{"id":3551,"date":"2019-06-07T09:00:00","date_gmt":"2019-06-07T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3551"},"modified":"2022-04-12T14:34:17","modified_gmt":"2022-04-12T20:34:17","slug":"la-meilleure-defense-des-employes","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/employees-best-defense\/","title":{"rendered":"Employ\u00e9s : maillon faible ou meilleure d\u00e9fense ?"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3551\" data-postid=\"3551\" class=\"themify_builder_content themify_builder_content-3551 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">Nous entendons souvent ce morceau de sagesse conventionnelle\u00a0: &quot;Les employ\u00e9s sont le &#039;maillon le plus faible&#039; de la cha\u00eene de cyberd\u00e9fense.&quot; On comprend pourquoi on le dit. Heck, nous avons \u00e9t\u00e9 coupables de le dire nous-m\u00eames.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Et les faits semblent le prouver. Selon <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-62\/Accenture-2017CostCybercrime-US-FINAL.pdf#zoom=50\" target=\"_blank\" rel=\"noreferrer noopener\">le rapport 2017 du Ponemon Institute sur le co\u00fbt de la cybercriminalit\u00e9<\/a>, &quot;Soixante-neuf pour cent des entreprises ont subi des attaques de phishing et d&#039;ing\u00e9nierie sociale&quot; en 2017, en baisse de seulement 1% par rapport \u00e0 2016.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Le phishing, l&#039;ing\u00e9nierie sociale et les attaques d&#039;initi\u00e9s co\u00fbtent chacun en moyenne $2,7M aux entreprises am\u00e9ricaines, d\u00e9passant le co\u00fbt des logiciels malveillants ($2,4M) et du d\u00e9ni de service ($1,6M). Compte tenu de la pr\u00e9valence et du co\u00fbt des attaques centr\u00e9es sur les employ\u00e9s, il est compr\u00e9hensible que nous pensions que nos employ\u00e9s sont le maillon faible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Pourquoi les mots sont importants<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Malheureusement, lorsque nous nous permettons d&#039;adopter cet \u00e9tat d&#039;esprit, o\u00f9 les employ\u00e9s sont des \u00ab risques \u00bb qui doivent \u00eatre \u00ab att\u00e9nu\u00e9s \u00bb, nous cr\u00e9ons une relation conflictuelle entre nous et notre communaut\u00e9 tout en rejetant l&#039;une de nos meilleures chances de nous d\u00e9fendre.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On pourrait dire que nous discutons simplement de s\u00e9mantique, que nous disons vraiment la m\u00eame chose et que nous utilisons simplement des mots diff\u00e9rents. Nous l&#039;admettons, il y a une part de v\u00e9rit\u00e9 dans les mots, mais nous croyons que les mots comptent. Ils comptent parce que les mots pr\u00e9parent le terrain pour notre \u00e9tat d&#039;esprit et la fa\u00e7on dont nous interagissons avec le monde. Non seulement cela, mais ils diffusent au monde ce que nous pensons et comment nous le pensons.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les mots que nous utilisons projettent notre attitude, et cette attitude peut dynamiser et motiver, ou elle peut ali\u00e9ner et d\u00e9moraliser. Prenez un employ\u00e9 hypoth\u00e9tique - Joe de la comptabilit\u00e9. C&#039;est un employ\u00e9 mod\u00e8le; s\u00e9rieux, honn\u00eate et travailleur. C&#039;est un excellent comptable, mais il n&#039;est pas si dou\u00e9 pour la technologie, ce qui est bien, car ce n&#039;est pas son travail d&#039;\u00eatre dou\u00e9 pour la technologie.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Joe est une cible de choix pour le phishing et la compromission des e-mails professionnels. Nous pouvons aborder Joe comme un risque qui doit \u00eatre att\u00e9nu\u00e9, ce qui semble raisonnable et appropri\u00e9. Mais si notre \u00e9tat d&#039;esprit est que Joe lui-m\u00eame est le probl\u00e8me, notre communication verbale et non verbale avec lui et ses coll\u00e8gues le transmettra.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Nous finirons par perdre le c\u0153ur de Joe et probablement le c\u0153ur de ses coll\u00e8gues. La communaut\u00e9 d\u00e9veloppera un mauvais go\u00fbt pour l&#039;\u00e9quipe de s\u00e9curit\u00e9 et partira en pensant que nous sommes condescendants, trop impressionn\u00e9s par notre propre importance et que nous voyons tout le monde comme &quot;le probl\u00e8me&quot;.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Abordez les employ\u00e9s comme des partenaires<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Mais que se passerait-il si au lieu d&#039;aborder Joe comme un probl\u00e8me, nous l&#039;abordions lui et ses coll\u00e8gues comme des partenaires\u00a0? Cela nous permet non seulement d&#039;att\u00e9nuer le risque imm\u00e9diat, qui est r\u00e9el, mais nous donne \u00e9galement l&#039;opportunit\u00e9 de cr\u00e9er un multiplicateur de force. Approcher nos employ\u00e9s comme notre meilleure chance de cr\u00e9er un environnement s\u00e9curis\u00e9 oblige \u00e0 modifier le paysage de s\u00e9curit\u00e9 de l&#039;ensemble de l&#039;organisation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u00c0 un certain niveau, tout le monde devient membre de l&#039;\u00e9quipe de s\u00e9curit\u00e9. Tout le monde se pose des questions et est conscient du risque. Les e-mails suspects sont suppos\u00e9s \u00eatre malveillants plut\u00f4t qu&#039;innocents, les ordinateurs sont verrouill\u00e9s lorsque les employ\u00e9s quittent leur bureau et les badges sont gliss\u00e9s lorsqu&#039;ils p\u00e9n\u00e8trent dans des zones s\u00e9curis\u00e9es.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">L&#039;une des meilleures questions de s\u00e9curit\u00e9 que nous ayons jamais pos\u00e9es a \u00e9t\u00e9 pos\u00e9e par le chef de la police du comt\u00e9 de Fairfax, en Virginie. Il a demand\u00e9 \u00e0 notre cohorte de dipl\u00f4m\u00e9s\u00a0: &quot;Qui maintient la loi et l&#039;ordre dans le comt\u00e9 de Fairfax\u00a0?&quot; Imaginez maintenant une salle pleine de cyber et de geeks politiques r\u00e9pondant \u00e0 cette question. La conversation a \u00e9t\u00e9 dynamique et enthousiaste, et nos r\u00e9ponses ont \u00e9t\u00e9 partout.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Lorsque personne n&#039;a fourni de r\u00e9ponse ad\u00e9quate, il nous a dit: \u00abVous le faites. Chacun d&#039;entre vous quand vous vous levez le matin et participez \u00e0 notre communaut\u00e9. Je suis ici pour les exceptions\u00a0; vous \u00eates responsable de la loi et de l&#039;ordre quotidiens.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Il nous disait que chacun de nous faisait partie de son \u00e9quipe de s\u00e9curit\u00e9. Que nous sommes tous responsables de la s\u00e9curit\u00e9 de notre environnement. Qu&#039;en fermant nos maisons et nos voitures, nous participons \u00e0 la s\u00e9curisation de la communaut\u00e9. En \u00e9tant vigilant et en reconnaissant le danger avant qu&#039;il ne frappe, nous participons \u00e0 la s\u00e9curisation de notre communaut\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-mindset-change-is-needed\"><strong>Un changement de mentalit\u00e9 est n\u00e9cessaire<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Nous croyons que la m\u00eame chose est vraie dans le cyber. Nous ne pouvons pas le faire seuls; nous avons besoin que toute la communaut\u00e9 que nous servons soit \u00e9veill\u00e9e et alerte. Dans le monde physique, nous avons perfectionn\u00e9 ces comp\u00e9tences au cours de d\u00e9cennies (ou plus) de vie. Dans le monde cybern\u00e9tique, beaucoup d&#039;entre nous n&#039;ont pas appris ou appris ces comp\u00e9tences. C&#039;est \u00e0 nous, experts en s\u00e9curit\u00e9 et en cybers\u00e9curit\u00e9, d&#039;aider nos collaborateurs \u00e0 acqu\u00e9rir et \u00e0 d\u00e9velopper ces comp\u00e9tences.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En fin de compte, traiter les employ\u00e9s comme des probl\u00e8mes sape la culture que nous essayons de favoriser. Les employ\u00e9s ne sont pas notre maillon le plus faible; ils repr\u00e9sentent notre meilleure chance pour un avenir s\u00fbr. Si nous leur demandons de changer leur \u00e9tat d&#039;esprit pour int\u00e9grer la cybers\u00e9curit\u00e9, il est juste que nous soyons pr\u00eats \u00e0 rendre la pareille. Nous devons changer notre \u00e9tat d&#039;esprit pour les voir comme des partenaires et des d\u00e9fenseurs, et non comme des probl\u00e8mes et des risques.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif - \u00e0 la fois dans et hors de la salle d&#039;audience. Nos experts en la mati\u00e8re et nos strat\u00e8ges de donn\u00e9es se sp\u00e9cialisent dans la recherche de solutions aux probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un handicap.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>We hear this piece of conventional wisdom quite a bit: \u201cEmployees are the \u2018weakest link\u2019 in the cyber defense chain.\u201d We understand why we say it. Heck, we\u2019ve been guilty of saying it ourselves. And the facts seem to back it up. According to the Ponemon Institute\u2019s 2017 Cost of Cybercrime report, \u201cSixty-nine percent of [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3553,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Employees: Weakest Link Or Best Defense? - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/la-meilleure-defense-des-employes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees: Weakest Link Or Best Defense?\" \/>\n<meta property=\"og:description\" content=\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/la-meilleure-defense-des-employes\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-07T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-12T20:34:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Employees: Weakest Link Or Best Defense?\",\"datePublished\":\"2019-06-07T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:34:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"},\"wordCount\":893,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\",\"name\":\"Employees: Weakest Link Or Best Defense? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"datePublished\":\"2019-06-07T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:34:17+00:00\",\"description\":\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Employees: Weakest Link Or Best Defense?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Employ\u00e9s : maillon faible ou meilleure d\u00e9fense ? - Solutions iDiscovery","description":"Les employ\u00e9s repr\u00e9sentent notre meilleure chance en mati\u00e8re de cybers\u00e9curit\u00e9. D\u00e9couvrez pourquoi il est temps de les consid\u00e9rer comme une \u00e9quipe de s\u00e9curit\u00e9 et non comme des risques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/la-meilleure-defense-des-employes\/","og_locale":"fr_FR","og_type":"article","og_title":"Employees: Weakest Link Or Best Defense?","og_description":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.","og_url":"https:\/\/idsinc.com\/fr\/la-meilleure-defense-des-employes\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-06-07T15:00:00+00:00","article_modified_time":"2022-04-12T20:34:17+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"iDiscovery Solutions","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/employees-best-defense\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Employees: Weakest Link Or Best Defense?","datePublished":"2019-06-07T15:00:00+00:00","dateModified":"2022-04-12T20:34:17+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/"},"wordCount":893,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/employees-best-defense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/employees-best-defense\/","url":"https:\/\/idsinc.com\/employees-best-defense\/","name":"Employ\u00e9s : maillon faible ou meilleure d\u00e9fense ? - Solutions iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","datePublished":"2019-06-07T15:00:00+00:00","dateModified":"2022-04-12T20:34:17+00:00","description":"Les employ\u00e9s repr\u00e9sentent notre meilleure chance en mati\u00e8re de cybers\u00e9curit\u00e9. D\u00e9couvrez pourquoi il est temps de les consid\u00e9rer comme une \u00e9quipe de s\u00e9curit\u00e9 et non comme des risques.","breadcrumb":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/employees-best-defense\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","width":2500,"height":1250,"caption":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/employees-best-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Employees: Weakest Link Or Best Defense?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Solutions d&#039;iD\u00e9couverte","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/fr\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=3551"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/3553"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=3551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=3551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=3551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}