{"id":2807,"date":"2019-09-05T09:00:28","date_gmt":"2019-09-05T15:00:28","guid":{"rendered":"https:\/\/staging2.idsinc.com\/?p=2807"},"modified":"2023-12-07T16:50:58","modified_gmt":"2023-12-07T22:50:58","slug":"phishing-2","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/gone-phishing-2\/","title":{"rendered":"Blog &#039;Gone Phishing&#039; (Partie 2)"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><a href=\"\/fr\/phishing-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dans notre article pr\u00e9c\u00e9dent<\/a>, nous avons discut\u00e9 de ce que sont les attaques de phishing, de leur fonctionnement et de l&#039;impact qu&#039;elles peuvent avoir sur vous et votre organisation. Dans cet article, nous nous concentrerons sur la mani\u00e8re de pr\u00e9venir, d\u00e9tecter et r\u00e9cup\u00e9rer des attaques de phishing gr\u00e2ce \u00e0 une formation appropri\u00e9e en cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Avec 90% de violations de donn\u00e9es provenant d&#039;une attaque de phishing, les attaquants continueront \u00e0 les lancer. Au cours du mois dernier seulement, des attaques de phishing ont entra\u00een\u00e9 la paralysie de plus d&#039;une douzaine d&#039;agences municipales et gouvernementales par des ransomwares. Il est donc essentiel que nous nous attaquions au vecteur le plus courant des attaquants.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Formation, formation, formation<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Premi\u00e8rement, la pr\u00e9vention.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Tout comme les agents immobiliers ont le mantra, &quot;emplacement, emplacement, emplacement&quot; pour les trois facteurs les plus importants d&#039;une vente immobili\u00e8re r\u00e9ussie, votre mantra lorsqu&#039;il s&#039;agit de pr\u00e9venir le phishing devrait \u00eatre &quot;formation, formation, formation&quot;.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u00catre conscient de la fa\u00e7on dont les escroqueries par e-mail de phishing sont ex\u00e9cut\u00e9es est la premi\u00e8re \u00e9tape pour les pr\u00e9venir. Tout le monde doit \u00eatre en mesure de reconna\u00eetre les indices les plus courants dans un e-mail de phishing, tels que les fautes de frappe et le fait de vous appeler &quot;Cher client&quot; dans le message d&#039;accueil. Tout le monde doit \u00e9galement comprendre que l&#039;ouverture de pi\u00e8ces jointes et le fait de cliquer sur des liens sont la cause la plus courante de compromission de ransomwares et l&#039;une des principales causes de violation de donn\u00e9es.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les organisations qui ne prennent pas au s\u00e9rieux la formation en cybers\u00e9curit\u00e9 en paient souvent le prix. Si votre programme de formation fait partie d&#039;un \u00e9v\u00e9nement annuel (ou pire, s&#039;il n&#039;est dispens\u00e9 qu&#039;une seule fois aux nouvelles recrues), il s&#039;agit d&#039;un \u00ab th\u00e9\u00e2tre de s\u00e9curit\u00e9 \u00bb : passer en revue les mouvements pour que quelqu&#039;un puisse cocher une case et dire : \u00ab Ouais, tout le monde est form\u00e9 !<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">La conviction que les nouveaux employ\u00e9s arrivent, commencent un nouvel emploi, obtiennent leur orientation, des d\u00e9tails sur leurs options d&#039;assurance maladie et des informations sur le plan 401k, remplissent leurs formulaires fiscaux, etc., ET internalisent une formation en cybers\u00e9curit\u00e9 d&#039;une heure ou moins est risible.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">De m\u00eame, le fait de faire suivre aux employ\u00e9s une journ\u00e9e de formation \u00e0 la conformit\u00e9 o\u00f9 ils se familiarisent avec le harc\u00e8lement sexuel, les directives relatives aux entretiens d&#039;embauche et \u00e0 la conformit\u00e9 de la direction, la formation \u00e0 la sant\u00e9 et \u00e0 la s\u00e9curit\u00e9, la formation \u00e0 la diversit\u00e9 et la formation de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 est \u00e9galement une approche \u00abcochez la case\u00bb de la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bien s\u00fbr, chaque employ\u00e9 signera le formulaire reconnaissant qu&#039;il a tout lu et compris. Et le lendemain, ils auront oubli\u00e9 tout ce que vous leur avez appris.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Comment changer progressivement le comportement<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Une meilleure approche consiste \u00e0 fournir de petites formations plusieurs fois au cours de l&#039;ann\u00e9e. Chaque fois, il devrait y avoir un objectif de formation limit\u00e9 ou m\u00eame unique, comme comment reconna\u00eetre les liens suspects.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;objectif est de modifier progressivement le comportement au fil du temps. Si je t&#039;apprends une seule chose que tu peux appliquer imm\u00e9diatement, il y a de meilleures chances que tu t&#039;en souviennes. Un mois plus tard, je peux t&#039;apprendre autre chose. Faire mousser, rincer et r\u00e9p\u00e9ter. Si j&#039;essaie de vous apprendre 15 choses en une heure une fois par an, vous risquez de ne vous souvenir de presque rien.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Si la formation en cybers\u00e9curit\u00e9 est essentielle, elle ne constitue pas notre seule d\u00e9fense. Il devrait y avoir plusieurs niveaux au-del\u00e0 de l\u2019am\u00e9lioration du comportement des utilisateurs. Les filtres anti-spam constituent une arme puissante contre les attaques de phishing \u00e0 grande \u00e9chelle. Ils peuvent bloquer les e-mails provenant de mauvaises sources connues afin que les utilisateurs ne soient pas aussi susceptibles d&#039;\u00eatre tent\u00e9s de faire la mauvaise chose.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En outre, l&#039;utilisation de certificats de signature d&#039;e-mails peut \u00e9galement vous donner l&#039;assurance que les exp\u00e9diteurs sont l\u00e9gitimes en leur permettant de signer num\u00e9riquement les e-mails qu&#039;ils vous envoient, vous donnant ainsi la possibilit\u00e9 de valider cette signature.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les extensions de navigateur, les modules compl\u00e9mentaires et les outils de configuration peuvent \u00eatre configur\u00e9s de mani\u00e8re \u00e0 emp\u00eacher les utilisateurs d&#039;acc\u00e9der \u00e0 la multitude de sites Web qui ont une intention malveillante lorsque les visiteurs acc\u00e8dent au site, infectant les ordinateurs avec des logiciels malveillants, par exemple en vous sugg\u00e9rant d&#039;effectuer une &quot;analyse de s\u00e9curit\u00e9&quot; de votre ordinateur qui peut en fait simplement installer des logiciels malveillants.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Une autre chose cruciale sur laquelle se concentrer est l&#039;application des correctifs et des mises \u00e0 jour en temps opportun. Nous nous souvenons tous de l&#039;attaque mondiale du ransomware WannaCry en mai 2017. Elle a d\u00e9sactiv\u00e9 plus de 200 000 syst\u00e8mes dans 150 pays, avec des estimations de dommages allant de quelques dizaines de millions \u00e0 potentiellement des milliards de dollars. Et c&#039;\u00e9tait deux mois APR\u00c8S que Microsoft ait publi\u00e9 un correctif qui aurait pu emp\u00eacher l&#039;\u00e9pid\u00e9mie.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un bon processus d&#039;\u00e9valuation, de test, puis de d\u00e9ploiement de correctifs et de mises \u00e0 jour est une \u00e9tape tr\u00e8s basique, mais essentielle pour disposer d&#039;un environnement s\u00e9curis\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-good-backups-are-critical\">Pourquoi de bonnes sauvegardes sont essentielles<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Enfin, je m&#039;en voudrais de ne pas afficher les sauvegardes. Bien que de bonnes sauvegardes n&#039;emp\u00eachent aucune sorte de compromis ou de violation de donn\u00e9es, elles constituent un outil essentiel dans votre arsenal pour minimiser les dommages. En cas de compromission, de bonnes sauvegardes permettront \u00e0 votre organisation de se r\u00e9tablir rapidement et de reprendre ses activit\u00e9s.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Votre processus de sauvegarde et de restauration doit \u00eatre r\u00e9guli\u00e8rement mis \u00e0 jour pour refl\u00e9ter votre environnement mat\u00e9riel et, surtout, test\u00e9. Si la premi\u00e8re fois que vous &quot;testez&quot; votre processus de restauration, c&#039;est apr\u00e8s un compromis, je peux presque garantir que vous d\u00e9couvrirez un petit d\u00e9tail que vous avez manqu\u00e9 lors de la conception du processus et qui n&#039;est pas \u00e9vident tant que vous ne r\u00e9alisez pas que votre environnement et les donn\u00e9es ne peuvent pas \u00eatre r\u00e9cup\u00e9r\u00e9s.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>iDiscovery Solutions est une soci\u00e9t\u00e9 de conseil strat\u00e9gique, de technologie et de services d&#039;experts - fournissant des solutions personnalis\u00e9es d&#039;eDiscovery allant de la criminalistique num\u00e9rique au t\u00e9moignage d&#039;expert pour les cabinets d&#039;avocats et les entreprises aux \u00c9tats-Unis et en Europe.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>In our prior post, we discussed what phishing attacks are, how they work, and the impact they can have on you and your organization. In this installment, we\u2019ll focus on how to prevent, detect, and recover from phishing attacks with proper cybersecurity training. With 90% of data breaches originating with a phishing attack, attackers will [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2805,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"90% of data breaches start with phishing attacks. Learn to prevent, detect, &amp; recover from these attacks with proper cybersecurity training.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/phishing-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Gone Phishing\u2019 Blog (Part 2)\" \/>\n<meta property=\"og:description\" content=\"90% of data breaches start with phishing attacks. Learn to prevent, detect, &amp; recover from these attacks with proper cybersecurity training.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/phishing-2\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T15:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T22:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2-1024x512.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"\u2018Gone Phishing\u2019 Blog (Part 2)\",\"datePublished\":\"2019-09-05T15:00:28+00:00\",\"dateModified\":\"2023-12-07T22:50:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"},\"wordCount\":872,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\",\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"datePublished\":\"2019-09-05T15:00:28+00:00\",\"dateModified\":\"2023-12-07T22:50:58+00:00\",\"description\":\"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blog \u00ab Gone Phishing \u00bb (Partie 2) - iDiscovery Solutions","description":"90% des violations de donn\u00e9es commencent par des attaques de phishing. Apprenez \u00e0 pr\u00e9venir, d\u00e9tecter et r\u00e9cup\u00e9rer de ces attaques gr\u00e2ce \u00e0 une formation appropri\u00e9e en cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/phishing-2\/","og_locale":"fr_FR","og_type":"article","og_title":"\u2018Gone Phishing\u2019 Blog (Part 2)","og_description":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.","og_url":"https:\/\/idsinc.com\/fr\/phishing-2\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-09-05T15:00:28+00:00","article_modified_time":"2023-12-07T22:50:58+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2-1024x512.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Robert Kirtley","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"\u2018Gone Phishing\u2019 Blog (Part 2)","datePublished":"2019-09-05T15:00:28+00:00","dateModified":"2023-12-07T22:50:58+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/"},"wordCount":872,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/gone-phishing-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/gone-phishing-2\/","url":"https:\/\/idsinc.com\/gone-phishing-2\/","name":"Blog \u00ab Gone Phishing \u00bb (Partie 2) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","datePublished":"2019-09-05T15:00:28+00:00","dateModified":"2023-12-07T22:50:58+00:00","description":"90% des violations de donn\u00e9es commencent par des attaques de phishing. Apprenez \u00e0 pr\u00e9venir, d\u00e9tecter et r\u00e9cup\u00e9rer de ces attaques gr\u00e2ce \u00e0 une formation appropri\u00e9e en cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/gone-phishing-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","width":2500,"height":1250,"caption":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"\u2018Gone Phishing\u2019 Blog (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Robert Kirtley","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/fr\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/2807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=2807"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/2807\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/2805"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=2807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=2807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=2807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}