e7onnage","informatique","it","phishing","s\u00e9curit\u00e9","spams"],"articleSection":["Monde de l'informatique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/","url":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/","name":"Le phishing en 2021 (Cyberattaques) - Actualis Informatique","isPartOf":{"@id":"https:\/\/actualis-informatique.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage"},"image":{"@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png","datePublished":"2021-10-27T11:26:34+00:00","dateModified":"2021-12-08T12:17:28+00:00","description":"Le phishing en 2021 En 2021, 80% des cyberattaques proviennent d'un e-mail de phishing - D\u00e9couvrez AvantdeCliquer.com","breadcrumb":{"@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#primaryimage","url":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png","contentUrl":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png","width":312,"height":223},{"@type":"BreadcrumbList","@id":"https:\/\/actualis-informatique.fr\/blog\/le-phishing-cyberattaques-en-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/actualis-informatique.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Le phishing en 2021"}]},{"@type":"WebSite","@id":"https:\/\/actualis-informatique.fr\/blog\/#website","url":"https:\/\/actualis-informatique.fr\/blog\/","name":"Actualis Informatique","description":"Votre partenaire MSP","publisher":{"@id":"https:\/\/actualis-informatique.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/actualis-informatique.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/actualis-informatique.fr\/blog\/#organization","name":"Actualis Informatique","url":"https:\/\/actualis-informatique.fr\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/09\/cropped-logox240.jpg","contentUrl":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/09\/cropped-logox240.jpg","width":240,"height":64,"caption":"Actualis Informatique"},"image":{"@id":"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/person\/f3b75a09b6e042fe0cef4bec921097fc","name":"Admin Actualis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/actualis-informatique.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bffc5567dcb5ac5b9f4df62f65ac3b0b9ffc9391f80965c0a483e6c1481390bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bffc5567dcb5ac5b9f4df62f65ac3b0b9ffc9391f80965c0a483e6c1481390bb?s=96&d=mm&r=g","caption":"Admin Actualis"},"url":"https:\/\/actualis-informatique.fr\/blog\/author\/adrien_pkmt51\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/actualis-informatique.fr\/blog\/wp-content\/uploads\/2021\/10\/hacking-g9e7b562f9_640-e1635335948197.png","_links":{"self":[{"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/posts\/86","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":7,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/posts\/86\/revisions"}],"predecessor-version":[{"id":103,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/posts\/86\/revisions\/103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/media\/110"}],"wp:attachment":[{"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/media?parent=86"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/categories?post=86"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/actualis-informatique.fr\/blog\/wp-json\/wp\/v2\/tags?post=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}