{"id":1456,"date":"2024-06-11T13:27:45","date_gmt":"2024-06-11T13:27:45","guid":{"rendered":"https:\/\/academy.effseit.com\/?p=1456"},"modified":"2024-06-14T11:49:08","modified_gmt":"2024-06-14T11:49:08","slug":"comment-reagir-en-cas-de-cyberattaque","status":"publish","type":"post","link":"https:\/\/academy.effseit.com\/?p=1456","title":{"rendered":"Comment R\u00e9agir en Cas de Cyberattaque"},"content":{"rendered":"\n<p>Les cyberattaques peuvent survenir \u00e0 tout moment et avoir des cons\u00e9quences d\u00e9vastatrices pour les entreprises, en particulier les PME et TPE. \u00catre pr\u00e9par\u00e9 et savoir comment r\u00e9agir efficacement est crucial pour minimiser les dommages et assurer une reprise rapide. Dans cet article, nous vous pr\u00e9sentons les \u00e9tapes essentielles \u00e0 suivre en cas de cyberattaque.<\/p>\n\n\n\n<div style=\"height:86px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center has-text-color has-link-color has-medium-font-size wp-elements-e29dcd78123e1729eb686476ee93691f\" style=\"color:#07314a66\">\u00c9tapes Cruciales \u00e0 Suivre en Cas de Cyberattaque<\/h4>\n\n\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-f1509ecac351694cfc71f20990356e93\" style=\"color:#055384a1\"><strong>D\u00e9tection et Identification de l&rsquo;Attaque :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Surveillance Continue :<\/strong> Mettez en place des syst\u00e8mes de surveillance pour d\u00e9tecter les activit\u00e9s suspectes et les tentatives d&rsquo;intrusion.<\/li>\n\n\n\n<li><strong>Alertes et Notifications :<\/strong> Assurez-vous que votre \u00e9quipe informatique re\u00e7oit des alertes en temps r\u00e9el lorsqu&rsquo;une attaque est d\u00e9tect\u00e9e.<\/li>\n\n\n\n<li><strong>Identification de la Nature de l&rsquo;Attaque :<\/strong> D\u00e9terminez le type de cyberattaque (phishing, ransomware, DDoS, etc.) pour \u00e9laborer une r\u00e9ponse appropri\u00e9e.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-672b322c30814b5c79d5dfd0c60c241e\" style=\"color:#055384a1\"><strong>Contenir l&rsquo;Attaque :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Isolation des Syst\u00e8mes Compromis :<\/strong> D\u00e9connectez imm\u00e9diatement les syst\u00e8mes infect\u00e9s du r\u00e9seau pour emp\u00eacher la propagation de l&rsquo;attaque.<\/li>\n\n\n\n<li><strong>D\u00e9sactivation des Comptes Compromis :<\/strong> Suspendez les comptes utilisateurs compromis pour \u00e9viter toute utilisation frauduleuse.<\/li>\n\n\n\n<li><strong>Blocage des Adresses IP Malveillantes :<\/strong> Utilisez vos pare-feu pour bloquer les adresses IP suspectes.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-477918da02842fc754461c5135d153c5\" style=\"color:#055384a1\"><strong>\u00c9valuation des Dommages :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Analyse de l&rsquo;Impact :<\/strong> \u00c9valuez les syst\u00e8mes et les donn\u00e9es affect\u00e9s par l&rsquo;attaque.<\/li>\n\n\n\n<li><strong>Inventaire des Donn\u00e9es Compromises :<\/strong> Identifiez quelles donn\u00e9es ont \u00e9t\u00e9 compromises ou vol\u00e9es.<\/li>\n\n\n\n<li><strong>Documenter l&rsquo;Incident :<\/strong> Enregistrez toutes les informations pertinentes sur l&rsquo;attaque, y compris les vecteurs d&rsquo;attaque et les syst\u00e8mes touch\u00e9s.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-f7debfac6a96462c0258f162cc44d6b2\" style=\"color:#055384a1\"><strong>Notification et Communication :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Informer les Parties Prenantes :<\/strong> Communiquez avec les employ\u00e9s, les clients, et les partenaires pour les informer de l&rsquo;attaque.<\/li>\n\n\n\n<li><strong>Notification des Autorit\u00e9s :<\/strong> Si n\u00e9cessaire, informez les autorit\u00e9s comp\u00e9tentes, telles que les agences de protection des donn\u00e9es ou les services de police.<\/li>\n\n\n\n<li><strong>Transparence :<\/strong> Soyez transparent avec vos clients et partenaires sur l&rsquo;impact de l&rsquo;attaque et les mesures prises pour la contenir.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-7c03629b1b0f92a226d834b029293f61\" style=\"color:#055384a1\"><strong>R\u00e9cup\u00e9ration et Restauration :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Restauration des Syst\u00e8mes :<\/strong> Utilisez vos sauvegardes pour restaurer les syst\u00e8mes et les donn\u00e9es affect\u00e9s.<\/li>\n\n\n\n<li><strong>Mise \u00e0 Jour des Logiciels :<\/strong> Assurez-vous que tous les logiciels et syst\u00e8mes sont \u00e0 jour avec les derniers correctifs de s\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong>V\u00e9rification de l&rsquo;Int\u00e9grit\u00e9 :<\/strong> Effectuez des contr\u00f4les pour garantir que les syst\u00e8mes restaur\u00e9s ne contiennent pas de logiciels malveillants r\u00e9siduels.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-3975e512381eb97916d06777fd4c0928\" style=\"color:#055384a1\"><strong>Analyse Post-Incident :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u00c9valuation des R\u00e9ponses :<\/strong> Analysez la r\u00e9ponse \u00e0 l&rsquo;incident pour identifier les points forts et les lacunes.<\/li>\n\n\n\n<li><strong>Rapport d&rsquo;Incident :<\/strong> Pr\u00e9parez un rapport d\u00e9taill\u00e9 de l&rsquo;incident, des actions entreprises, et des r\u00e9sultats obtenus.<\/li>\n\n\n\n<li><strong>Le\u00e7ons Apprises :<\/strong> Utilisez les informations recueillies pour am\u00e9liorer vos strat\u00e9gies de cybers\u00e9curit\u00e9 et de r\u00e9ponse aux incidents.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:86px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:69px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center has-text-color has-link-color has-medium-font-size wp-elements-8b58bc2e180d2c14678357adfb34506e\" style=\"color:#07314a66\">Pr\u00e9parer l&rsquo;Avenir<\/h4>\n\n\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-e2d87d67a76267a29b7df4a0b54535c7\" style=\"color:#055384a1\"><strong>Formation Continue :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organisez r\u00e9guli\u00e8rement des formations pour sensibiliser vos employ\u00e9s aux menaces cyber et aux bonnes pratiques de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-d8e3e9ce2cec7b95172d2433124b30b0\" style=\"color:#055384a1\"><strong>Mise \u00e0 Jour des Politiques de S\u00e9curit\u00e9 :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Revoyez et mettez \u00e0 jour vos politiques de s\u00e9curit\u00e9 en fonction des nouvelles menaces et des le\u00e7ons tir\u00e9es des incidents pr\u00e9c\u00e9dents.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-9466109288c27d95e3cf3999e5084339\" style=\"color:#055384a1\"><strong>Tests R\u00e9guliers :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Effectuez des tests de p\u00e9n\u00e9tration et des simulations d&rsquo;attaques pour \u00e9valuer l&rsquo;efficacit\u00e9 de vos mesures de s\u00e9curit\u00e9 et de r\u00e9ponse aux incidents.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:86px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>R\u00e9agir rapidement et efficacement \u00e0 une cyberattaque est crucial pour minimiser les dommages et garantir une reprise rapide. En suivant ces \u00e9tapes et en adoptant une approche proactive en mati\u00e8re de cybers\u00e9curit\u00e9, votre entreprise peut mieux se prot\u00e9ger contre les menaces et assurer une continuit\u00e9 op\u00e9rationnelle.<\/p>\n\n\n\n<div style=\"height:59px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-default\" style=\"background-color:#00000012;color:#00000012\"\/>\n\n\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Pour en savoir plus sur nos formations en cybers\u00e9curit\u00e9 et comment nous pouvons vous aider \u00e0 renforcer votre pr\u00e9paration aux cyberattaques, contactez Effseit Academy d\u00e8s aujourd&rsquo;hui.<\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-94db98a8aa510a107ce78c2b3d8c3cfc\" style=\"color:#055384a1\"><strong>Effseit Academy &#8211; Votre Partenaire en Formation et Cybers\u00e9curit<\/strong>\u00e9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cyberattaques peuvent survenir \u00e0 tout moment et avoir des cons\u00e9quences d\u00e9vastatrices pour les entreprises, en particulier les PME et TPE. \u00catre pr\u00e9par\u00e9 et savoir comment r\u00e9agir efficacement est crucial pour minimiser les dommages et assurer une reprise rapide. Dans cet article, nous vous pr\u00e9sentons les \u00e9tapes essentielles \u00e0 suivre en cas de cyberattaque. \u00c9tapes&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/academy.effseit.com\/?p=1456\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":1540,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment R\u00e9agir en Cas de Cyberattaque - EFFSEIT ACADEMY<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/academy.effseit.com\/?p=1456\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment R\u00e9agir en Cas de Cyberattaque - EFFSEIT ACADEMY\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques peuvent survenir \u00e0 tout moment et avoir des cons\u00e9quences d\u00e9vastatrices pour les entreprises, en particulier les PME et TPE. \u00catre pr\u00e9par\u00e9 et savoir comment r\u00e9agir efficacement est crucial pour minimiser les dommages et assurer une reprise rapide. Dans cet article, nous vous pr\u00e9sentons les \u00e9tapes essentielles \u00e0 suivre en cas de cyberattaque. \u00c9tapes&hellip; Lire la suite\" \/>\n<meta property=\"og:url\" content=\"https:\/\/academy.effseit.com\/?p=1456\" \/>\n<meta property=\"og:site_name\" content=\"EFFSEIT ACADEMY\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-11T13:27:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-14T11:49:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/academy.effseit.com\/wp-content\/uploads\/2024\/06\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/#\\\/schema\\\/person\\\/659b132d67c99e5382b54a80765a3bd1\"},\"headline\":\"Comment R\u00e9agir en Cas de Cyberattaque\",\"datePublished\":\"2024-06-11T13:27:45+00:00\",\"dateModified\":\"2024-06-14T11:49:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456\"},\"wordCount\":644,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/academy.effseit.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456\",\"url\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456\",\"name\":\"Comment R\u00e9agir en Cas de Cyberattaque - EFFSEIT ACADEMY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/academy.effseit.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp\",\"datePublished\":\"2024-06-11T13:27:45+00:00\",\"dateModified\":\"2024-06-14T11:49:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/#\\\/schema\\\/person\\\/659b132d67c99e5382b54a80765a3bd1\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/academy.effseit.com\\\/?p=1456\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#primaryimage\",\"url\":\"https:\\\/\\\/academy.effseit.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp\",\"contentUrl\":\"https:\\\/\\\/academy.effseit.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/?p=1456#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/academy.effseit.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment R\u00e9agir en Cas de Cyberattaque\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/#website\",\"url\":\"https:\\\/\\\/academy.effseit.com\\\/\",\"name\":\"EFFSEIT ACADEMY\",\"description\":\"Votre formation, Votre protection\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/academy.effseit.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/academy.effseit.com\\\/#\\\/schema\\\/person\\\/659b132d67c99e5382b54a80765a3bd1\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae0eef63e9bbec54944992fc8404195007873a069008f544f0a95b66a962e4de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae0eef63e9bbec54944992fc8404195007873a069008f544f0a95b66a962e4de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae0eef63e9bbec54944992fc8404195007873a069008f544f0a95b66a962e4de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/academy.effseit.com\"],\"url\":\"https:\\\/\\\/academy.effseit.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment R\u00e9agir en Cas de Cyberattaque - EFFSEIT ACADEMY","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/academy.effseit.com\/?p=1456","og_locale":"fr_FR","og_type":"article","og_title":"Comment R\u00e9agir en Cas de Cyberattaque - EFFSEIT ACADEMY","og_description":"Les cyberattaques peuvent survenir \u00e0 tout moment et avoir des cons\u00e9quences d\u00e9vastatrices pour les entreprises, en particulier les PME et TPE. \u00catre pr\u00e9par\u00e9 et savoir comment r\u00e9agir efficacement est crucial pour minimiser les dommages et assurer une reprise rapide. Dans cet article, nous vous pr\u00e9sentons les \u00e9tapes essentielles \u00e0 suivre en cas de cyberattaque. \u00c9tapes&hellip; Lire la suite","og_url":"https:\/\/academy.effseit.com\/?p=1456","og_site_name":"EFFSEIT ACADEMY","article_published_time":"2024-06-11T13:27:45+00:00","article_modified_time":"2024-06-14T11:49:08+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/academy.effseit.com\/wp-content\/uploads\/2024\/06\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/academy.effseit.com\/?p=1456#article","isPartOf":{"@id":"https:\/\/academy.effseit.com\/?p=1456"},"author":{"name":"admin","@id":"https:\/\/academy.effseit.com\/#\/schema\/person\/659b132d67c99e5382b54a80765a3bd1"},"headline":"Comment R\u00e9agir en Cas de Cyberattaque","datePublished":"2024-06-11T13:27:45+00:00","dateModified":"2024-06-14T11:49:08+00:00","mainEntityOfPage":{"@id":"https:\/\/academy.effseit.com\/?p=1456"},"wordCount":644,"commentCount":0,"image":{"@id":"https:\/\/academy.effseit.com\/?p=1456#primaryimage"},"thumbnailUrl":"https:\/\/academy.effseit.com\/wp-content\/uploads\/2024\/06\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp","articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/academy.effseit.com\/?p=1456#respond"]}]},{"@type":"WebPage","@id":"https:\/\/academy.effseit.com\/?p=1456","url":"https:\/\/academy.effseit.com\/?p=1456","name":"Comment R\u00e9agir en Cas de Cyberattaque - EFFSEIT ACADEMY","isPartOf":{"@id":"https:\/\/academy.effseit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/academy.effseit.com\/?p=1456#primaryimage"},"image":{"@id":"https:\/\/academy.effseit.com\/?p=1456#primaryimage"},"thumbnailUrl":"https:\/\/academy.effseit.com\/wp-content\/uploads\/2024\/06\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp","datePublished":"2024-06-11T13:27:45+00:00","dateModified":"2024-06-14T11:49:08+00:00","author":{"@id":"https:\/\/academy.effseit.com\/#\/schema\/person\/659b132d67c99e5382b54a80765a3bd1"},"breadcrumb":{"@id":"https:\/\/academy.effseit.com\/?p=1456#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/academy.effseit.com\/?p=1456"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/academy.effseit.com\/?p=1456#primaryimage","url":"https:\/\/academy.effseit.com\/wp-content\/uploads\/2024\/06\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp","contentUrl":"https:\/\/academy.effseit.com\/wp-content\/uploads\/2024\/06\/depositphotos_86049364-stock-photo-cloud-computing-data-security.webp","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/academy.effseit.com\/?p=1456#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/academy.effseit.com\/"},{"@type":"ListItem","position":2,"name":"Comment R\u00e9agir en Cas de Cyberattaque"}]},{"@type":"WebSite","@id":"https:\/\/academy.effseit.com\/#website","url":"https:\/\/academy.effseit.com\/","name":"EFFSEIT ACADEMY","description":"Votre formation, Votre protection","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/academy.effseit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/academy.effseit.com\/#\/schema\/person\/659b132d67c99e5382b54a80765a3bd1","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ae0eef63e9bbec54944992fc8404195007873a069008f544f0a95b66a962e4de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae0eef63e9bbec54944992fc8404195007873a069008f544f0a95b66a962e4de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0eef63e9bbec54944992fc8404195007873a069008f544f0a95b66a962e4de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/academy.effseit.com"],"url":"https:\/\/academy.effseit.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/posts\/1456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1456"}],"version-history":[{"count":5,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/posts\/1456\/revisions"}],"predecessor-version":[{"id":1810,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/posts\/1456\/revisions\/1810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=\/wp\/v2\/media\/1540"}],"wp:attachment":[{"href":"https:\/\/academy.effseit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academy.effseit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}