{"id":249,"date":"2020-11-20T14:35:55","date_gmt":"2020-11-20T20:35:55","guid":{"rendered":"https:\/\/idsinc.com\/?p=249"},"modified":"2021-11-30T14:21:07","modified_gmt":"2021-11-30T20:21:07","slug":"la-securite-a-lere-dune-pandemie","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/security-in-the-age-of-a-pandemic\/","title":{"rendered":"La s\u00e9curit\u00e9 \u00e0 l&#039;\u00e8re de la pand\u00e9mie"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">Par: <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/author\/idiscovery-solutions\">Solutions d&#039;iD\u00e9couverte<\/a> le 20\/11\/2020<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Lorsque vous demandez aux gens les \u00e9l\u00e9ments n\u00e9cessaires \u00e0 une bonne s\u00e9curit\u00e9 de l&#039;information, ils parlent souvent de technologie - pare-feu, serveurs s\u00e9curis\u00e9s, gestion des identit\u00e9s et des acc\u00e8s, segmentation du r\u00e9seau et autres dimensions techniques. Cependant, les probl\u00e8mes les plus courants auxquels nous sommes confront\u00e9s concernent les choses que les gens font, par opposition \u00e0 tout manquement \u00e0 nos contr\u00f4les techniques.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;un des principaux objectifs doit \u00eatre de veiller \u00e0 ce que nous nous concentrions sur la formation de sensibilisation \u00e0 la s\u00e9curit\u00e9 de l&#039;information. La grande majorit\u00e9 des probl\u00e8mes auxquels nous sommes confront\u00e9s au quotidien proviennent de :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>E-mail professionnel compromis<\/li><li>Logiciels de ran\u00e7on<\/li><li>Logiciels malveillants<\/li><li>Violation de donn\u00e9es<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">La cause la plus fr\u00e9quente de pratiquement tous les quatre peut \u00eatre attribu\u00e9e aux personnes. Les personnes cliquant sur de mauvais liens ou ouvrant des pi\u00e8ces jointes suspectes. Les personnes utilisant (ou r\u00e9utilisant) des mots de passe faibles. Les personnes approuvant les modifications des destinations et des processus de paiement sur la base d&#039;e-mails manifestement frauduleux ou d&#039;appels t\u00e9l\u00e9phoniques trompeurs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Il existe un certain nombre de solutions techniques qui peuvent att\u00e9nuer chacun de ces risques, comme des outils qui analysent les liens externes ou signalent les pi\u00e8ces jointes provenant d&#039;une adresse externe. Ce n&#039;est pas assez. Bien que la technologie puisse \u00eatre utilis\u00e9e pour r\u00e9duire la probabilit\u00e9 de succ\u00e8s des attaquants, en fin de compte, de mauvaises pratiques peuvent l&#039;emporter sur une bonne technologie.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Donc quelle est la r\u00e9ponse? Contr\u00f4les de formation et de compensation. Vos employ\u00e9s doivent comprendre comment les m\u00e9chants fonctionnent et doivent comprendre l&#039;ing\u00e9nierie sociale. Ils sont cibl\u00e9s \u2013 ils ont juste besoin de comprendre \u00e0 quoi cela ressemble. Formez votre \u00e9quipe, mais testez-la aussi. R\u00e9compensez les membres de l&#039;\u00e9quipe qui signalent des activit\u00e9s suspectes et utilisez ces rapports comme base pour former le reste de l&#039;\u00e9quipe.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les contr\u00f4les peuvent devoir \u00eatre modifi\u00e9s dans le monde du travail \u00e0 domicile. Si les employ\u00e9s du bureau auraient normalement une deuxi\u00e8me paire d&#039;yeux pour v\u00e9rifier quelque chose avant de proc\u00e9der \u00e0 l&#039;approbation d&#039;une transaction, traduisez cette v\u00e9rification secondaire en un processus qui fonctionne tout en travaillant \u00e0 distance. Apprenez-leur que les m\u00e9chants cherchent souvent \u00e0 ce que les employ\u00e9s contournent les r\u00e8gles au nom de l&#039;urgence. Il est important de s&#039;assurer qu&#039;ils comprennent que le respect des contr\u00f4les internes n&#039;entra\u00eenera pas de mesures disciplinaires.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Enfin, passez en revue \u00e0 la fois votre formation et vos processus de contr\u00f4le et v\u00e9rifiez qu&#039;ils se traduisent par la nouvelle fa\u00e7on de travailler. Si vous n&#039;avez pas encore am\u00e9lior\u00e9 le contr\u00f4le d&#039;acc\u00e8s gr\u00e2ce \u00e0 l&#039;utilisation de l&#039;authentification multifacteur, envisagez de l&#039;ajouter comme couche de protection suppl\u00e9mentaire. Mais surtout, n&#039;oubliez pas de rester connect\u00e9 \u00e0 vos employ\u00e9s afin qu&#039;ils comprennent que la s\u00e9curit\u00e9 est l&#039;affaire de tous et que nous devons tous \u00eatre vigilants m\u00eame si nous sommes en surv\u00eatement.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions est une soci\u00e9t\u00e9 de conseil strat\u00e9gique, de technologie et de services d&#039;experts - fournissant des solutions personnalis\u00e9es d&#039;eDiscovery allant de la criminalistique num\u00e9rique au t\u00e9moignage d&#039;expert pour les cabinets d&#039;avocats et les entreprises aux \u00c9tats-Unis et en Europe.<\/em><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>By: iDiscovery Solutions on 11\/20\/2020 When you ask people the necessary elements for good information security, they will often talk about technology \u2013 firewalls, secure servers, identify and access management, network segmentation and other technical dimensions. However, the most common problems we face relate to things that people do as opposed to any lapse in [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security in the age of the pandemic - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/la-securite-a-lere-dune-pandemie\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in the age of the pandemic\" \/>\n<meta property=\"og:description\" content=\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/la-securite-a-lere-dune-pandemie\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-20T20:35:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:21:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Security in the age of the pandemic\",\"datePublished\":\"2020-11-20T20:35:55+00:00\",\"dateModified\":\"2021-11-30T20:21:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\",\"name\":\"Security in the age of the pandemic - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"datePublished\":\"2020-11-20T20:35:55+00:00\",\"dateModified\":\"2021-11-30T20:21:07+00:00\",\"description\":\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Information security is vital to any business especially when working remotely. Employee security awareness training is important as using firewalls.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security in the age of the pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La s\u00e9curit\u00e9 \u00e0 l&#039;\u00e8re de la pand\u00e9mie - iDiscovery Solutions","description":"La s\u00e9curit\u00e9 des informations est vitale pour toute entreprise travaillant \u00e0 distance. La formation des employ\u00e9s \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 est importante, tout comme l&#039;utilisation de pare-feu.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/la-securite-a-lere-dune-pandemie\/","og_locale":"fr_FR","og_type":"article","og_title":"Security in the age of the pandemic","og_description":"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.","og_url":"https:\/\/idsinc.com\/fr\/la-securite-a-lere-dune-pandemie\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-11-20T20:35:55+00:00","article_modified_time":"2021-11-30T20:21:07+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"iDiscovery Solutions","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Security in the age of the pandemic","datePublished":"2020-11-20T20:35:55+00:00","dateModified":"2021-11-30T20:21:07+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"},"wordCount":463,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/","url":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/","name":"La s\u00e9curit\u00e9 \u00e0 l&#039;\u00e8re de la pand\u00e9mie - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","datePublished":"2020-11-20T20:35:55+00:00","dateModified":"2021-11-30T20:21:07+00:00","description":"La s\u00e9curit\u00e9 des informations est vitale pour toute entreprise travaillant \u00e0 distance. La formation des employ\u00e9s \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 est importante, tout comme l&#039;utilisation de pare-feu.","breadcrumb":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","width":2500,"height":1250,"caption":"Information security is vital to any business especially when working remotely. Employee security awareness training is important as using firewalls."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Security in the age of the pandemic"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Solutions d&#039;iD\u00e9couverte","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/fr\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/2375"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}