{"id":3076,"date":"2020-01-10T10:00:47","date_gmt":"2020-01-10T09:00:47","guid":{"rendered":"https:\/\/curtispc.fr\/blog\/?p=3076"},"modified":"2020-03-23T00:55:28","modified_gmt":"2020-03-22T23:55:28","slug":"comment-proteger-vos-employes-contre-les-pirates-informatiques","status":"publish","type":"post","link":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/","title":{"rendered":"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3076\" class=\"elementor elementor-3076\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-37df578 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37df578\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6df833a\" data-id=\"6df833a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d420c51 elementor-widget elementor-widget-text-editor\" data-id=\"d420c51\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00cates-vous \u00e0 la recherche de m\u00e9thodes pour prot\u00e9ger vos employ\u00e9s des cybercriminels? Ne cherchez plus, voici des techniques essentielles que vous pouvez utiliser pour prot\u00e9ger vos employ\u00e9s en ligne et prot\u00e9ger votre entreprise enti\u00e8re contre les\u00a0<a href=\"https:\/\/curtispc.fr\/cyberattaques.html\"><strong>pirates informatiques<\/strong><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c3390 elementor-widget elementor-widget-post-info\" data-id=\"c1c3390\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-87450e9 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&amp;d=monsterid&amp;r=g\" alt=\"Picture of curtispc\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Publi\u00e9 par<\/span>\n\t\t\t\t\t\t\t\t\t\tcurtispc\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-753aac4 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/2020\/01\/10\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>10\/01\/2020<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a085001 elementor-inline-item\" itemprop=\"commentCount\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#comments\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-comments\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-comments\">\n\t\t\t\t\t\t\t\t\t\tOne Comment\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-0584449 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t <div class=\"post-views content-post post-3076 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Vues:<\/span> <span class=\"post-views-count\">3\u00a0079<\/span>\r\n\t\t\t<\/div>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-c6f8296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6f8296\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ecd007\" data-id=\"8ecd007\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50b8143 elementor-widget elementor-widget-image\" data-id=\"50b8143\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/elementor\/thumbs\/protection-de-donnees-pei1mar6daw99xs0srus2kzvyegcmyb9cifuwrzivc.png\" title=\"protection-de-donnees\" alt=\"protection de donnees\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2925d47 elementor-widget elementor-widget-spacer\" data-id=\"2925d47\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afb1a63 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"afb1a63\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/curtispc.fr\/cyberattaques.html\">Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-604a418 elementor-widget elementor-widget-spacer\" data-id=\"604a418\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-f720425 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f720425\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f606099\" data-id=\"f606099\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c023ec elementor-widget elementor-widget-spacer\" data-id=\"2c023ec\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e3ed41 elementor-widget elementor-widget-text-editor\" data-id=\"0e3ed41\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aujourd\u2019hui, les entreprises sont devenues plus sophistiqu\u00e9es en ce sens qu\u2019il devient extr\u00eamement difficile d\u2019emp\u00eacher les failles en mati\u00e8re de cybers\u00e9curit\u00e9. Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.<\/p><p>\u00a0<\/p><p>Les entreprises peuvent mettre en place des affiches de sensibilisation \u00e0 la s\u00e9curit\u00e9 aux quatre coins du bureau pour rappeler que l\u2019int\u00e9grit\u00e9 des donn\u00e9es est une priorit\u00e9 absolue et que le r\u00f4le de chaque employ\u00e9 est de la prot\u00e9ger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-baad559 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"baad559\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-59959e3\" data-id=\"59959e3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90e4bce elementor-widget elementor-widget-spacer\" data-id=\"90e4bce\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d75a263 elementor-widget elementor-widget-text-editor\" data-id=\"d75a263\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>1. \u00c9duquez vos employ\u00e9s<span id=\"1_Eduquez_vos_employes\" class=\"ez-toc-section\"><\/span><\/h2><p>Sensibiliser vos employ\u00e9s \u00e0 la cybers\u00e9curit\u00e9 est essentiel pour les prot\u00e9ger en ligne. Cela n\u00e9cessite plus d\u2019un briefing mais des rappels assez r\u00e9guliers, tels que l\u2019affichage d\u2019affiches de sensibilisation \u00e0 la s\u00e9curit\u00e9 dans des sections sp\u00e9cifiques des bureaux. Il est courant que les employ\u00e9s s\u2019acquittent de leurs t\u00e2ches au point d\u2019oublier les dangers de la cybercriminalit\u00e9.<\/p><p>\u00a0<\/p><p>Vous pouvez faire de la cybers\u00e9curit\u00e9 une conversation r\u00e9guli\u00e8re au bureau qui serve de rappel. Lors des r\u00e9unions du conseil, vous pouvez \u00e9galement former votre personnel \u00e0 l\u2019essentiel de la protection des donn\u00e9es de la soci\u00e9t\u00e9 sur Internet. La surveillance, qui est une formation informatique sur la cybers\u00e9curit\u00e9, peut \u00eatre la meilleure solution pour vos employ\u00e9s, quelle que soit la taille de votre entreprise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cddebad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cddebad\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bda725\" data-id=\"7bda725\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec65cf9 elementor-widget elementor-widget-spacer\" data-id=\"ec65cf9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-494fb9f elementor-widget elementor-widget-text-editor\" data-id=\"494fb9f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>2. Renseignez vos employ\u00e9s sur les recherches \u00e0 effectuer sur Internet<span id=\"2_Renseignez_vos_employes_sur_les_recherches_a_effectuer_sur_Internet\" class=\"ez-toc-section\"><\/span><\/h2><p>Plus souvent, les employ\u00e9s recevront des courriels demandant des informations sensibles sur l\u2019organisation. Ce sont des activit\u00e9s de\u00a0<strong>phishing<\/strong>\u00a0qui n\u00e9cessitent que votre personnel se connecte, ce qui permet aux pirates de saisir des mots de passe et noms d\u2019utilisateur en plus d\u2019autres informations essentielles.<\/p><div class=\"code-block code-block-2\">\u00a0<\/div><p>De telles techniques peuvent \u00eatre dangereuses pour les ordinateurs de la soci\u00e9t\u00e9 car elles peuvent transmettre des virus, des chevaux de Troie et des r\u00e9seaux de zombies. La direction est donc cens\u00e9e mettre en place un syst\u00e8me d\u2019apprentissage dans lequel les employ\u00e9s apprennent \u00e0:<\/p><p>\u00a0<\/p><ul><li>D\u00e9tecter les fausses URL<\/li><li>\u00catre conscient de l\u2019ing\u00e9nierie sociale<\/li><li>Scanners et imprimantes s\u00e9curis\u00e9s<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2e50ca7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e50ca7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a01c0e\" data-id=\"0a01c0e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e27fc98 elementor-widget elementor-widget-spacer\" data-id=\"e27fc98\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aaedd0 elementor-widget elementor-widget-text-editor\" data-id=\"6aaedd0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>3. Utilisez des mots de passe vari\u00e9s et \u00e9troits pour s\u00e9curiser vos comptes<span id=\"3_Utilisez_des_mots_de_passe_varies_et_etroits_pour_securiser_vos_comptes\" class=\"ez-toc-section\"><\/span><\/h2><p>Dans le pass\u00e9 r\u00e9cent, le besoin de s\u00e9curiser les mots de passe pour les comptes a consid\u00e9rablement augment\u00e9. L\u2019utilisation de mots de passe simples et courants a permis aux pirates informatiques d\u2019acc\u00e9der ill\u00e9galement \u00e0 des comptes d\u2019entreprise. Pour s\u00e9curiser le mot de passe d\u2019un compte, proc\u00e9dez comme suit pour cr\u00e9er un mot de passe s\u00e9curis\u00e9:<\/p><p>\u00a0<\/p><ul><li>Cr\u00e9ez des mots de passe diff\u00e9rents pour des comptes vari\u00e9s<\/li><li>Les mots de passe les plus longs sont les meilleurs<\/li><li>\u00c9vitez de sauvegarder votre mot de passe dans vos moteurs de recherche et vos navigateurs.<\/li><li>\u00c9vitez d\u2019utiliser des num\u00e9ros associ\u00e9s \u00e0 des donn\u00e9es personnelles comme mots de passe.<\/li><\/ul><p>Vous pouvez \u00e9galement utiliser le v\u00e9rificateur de mot de passe de Kaspersky pour confirmer la force de votre mot de passe.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-6a61ffc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a61ffc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-137ff31\" data-id=\"137ff31\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8250ee elementor-widget elementor-widget-spacer\" data-id=\"f8250ee\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2ea239 elementor-widget elementor-widget-text-editor\" data-id=\"b2ea239\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>4. Prot\u00e9ger les informations des clients<span id=\"4_Proteger_les_informations_des_clients\" class=\"ez-toc-section\"><\/span><\/h2><p>M\u00eame si l\u2019information de vos employ\u00e9s est cruciale, il en va de m\u00eame pour la confidentialit\u00e9 des informations obtenues de vos clients. C\u2019est le r\u00f4le de vos employ\u00e9s de prot\u00e9ger la vie priv\u00e9e de vos clients. Les employ\u00e9s peuvent y parvenir en stockant et en prot\u00e9geant les informations associ\u00e9es aux clients, telles que les adresses, noms, num\u00e9ros de t\u00e9l\u00e9phone, informations de carte de cr\u00e9dit, adresses \u00e9lectroniques et opinions personnelles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fae58a elementor-widget elementor-widget-spacer\" data-id=\"9fae58a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e84bc3 elementor-widget elementor-widget-penci-text-block\" data-id=\"0e84bc3\" data-element_type=\"widget\" data-widget_type=\"penci-text-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"penci-block-vc penci-text-editor\">\n\t\t\t        <div class=\"penci-border-arrow penci-homepage-title penci-home-latest-posts style-11 pcalign-center pciconp-right pcicon-right block-title-icon-left\">\n            <h3 class=\"inner-arrow\">\n                <span>\n                    <a href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">\u00c0 lire aussi\u00a0<\/a>                <\/span>\n            <\/h3>\n\t\t\t        <\/div>\n\t\t\t\t\t<div class=\"penci-block_content\">\n\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><a href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><span class=\"postTitle\">Top 10 des hackers les plus c\u00e9l\u00e8bres et leurs histoires<\/span><\/a><\/p><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-42a9016 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42a9016\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49e4f0c\" data-id=\"49e4f0c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f9a3f3 elementor-widget elementor-widget-spacer\" data-id=\"4f9a3f3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a114e69 elementor-widget elementor-widget-text-editor\" data-id=\"a114e69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>5. Installer des logiciels de s\u00e9curit\u00e9<span id=\"5_Installer_des_logiciels_de_securite\" class=\"ez-toc-section\"><\/span><\/h2>\n<p>Les organisations peuvent offrir une exp\u00e9rience Internet sans piratage via l\u2019installation de logiciels de s\u00e9curit\u00e9 tels que des pare-feu, des filtres anti-spam, des antivirus et des anti-logiciels espions. Ces outils de s\u00e9curit\u00e9 prot\u00e8gent vos donn\u00e9es des pirates informatiques. Cependant, dans ce monde num\u00e9rique, certains de ces syst\u00e8mes de s\u00e9curit\u00e9 ont \u00e9t\u00e9 mis au d\u00e9fi. Les entreprises doivent investir massivement dans des couches de super s\u00e9curit\u00e9 alternatives telles que:<\/p><p><br><\/p>\n<ul>\n<li>P\u00e9rim\u00e8tre d\u00e9fini par logiciel<\/li>\n<li><a href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\">Utilisation du VPN professionnel<\/a><\/li>\n<\/ul>\n<p>Ces outils sont d\u2019excellentes fonctionnalit\u00e9s de s\u00e9curit\u00e9 car ils sont con\u00e7us avec une int\u00e9gration API unique et une architecture cloud centralis\u00e9e qui leur permet de prot\u00e9ger toutes les donn\u00e9es de la soci\u00e9t\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-6ebb205 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ebb205\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2abe0d1\" data-id=\"2abe0d1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b1fd99 elementor-widget elementor-widget-spacer\" data-id=\"0b1fd99\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e287ef elementor-widget elementor-widget-text-editor\" data-id=\"3e287ef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Conclusion<span id=\"Conclusion\" class=\"ez-toc-section\"><\/span><\/h2><p>Les employ\u00e9s sont susceptibles d\u2019exposer les informations sensibles de la soci\u00e9t\u00e9. Chaque organisation doit s\u2019assurer qu\u2019il existe un m\u00e9canisme efficace pour assurer la s\u00e9curit\u00e9 des employ\u00e9s au travail.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-9123b58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9123b58\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1c7647\" data-id=\"c1c7647\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81c49dd elementor-widget elementor-widget-spacer\" data-id=\"81c49dd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-6824576 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6824576\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb26da7\" data-id=\"bb26da7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ec5dd4 elementor-widget elementor-widget-spacer\" data-id=\"7ec5dd4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c740f61 elementor-widget elementor-widget-penci-text-block\" data-id=\"c740f61\" data-element_type=\"widget\" data-widget_type=\"penci-text-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"penci-block-vc penci-text-editor\">\n\t\t\t        <div class=\"penci-border-arrow penci-homepage-title penci-home-latest-posts style-7 pcalign-left pciconp-right pcicon-right block-title-icon-left\">\n            <h3 class=\"inner-arrow\">\n                <span>\n                    <span>PARTAGER CET ARTICLE<\/a>                <\/span>\n            <\/h3>\n\t\t\t        <\/div>\n\t\t\t\t\t<div class=\"penci-block_content\">\n\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f0e0d0 elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--align-center elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"0f0e0d0\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-82d7e6c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82d7e6c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a53f34f\" data-id=\"a53f34f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64aef9c elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"64aef9c\" data-element_type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/windows-7-cest-fini-comment-migrer-gratuitement-vers-windows-10\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-chevron-circle-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Pr\u00e9c\u00e9dent<\/span><span class=\"post-navigation__prev--title\">Windows 7, c\u2019est fini : comment migrer gratuitement vers Windows 10<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Suivant<\/span><span class=\"post-navigation__next--title\">D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><i class=\"fa fa-chevron-circle-right\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50f7d18 elementor-widget elementor-widget-spacer\" data-id=\"50f7d18\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-848085d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848085d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0e263\" data-id=\"cf0e263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c34b0 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"50c34b0\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double&quot;,&quot;highlighted_text&quot;:&quot;Articles Similaires&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Articles Similaires<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc543e elementor-widget elementor-widget-spacer\" data-id=\"2fc543e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2932f20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2932f20\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a0b773\" data-id=\"6a0b773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d2fd96 elementor-widget elementor-widget-penci-featured-sliders\" data-id=\"9d2fd96\" data-element_type=\"widget\" data-widget_type=\"penci-featured-sliders.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"penci-block-el featured-area featured-style-23\"><div class=\"penci-owl-featured-area elsl-style-23 swiper penci-owl-carousel pcfg-slide-9d2fd96 elsl-style-23\" data-dots=\"false\" data-nav=\"true\" data-ceffect=\"swing\" data-seffect=\"creative\" data-style=\"style-23\" data-auto=\"true\" data-autotime=\"4000\" data-speed=\"600\" data-loop=\"true\"><div class=\"penci-owl-nav\"><div class=\"owl-prev\"><i class=\"penciicon-left-chevron\"><\/i><\/div><div class=\"owl-next\"><i class=\"penciicon-right-chevron\"><\/i><\/div><\/div><div class=\"swiper-wrapper\">    <div class=\"item swiper-slide\">\n        <div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"\n                           title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\">La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-06-06T09:10:40+02:00\">6 juin 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"\n                           title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-06-14T10:00:34+02:00\">14 juin 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x439.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"\n                           title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x383.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"\n                           title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\">S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"\n                           title=\"Messagerie S\u00e9curis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Messagerie S\u00e9curis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Messagerie S\u00e9curis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\">Messagerie S\u00e9curis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x401.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"\n                           title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\">R\u00e9seaux sociaux, source de piratage informatique\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x329.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"\n                           title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\">Cloud : donn\u00e9 hors de contr\u00f4le\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-25T10:00:37+01:00\">25 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"\n                           title=\"Shadow IoT: une menace grandissante pour les entreprises\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\">Shadow IoT: une menace grandissante pour les entreprises<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-24T09:00:16+01:00\">24 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"\n                           title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"\n                           title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\">\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"\n                           title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\">Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"\n                           title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\">Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x366.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"\n                           title=\"Mise en garde contre les menaces qui existent sur le web\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Mise en garde contre les menaces qui existent sur le web\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Mise en garde contre les menaces qui existent sur le web\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\">Mise en garde contre les menaces qui existent sur le web<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-18T16:00:13+01:00\">18 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"\n                           title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\">Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-15T10:00:09+01:00\">15 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"\n                           title=\"Authentification par mot de passe\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Authentification par mot de passe\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Authentification par mot de passe\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\">Authentification par mot de passe<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/pirate_informatique-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/pirate_informatique-585x322.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\"\n                           title=\"Piratage informatique des PME et ETI\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Piratage informatique des PME et ETI\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Piratage informatique des PME et ETI\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\">Piratage informatique des PME et ETI<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"\n                           title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\">D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"\n                           title=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\">Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t        <\/div>\n    <\/div>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb4006e elementor-widget elementor-widget-spacer\" data-id=\"eb4006e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cc2256e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc2256e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d5c9c\" data-id=\"70d5c9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f9d352 elementor-widget elementor-widget-spacer\" data-id=\"9f9d352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00cates-vous \u00e0 la recherche de m\u00e9thodes pour prot\u00e9ger vos employ\u00e9s des cybercriminels? Ne cherchez plus, voici des techniques essentielles que vous pouvez utiliser pour prot\u00e9ger vos employ\u00e9s en ligne et&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3088,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[28],"tags":[46,50,49,47],"class_list":["post-3076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","tag-cyber-securite","tag-linux","tag-mac","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?<\/title>\n<meta name=\"description\" content=\"Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\" \/>\n<meta property=\"og:description\" content=\"Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | Curtis PC 2025\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-10T09:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-22T23:55:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"curtispc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@curtispcfr\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"curtispc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\",\"url\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\",\"name\":\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\",\"isPartOf\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg\",\"datePublished\":\"2020-01-10T09:00:47+00:00\",\"dateModified\":\"2020-03-22T23:55:28+00:00\",\"author\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\"},\"description\":\"Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.\",\"breadcrumb\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#primaryimage\",\"url\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg\",\"contentUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg\",\"width\":1280,\"height\":854,\"caption\":\"protection employe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/curtispc.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\",\"url\":\"https:\/\/curtispc.fr\/blog\/\",\"name\":\"Blog | Curtis PC 2025\",\"description\":\"Pour une vie num\u00e9rique plus simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/curtispc.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\",\"name\":\"curtispc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"caption\":\"curtispc\"},\"sameAs\":[\"https:\/\/www.curtispc.fr\/\",\"https:\/\/x.com\/curtispcfr\"],\"url\":\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?","description":"Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?","og_description":"Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.","og_url":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/","og_site_name":"Blog | Curtis PC 2025","article_published_time":"2020-01-10T09:00:47+00:00","article_modified_time":"2020-03-22T23:55:28+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg","type":"image\/jpeg"}],"author":"curtispc","twitter_card":"summary_large_image","twitter_creator":"@curtispcfr","twitter_misc":{"\u00c9crit par":"curtispc","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/","url":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/","name":"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?","isPartOf":{"@id":"https:\/\/curtispc.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#primaryimage"},"image":{"@id":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#primaryimage"},"thumbnailUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg","datePublished":"2020-01-10T09:00:47+00:00","dateModified":"2020-03-22T23:55:28+00:00","author":{"@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653"},"description":"Il convient de noter que les entreprises doivent comprendre le r\u00f4le de chaque employ\u00e9 dans la gestion des donn\u00e9es de l\u2019entreprise.","breadcrumb":{"@id":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#primaryimage","url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg","contentUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe.jpg","width":1280,"height":854,"caption":"protection employe"},{"@type":"BreadcrumbList","@id":"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/curtispc.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?"}]},{"@type":"WebSite","@id":"https:\/\/curtispc.fr\/blog\/#website","url":"https:\/\/curtispc.fr\/blog\/","name":"Blog | Curtis PC 2025","description":"Pour une vie num\u00e9rique plus simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/curtispc.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653","name":"curtispc","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","caption":"curtispc"},"sameAs":["https:\/\/www.curtispc.fr\/","https:\/\/x.com\/curtispcfr"],"url":"https:\/\/curtispc.fr\/blog\/author\/curtispc\/"}]}},"_links":{"self":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/comments?post=3076"}],"version-history":[{"count":17,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3076\/revisions"}],"predecessor-version":[{"id":3356,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3076\/revisions\/3356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media\/3088"}],"wp:attachment":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media?parent=3076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/categories?post=3076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/tags?post=3076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}