{"id":2637,"date":"2021-10-19T08:41:02","date_gmt":"2021-10-19T08:41:02","guid":{"rendered":"https:\/\/www.keytech.be\/?p=2637"},"modified":"2022-10-24T09:02:23","modified_gmt":"2022-10-24T09:02:23","slug":"comment-se-proteger-contre-la-cybercriminalite","status":"publish","type":"post","link":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/","title":{"rendered":"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:38;line-height:1.4;\">Learning Snacks : comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1\"><p>Dans ce Learning Snack, Erik Steenhouwer, expert en s\u00e9curit\u00e9 en ligne, nous explique pourquoi la cybercriminalit\u00e9 est en hausse et comment se prot\u00e9ger pour y faire face.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:842px;--awb-max-height:474px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"BNRxKdMNe5A\" class=\"landscape\" params=\"wmode=transparent&autoplay=1&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"842\" height=\"474\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:15px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;\">Pourquoi la cybercriminalit\u00e9 est-elle en recrudescence ?<\/h3><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2\"><p>La cybercriminalit\u00e9 n\u2019est, certes, pas un ph\u00e9nom\u00e8ne nouveau, mais elle a augment\u00e9 de fa\u00e7on exponentielle ces derni\u00e8res ann\u00e9es. De nos jours, <strong>diff\u00e9rents appareils<\/strong> (t\u00e9l\u00e9, smartphone, installation d\u2019alarme, webcam, etc.) vous permettent de vous connecter \u00e0 Internet. Si un de ces appareils est mal prot\u00e9g\u00e9, il constitue un risque pour tout votre environnement en ligne \u2013 et donc aussi pour vos donn\u00e9es personnelles.<\/p>\n<p>\u00c0 cela s\u2019ajoute le fait que la cybercriminalit\u00e9 repr\u00e9sente un <strong>mod\u00e8le commercial int\u00e9ressant<\/strong>. En\u00a0utilisant le dark web, les criminels peuvent agir dans l\u2019anonymat et obtenir d\u2019\u00e9normes sommes d\u2019argent sans prendre beaucoup de risques. Et la cryptomonnaie avec laquelle ils r\u00e9alisent leurs transactions ne permet pratiquement pas de remonter jusqu\u2019\u00e0 eux.<\/p>\n<p>Du RGPD \u00e0 la technologie de l\u2019intelligence artificielle, les rem\u00e8des pour se prot\u00e9ger contre la cybercriminalit\u00e9 sont nombreux, mais <strong>il n\u2019existe pas de solution miracle<\/strong>. Bon nombre d\u2019utilisateurs sur Internet ne se rendent d\u2019ailleurs pas compte qu\u2019ils peuvent constituer une cible et qu\u2019ils doivent prendre les mesures qui s\u2019imposent pour ne pas \u00eatre victimes de la criminalit\u00e9 en ligne.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;\">La criminalit\u00e9 : un danger qui vous concerne aussi<\/h3><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-3\"><p>Vous aussi, vous avez tr\u00e8s probablement d\u00e9j\u00e0 \u00e9t\u00e9 en contact avec la cybercriminalit\u00e9, peut-\u00eatre m\u00eame sans vous en rendre compte. Peut-\u00eatre avez-vous d\u00e9j\u00e0 re\u00e7u un courriel ou un SMS dans lesquels des criminels usurpaient une identit\u00e9 pour obtenir vos donn\u00e9es personnelles\u00a0? Cette forme tr\u00e8s courante de cybercriminalit\u00e9 est appel\u00e9e <strong>phishing ou hame\u00e7onnage<\/strong>.<\/p>\n<p>Se connecter \u00e0 un r\u00e9seau non s\u00e9curis\u00e9, ne pas verrouiller son ordinateur, surfer sur un site frauduleux, etc.\u00a0: c\u2019est souvent une de vos actions qui est directement \u00e0 l\u2019origine du probl\u00e8me de s\u00e9curit\u00e9. Mais il peut aussi \u00eatre d\u00fb \u00e0 <strong>l\u2019erreur de tiers<\/strong>. Pensez \u00e0 une boutique en ligne qui divulgue vos donn\u00e9es lors d\u2019une fuite. Dans un cas comme dans l\u2019autre, il\u00a0existe heureusement des solutions pour vous prot\u00e9ger.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;\">Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?<\/h3><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-4\"><p>Les rem\u00e8des contre la cybercriminalit\u00e9 peuvent \u00eatre aussi bien technologiques que comportementaux. Il existe par exemple des outils de gestion crypt\u00e9e des mots de passe (par exemple <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LastPass<\/a>) qui offrent une protection contre les fuites de donn\u00e9es sur les sites tiers. De m\u00eame, faites preuve de discipline en changeant r\u00e9guli\u00e8rement vos mots de passe.<\/p>\n<p>Dans les <a href=\"https:\/\/www.cevora.be\/fr\/trouvez-votre-formation?term=cybersecurity&amp;searchAs=EM&amp;languages=%5b%22fr%22%5d\" target=\"_blank\" rel=\"noopener\">formations du Cefora<\/a>, vous d\u00e9couvrirez quelles mesures sont les mieux adapt\u00e9es \u00e0 chacune des diff\u00e9rentes formes de cybercriminalit\u00e9.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dans ce Learning Snack, nous vous expliquons pourquoi la cybercriminalit\u00e9 est en hausse et comment se prot\u00e9ger pour y faire face.<\/p>\n","protected":false},"author":1,"featured_media":2117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47,46],"tags":[],"class_list":["post-2637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-event-fr","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ? - KeyTech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ? - KeyTech\" \/>\n<meta property=\"og:description\" content=\"Dans ce Learning Snack, nous vous expliquons pourquoi la cybercriminalit\u00e9 est en hausse et comment se prot\u00e9ger pour y faire face.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-19T08:41:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-24T09:02:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/person\\\/970d0d8908bc7db4a640b796ccc07f86\"},\"headline\":\"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?\",\"datePublished\":\"2021-10-19T08:41:02+00:00\",\"dateModified\":\"2022-10-24T09:02:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/\"},\"wordCount\":1953,\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ransomware.jpg\",\"articleSection\":[\"Event\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/\",\"name\":\"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ? - KeyTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ransomware.jpg\",\"datePublished\":\"2021-10-19T08:41:02+00:00\",\"dateModified\":\"2022-10-24T09:02:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#breadcrumb\"},\"inLanguage\":\"fr-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ransomware.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/comment-se-proteger-contre-la-cybercriminalite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-BE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/keytech.be\",\"https:\\\/\\\/x.com\\\/keytechbe\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/keytechbelgium\",\"https:\\\/\\\/www.instagram.com\\\/keytech.be\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/person\\\/970d0d8908bc7db4a640b796ccc07f86\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/author\\\/admin_ktu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ? - KeyTech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ? - KeyTech","og_description":"Dans ce Learning Snack, nous vous expliquons pourquoi la cybercriminalit\u00e9 est en hausse et comment se prot\u00e9ger pour y faire face.","og_url":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_published_time":"2021-10-19T08:41:02+00:00","article_modified_time":"2022-10-24T09:02:23+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/ransomware.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@keytechbe","twitter_site":"@keytechbe","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture est.":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#article","isPartOf":{"@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/"},"author":{"name":"admin","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86"},"headline":"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?","datePublished":"2021-10-19T08:41:02+00:00","dateModified":"2022-10-24T09:02:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/"},"wordCount":1953,"publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"image":{"@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/ransomware.jpg","articleSection":["Event","S\u00e9curit\u00e9"],"inLanguage":"fr-BE"},{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/","url":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/","name":"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ? - KeyTech","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#primaryimage"},"image":{"@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/ransomware.jpg","datePublished":"2021-10-19T08:41:02+00:00","dateModified":"2022-10-24T09:02:23+00:00","breadcrumb":{"@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#breadcrumb"},"inLanguage":"fr-BE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#primaryimage","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/ransomware.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/ransomware.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/fr\/comment-se-proteger-contre-la-cybercriminalite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/fr\/"},{"@type":"ListItem","position":2,"name":"Comment se prot\u00e9ger contre la cybercriminalit\u00e9 ?"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-BE"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]},{"@type":"Person","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86","name":"admin","url":"https:\/\/www.keytech.be\/fr\/author\/admin_ktu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/comments?post=2637"}],"version-history":[{"count":4,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2637\/revisions"}],"predecessor-version":[{"id":2652,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2637\/revisions\/2652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media\/2117"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media?parent=2637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/categories?post=2637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/tags?post=2637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}