{"id":3260,"date":"2019-11-02T17:51:53","date_gmt":"2019-11-02T16:51:53","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=3260"},"modified":"2019-11-02T17:51:53","modified_gmt":"2019-11-02T16:51:53","slug":"cybersecurite-et-vulnerabilite-humaine","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2019\/11\/02\/cybersecurite-et-vulnerabilite-humaine\/","title":{"rendered":"Cybers\u00e9curit\u00e9 et vuln\u00e9rabilit\u00e9 humaine"},"content":{"rendered":"<p>Maddyness publie un int\u00e9ressant article sur une r\u00e9cente \u00e9tude de l&#8217;entreprise de cybers\u00e9curit\u00e9 Proofpoint qui met en avant le facteur humain \u00e0 l\u2019origine des cyber-attaques.<\/p>\n<p><!--more--><\/p>\n<p>Sur les 300 cadres interrog\u00e9s, 86% indiquent avoir subi une cyber-attaque au cours des 3 derni\u00e8res ann\u00e9es. Pour 48% des cadres interrog\u00e9s, les failles humaines (malwares, emails frauduleux, phishing) figurent parmi les trois principaux facteurs d\u2019attaques. Les hackers frappent souvent les entreprises \u00e0 travers leurs clients (48%) puis leurs employ\u00e9s (43%), les travailleurs temporaires (38%) et l&#8217;entourage de ces employ\u00e9s.<\/p>\n<p>Parmi les solutions envisag\u00e9es pour lutter contre les cyber-attaques, la migration des donn\u00e9es dans le Cloud serait La Solution \u00e0 c\u00f4t\u00e9 de solutions telles que la double authentification, la coop\u00e9ration et l\u2019information des sur les bonnes pratiques, etc.<\/p>\n<p>Mais la cybers\u00e9curit\u00e9 est depuis trop longtemps appr\u00e9hend\u00e9e sous l&#8217;angle de la pr\u00e9vention alors que c&#8217;est bien la r\u00e9pression qui fait d\u00e9faut. Combien de cyber-attaques connaissent une issue judiciaire ? Et, dans les rares cas de sanctions, ces sanctions ont-elles un effet dissuasif ?<\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2019%2F11%2FCyber-insecurity-Managing-threats-from-within.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2019\/11\/Cyber-insecurity-Managing-threats-from-within.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 524KB)<\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Uyb6C0yeXw\"><p><a href=\"https:\/\/www.maddyness.com\/2019\/10\/29\/cyberattaques-cybersecurite\/\">Cyberattaques : une entreprise sur deux touch\u00e9e \u00e0 cause de\u2026. ses clients<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u00ab\u00a0Cyberattaques : une entreprise sur deux touch\u00e9e \u00e0 cause de\u2026. ses clients\u00a0\u00bb &#8212; Maddyness - Le m\u00e9dia pour comprendre l&#039;\u00e9conomie de demain\" src=\"https:\/\/www.maddyness.com\/2019\/10\/29\/cyberattaques-cybersecurite\/embed\/#?secret=cHezrMLnjU#?secret=Uyb6C0yeXw\" data-secret=\"Uyb6C0yeXw\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.proofpoint.com\/us\/resources\/analyst-reports\/cyber-insecurity-managing-threats-within\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.proofpoint.com\/us\/resources\/analyst-reports\/cyber-insecurity-managing-threats-within<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maddyness publie un int\u00e9ressant article sur une r\u00e9cente \u00e9tude de l&#8217;entreprise de cybers\u00e9curit\u00e9 Proofpoint qui met en avant le facteur humain \u00e0 l\u2019origine des cyber-attaques.<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-3260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1667%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-QA","jetpack-related-posts":[{"id":5292,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/10\/12\/gestion-des-cyber-risques\/","url_meta":{"origin":3260,"position":0},"title":"Gestion des Cyber-risques","author":"Fred","date":"12 octobre 2022","format":false,"excerpt":"Le rapport 2022 des assurances Hiscox consacr\u00e9 \u00e0 la gestion des cyber-risques aborde l'\u00e9pineuse question des cyber-menaces et assurances cyber-risques dans un contexte de d\u00e9veloppement des cyber-attaques et fuites de donn\u00e9es prot\u00e9g\u00e9es par la RGPD.","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.jpg?fit=1200%2C635&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.jpg?fit=1200%2C635&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.jpg?fit=1200%2C635&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.jpg?fit=1200%2C635&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.jpg?fit=1200%2C635&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":3260,"position":1},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5296,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/10\/12\/european-cyber-resilience-act-apres-le-privacy-by-design-du-rgpd-le-security-by-design\/","url_meta":{"origin":3260,"position":2},"title":"European Cyber Resilience Act : apr\u00e8s le Privacy by design du RGPD, le Security by design","author":"Fred","date":"12 octobre 2022","format":false,"excerpt":"La Commission europ\u00e9enne a pr\u00e9sent\u00e9 une proposition de r\u00e8glementation europ\u00e9enne sur la cybers\u00e9curit\u00e9 des appareils connect\u00e9s qui doit encore \u00eatre approuv\u00e9 par le Parlement et le Conseil. Le European Cyber Resilience Act vise \u00e0 prot\u00e9ger les consommateurs et les entreprises des objets connect\u00e9s non s\u00e9curis\u00e9s gr\u00e2ce \u00e0 de nouvelles normes,\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4644,"url":"https:\/\/mouillere.com\/universconvergents\/2020\/06\/03\/rgpd-ne-pas-negliger-le-risque-de-class-action\/","url_meta":{"origin":3260,"position":3},"title":"RGPD: ne pas n\u00e9gliger le risque de class action","author":"Fred","date":"3 juin 2020","format":false,"excerpt":"Le cabinet d'avocats PGMBM a lanc\u00e9 une class action contre EasyJet (en sus de celle intent\u00e9e contre British Airways) en proposant aux 9 millions de victimes de violation des donn\u00e9es personnelles une indemnisation de 2000\u20ac par client. Cela rappelle qu'outre les amendes administratives pouvant \u00eatre prononc\u00e9es par les autorit\u00e9s de\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6875,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/12\/10\/300-solutions-souveraines-pour-que-cesse-le-complexe-du-corn-flakes\/","url_meta":{"origin":3260,"position":4},"title":"300 solutions souveraines pour que cesse le complexe du corn flakes","author":"Fred","date":"10 d\u00e9cembre 2025","format":false,"excerpt":"Le Barom\u00e8tre de la Souverainet\u00e9 Num\u00e9rique 2025 r\u00e9v\u00e8le un important d\u00e9ficit de connaissance de l'\u00e9cosyst\u00e8me souverain, avec 40 % des organisations n'effectuant aucune veille sur ces solutions, d\u00e9ficit aggrav\u00e9 par une pr\u00e9paration insuffisante au cadre r\u00e9glementaire, notamment la directive NIS2, pour laquelle 49 % des entit\u00e9s n'ont pas encore de\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/12\/2025-12-09-PanoramaSouveraineteNumerique-1.png?fit=1200%2C572&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/12\/2025-12-09-PanoramaSouveraineteNumerique-1.png?fit=1200%2C572&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/12\/2025-12-09-PanoramaSouveraineteNumerique-1.png?fit=1200%2C572&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/12\/2025-12-09-PanoramaSouveraineteNumerique-1.png?fit=1200%2C572&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/12\/2025-12-09-PanoramaSouveraineteNumerique-1.png?fit=1200%2C572&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6226,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/09\/09\/cyberdico-un-dictionnaire-dedie-a-la-cybersecurite\/","url_meta":{"origin":3260,"position":5},"title":"CyberDico, un dictionnaire d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9","author":"Fred","date":"9 septembre 2024","format":false,"excerpt":"L\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information (ANSSI), autorit\u00e9 nationale dont la mission est de comprendre, pr\u00e9venir et r\u00e9pondre au risque cyber, a publi\u00e9 un dictionnaire d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9 pour traduire et clarifier mots, expressions et sigles propres \u00e0 la cybers\u00e9curit\u00e9. https:\/\/cyber.gouv.fr\/publications\/cyberdico-quest-ce-que-cest","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/Cyberdico.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/Cyberdico.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/Cyberdico.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/Cyberdico.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/3260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=3260"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/3260\/revisions"}],"predecessor-version":[{"id":3262,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/3260\/revisions\/3262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=3260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=3260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=3260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}