{"id":2801,"date":"2019-07-09T11:15:32","date_gmt":"2019-07-09T17:15:32","guid":{"rendered":"https:\/\/staging2.idsinc.com\/?p=2801"},"modified":"2024-02-06T10:01:16","modified_gmt":"2024-02-06T16:01:16","slug":"phishing-1","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/gone-phishing-1\/","title":{"rendered":"Blog &#039;Gone Phishing&#039; (Partie 1)"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">Avec les premiers signes de l&#039;\u00e9t\u00e9 dans l&#039;air, les pens\u00e9es peuvent se tourner vers la p\u00eache\u2026 attendez\u2026 mauvais blog\u2026<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Dans ce premier article de blog sur la cybers\u00e9curit\u00e9 iDS, nous donnerons un aper\u00e7u rapide des attaques de phishing et des dommages qu&#039;elles peuvent causer, de la fr\u00e9quence des attaques et de certains types courants d&#039;attaques de phishing. je<a href=\"\/fr\/phishing-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">n la deuxi\u00e8me tranche<\/a>, nous nous concentrerons principalement sur la pr\u00e9vention et la r\u00e9cup\u00e9ration d&#039;une attaque de phishing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-is-phishing\">Qu&#039;est-ce que l&#039;hame\u00e7onnage\u00a0?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;hame\u00e7onnage est une technique utilis\u00e9e par les cybercriminels pour compromettre les appareils et les r\u00e9seaux en incitant les destinataires d&#039;e-mails \u00e0 cliquer sur un lien ou \u00e0 ouvrir un document contenant des logiciels malveillants. Alors qu&#039;Hollywood d\u00e9peint souvent les pirates comme des h\u00e9ros voyous cherchant \u00e0 faire tomber des soci\u00e9t\u00e9s mal\u00e9fiques ou des agences gouvernementales sinistres, la r\u00e9alit\u00e9 est beaucoup plus complexe.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Il existe de bons hackers \u00e9thiques, souvent appel\u00e9s hackers chapeau blanc, qui peuvent aider les organisations \u00e0 identifier les faiblesses de leurs r\u00e9seaux, syst\u00e8mes ou applications. Il existe des hackers black hat qui utilisent leurs capacit\u00e9s pour des activit\u00e9s malveillantes, telles que le vol de vos informations de carte de cr\u00e9dit ou de secrets d&#039;entreprise.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Dans les films, les pirates malveillants sont g\u00e9n\u00e9ralement activement engag\u00e9s dans leurs hacks - c&#039;est-\u00e0-dire qu&#039;ils affrontent leurs ennemis en temps r\u00e9el sous nos yeux, contournent les dispositifs de s\u00e9curit\u00e9, extraient les mots de passe et ont finalement acc\u00e8s aux joyaux de la couronne de leur cible pendant que notre les h\u00e9ros tentent de les vaincre.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">La r\u00e9alit\u00e9 est g\u00e9n\u00e9ralement tr\u00e8s diff\u00e9rente et bien plus banale. Le vecteur de violation de donn\u00e9es le plus courant en 2018 \u00e9tait un e-mail de phishing, selon<a href=\"https:\/\/www.idg.com\/\"> IDG <\/a>dans son \u00e9tat de la cybercriminalit\u00e9 aux \u00c9tats-Unis en 2018, men\u00e9 en collaboration avec le magazine CSO, le CERT, les services secrets et KnowBe4.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;\u00e9tude a \u00e9galement r\u00e9v\u00e9l\u00e9 qu&#039;aucune organisation n&#039;est \u00e0 l&#039;abri. Les agences gouvernementales et les grandes entreprises ont subi en moyenne 196 \u00e9v\u00e9nements de s\u00e9curit\u00e9 par an, tandis que les petites et moyennes entreprises typiques ont \u00e9t\u00e9 confront\u00e9es \u00e0 une moyenne de 24 \u00e9v\u00e9nements par an.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Le r\u00e9sultat d&#039;une attaque r\u00e9ussie d\u00e9pend de l&#039;objectif de l&#039;attaquant. Une attaque courante consiste \u00e0 int\u00e9grer un logiciel malveillant dans un e-mail qui permet \u00e0 l&#039;attaquant de violer le p\u00e9rim\u00e8tre de s\u00e9curit\u00e9, d&#039;acc\u00e9der \u00e0 des syst\u00e8mes suppl\u00e9mentaires et de voler des donn\u00e9es client ou des identifiants de connexion. Dans ce cas, vous ne saurez peut-\u00eatre m\u00eame pas que vous avez \u00e9t\u00e9 pirat\u00e9 jusqu&#039;\u00e0 ce que vous soyez contact\u00e9 par le FBI ou la presse pour un commentaire.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">D&#039;autres attaques sont plus \u00e9videntes - tout le monde vient travailler pour d\u00e9couvrir que les donn\u00e9es de tous vos ordinateurs sont maintenant crypt\u00e9es avec un ran\u00e7ongiciel. Et votre sauvegarde de reprise apr\u00e8s sinistre en temps r\u00e9el est \u00e9galement crypt\u00e9e. Vous pouvez r\u00e9cup\u00e9rer les donn\u00e9es pour seulement $50 000 de Bitcoin, un petit prix \u00e0 payer, vous disent-ils.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Une violation de donn\u00e9es peut \u00eatre bien pire. Les estimations varient, mais plusieurs \u00e9tudes impliquant une violation de donn\u00e9es client ont des co\u00fbts pour une entreprise de taille moyenne confront\u00e9e \u00e0 une violation de quelques milliers de dossiers de clients ou d&#039;employ\u00e9s de $1,5 million \u00e0 $5,5 millions. Les co\u00fbts peuvent \u00eatre beaucoup plus \u00e9lev\u00e9s, et cela n&#039;inclut pas les dommages \u00e0 la r\u00e9putation que vous pourriez subir en raison de la violation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quels sont les exemples d&#039;attaques de phishing\u00a0?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Le phishing peut prendre plusieurs formes. L&#039;escroquerie la plus c\u00e9l\u00e8bre (inf\u00e2me ?) est un e-mail de phishing peu sophistiqu\u00e9 dans lequel l&#039;exp\u00e9diteur se fait passer pour un prince nig\u00e9rian (ou un ancien responsable des finances du gouvernement) et a simplement besoin d&#039;un compte bancaire am\u00e9ricain pour y d\u00e9poser son argent.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Cette escroquerie, sous une forme ou une autre, existe depuis plus d&#039;un si\u00e8cle, mais est devenue beaucoup plus courante avec la transition d&#039;une attaque sur papier \u00e0 une attaque par e-mail. Alors que la plupart des gens voient les e-mails pour l&#039;escroquerie ridiculement mauvaise qu&#039;ils sont, vous vous demandez peut-\u00eatre pourquoi nous les voyons toujours.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Eh bien, c&#039;est parce que, malheureusement, cela fonctionne toujours. Des millions de dollars sont vers\u00e9s aux criminels \u00e0 partir d&#039;e-mails peu sophistiqu\u00e9s qui sont si courants qu&#039;ils ont leur propre surnom : une fraude \u00ab\u00a0419\u00a0\u00bb, du nom de la section de la cat\u00e9gorie de fraude du code p\u00e9nal nig\u00e9rian.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un autre des types d&#039;attaques de phishing les plus courants est le spear phishing. Le spear phishing est une attaque cibl\u00e9e o\u00f9 le mauvais acteur cible un individu sp\u00e9cifique et rassemble des informations sur sa cible afin de cr\u00e9er un e-mail beaucoup plus cr\u00e9dible.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les m\u00e9dias sociaux sont une source principale de donn\u00e9es utilis\u00e9es dans les attaques de spear phishing. Par exemple, si vous postez sur un s\u00e9jour dans un h\u00f4tel sp\u00e9cifique, le mauvais acteur peut r\u00e9diger un e-mail de l&#039;h\u00f4tel pour vous demander de r\u00e9pondre \u00e0 une enqu\u00eate de satisfaction. Ou ils peuvent utiliser votre profil LinkedIn pour identifier que vous \u00eates un ancien \u00e9l\u00e8ve d&#039;une \u00e9cole sp\u00e9cifique, puis g\u00e9n\u00e9rer un e-mail avec un document d\u00e9crivant un \u00e9v\u00e9nement d&#039;anciens \u00e9l\u00e8ves ou une initiative de collecte de fonds.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un type d&#039;attaque de harponnage encore plus sp\u00e9cialis\u00e9 est appel\u00e9 chasse \u00e0 la baleine. La chasse \u00e0 la baleine consiste \u00e0 cibler les cadres sup\u00e9rieurs d&#039;une organisation pour faciliter le vol des informations les plus pr\u00e9cieuses de l&#039;organisation ou autoriser des transferts de fonds frauduleux. La chasse \u00e0 la baleine est souvent un effort \u00e0 long terme ax\u00e9 sur la reconnaissance pour am\u00e9liorer l&#039;efficacit\u00e9 de l&#039;attaque.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Une autre variante dont la fr\u00e9quence augmente est appel\u00e9e hame\u00e7onnage vocal ou vishing. Il existe de nombreuses variantes du vishing, du plus simple au plus complexe. \u00c0 une extr\u00e9mit\u00e9 du spectre, il y aurait un simple appel t\u00e9l\u00e9phonique pour essayer de persuader quelqu&#039;un de donner des d\u00e9tails personnels ou des informations sur le compte, comme appeler le service d&#039;assistance et lui dire que vous \u00e9tiez un utilisateur qui a perdu son mot de passe.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Une attaque plus complexe peut combiner la modification des informations d&#039;identification de l&#039;appelant, le passage d&#039;un appel et le suivi d&#039;un e-mail. Par exemple, un attaquant peut faire appara\u00eetre son num\u00e9ro de t\u00e9l\u00e9phone comme celui d&#039;un cadre sup\u00e9rieur de l&#039;entreprise, en appelant le sp\u00e9cialiste des comptes fournisseurs pour lui dire que le plus gros fournisseur de l&#039;entreprise n&#039;a pas \u00e9t\u00e9 pay\u00e9 et qu&#039;un virement bancaire est n\u00e9cessaire d\u00e8s que possible. .<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Au t\u00e9l\u00e9phone, l&#039;attaquant dit qu&#039;il obtiendra les informations pour le paiement et enverra un e-mail avec les d\u00e9tails. L&#039;attaquant encha\u00eene avec un e-mail falsifi\u00e9 \u00e0 la cible qui semble provenir de ce m\u00eame dirigeant contenant le routage et les num\u00e9ros de compte pour un virement bancaire.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;attaque est compl\u00e9t\u00e9e par un autre appel t\u00e9l\u00e9phonique qui semble provenir de l&#039;ex\u00e9cutif confirmant que le sp\u00e9cialiste AP a re\u00e7u l&#039;e-mail et les informations. Et l&#039;ex\u00e9cutif attendra en ligne pendant que le transfert est ex\u00e9cut\u00e9.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Quelle que soit l&#039;attaque, dans un monde de plus en plus num\u00e9ris\u00e9, nous sommes tous en danger. <a href=\"\/fr\/phishing-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Notre prochaine tranche<\/a> se concentrera sur la mani\u00e8re d&#039;aider vos utilisateurs \u00e0 \u00e9viter et vos syst\u00e8mes \u00e0 pr\u00e9venir, d\u00e9tecter et r\u00e9cup\u00e9rer de ces attaques. Pour plus d&#039;informations sur nos services, veuillez contacter Robert Kirtley au <a href=\"mailto:rkirtley@idsinc.com\" target=\"_blank\" rel=\"noreferrer noopener\">rkirtley@idsinc.com<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>iDiscovery Solutions est une soci\u00e9t\u00e9 de conseil strat\u00e9gique, de technologie et de services d&#039;experts - fournissant des solutions personnalis\u00e9es d&#039;eDiscovery allant de la criminalistique num\u00e9rique au t\u00e9moignage d&#039;expert pour les cabinets d&#039;avocats et les entreprises aux \u00c9tats-Unis et en Europe.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>With the first signs of summer in the air, one\u2019s thoughts may turn to fishing\u2026wait\u2026wrong blog\u2026 In this inaugural iDS cybersecurity blog post, we\u2019ll give a quick overview of phishing attacks and the damage they can cause, frequency of attacks, and some common types of phishing attacks. In the second installment, we\u2019ll concentrate primarily on [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2804,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018Gone Phishing\u2019 Blog (Part 1) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, &amp; why you should be aware them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/phishing-1\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Gone Phishing\u2019 Blog (Part 1)\" \/>\n<meta property=\"og:description\" content=\"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, &amp; why you should be aware them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/phishing-1\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-09T17:15:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T16:01:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"\u2018Gone Phishing\u2019 Blog (Part 1)\",\"datePublished\":\"2019-07-09T17:15:32+00:00\",\"dateModified\":\"2024-02-06T16:01:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\"},\"wordCount\":1107,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\",\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 1) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"datePublished\":\"2019-07-09T17:15:32+00:00\",\"dateModified\":\"2024-02-06T16:01:16+00:00\",\"description\":\"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, & why you should be aware them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Phishing attacks can be detrimental to your company. iDS discusses the types of phishing, including spear phishing, and why you should be aware them.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blog \u00ab Gone Phishing \u00bb (Partie 1) - iDiscovery Solutions","description":"Les attaques de phishing peuvent \u00eatre pr\u00e9judiciables aux entreprises. iDS aborde les types de phishing, y compris le spear phishing, et les raisons pour lesquelles vous devriez en \u00eatre conscient.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/phishing-1\/","og_locale":"fr_FR","og_type":"article","og_title":"\u2018Gone Phishing\u2019 Blog (Part 1)","og_description":"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, & why you should be aware them.","og_url":"https:\/\/idsinc.com\/fr\/phishing-1\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-07-09T17:15:32+00:00","article_modified_time":"2024-02-06T16:01:16+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Robert Kirtley","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/gone-phishing-1\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"\u2018Gone Phishing\u2019 Blog (Part 1)","datePublished":"2019-07-09T17:15:32+00:00","dateModified":"2024-02-06T16:01:16+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/"},"wordCount":1107,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/gone-phishing-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/gone-phishing-1\/","url":"https:\/\/idsinc.com\/gone-phishing-1\/","name":"Blog \u00ab Gone Phishing \u00bb (Partie 1) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","datePublished":"2019-07-09T17:15:32+00:00","dateModified":"2024-02-06T16:01:16+00:00","description":"Les attaques de phishing peuvent \u00eatre pr\u00e9judiciables aux entreprises. iDS aborde les types de phishing, y compris le spear phishing, et les raisons pour lesquelles vous devriez en \u00eatre conscient.","breadcrumb":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/gone-phishing-1\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","width":2500,"height":1250,"caption":"Phishing attacks can be detrimental to your company. iDS discusses the types of phishing, including spear phishing, and why you should be aware them."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/gone-phishing-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"\u2018Gone Phishing\u2019 Blog (Part 1)"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Robert Kirtley","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/fr\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/2801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=2801"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/2801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/2804"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=2801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=2801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=2801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}