{"id":371,"date":"2015-07-22T09:38:23","date_gmt":"2015-07-22T08:38:23","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=371"},"modified":"2015-07-22T09:38:23","modified_gmt":"2015-07-22T08:38:23","slug":"securite-le-cout-de-la-negligence","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/securite-le-cout-de-la-negligence\/","title":{"rendered":"S\u00e9curit\u00e9 : le co\u00fbt de la n\u00e9gligence"},"content":{"rendered":"<p>La s\u00e9curit\u00e9 co\u00fbte cher. Mais les cons\u00e9quences d\u2019une intrusion dans le syst\u00e8me d\u2019information ou d\u2019une perte de donn\u00e9es peuvent \u00eatre bien plus&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/securite-le-cout-de-la-negligence-39822006.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/securite-le-cout-de-la-negligence-39822006.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 co\u00fbte cher. Mais les cons\u00e9quences d\u2019une intrusion dans le syst\u00e8me d\u2019information ou d\u2019une perte de donn\u00e9es peuvent \u00eatre bien plus&#8230; http:\/\/www.zdnet.fr\/actualites\/securite-le-cout-de-la-negligence-39822006.htm<\/p>\n","protected":false},"author":1,"featured_media":372,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/sec13_cout-negligence.jpg?fit=580%2C2148&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-5Z","jetpack-related-posts":[{"id":1908,"url":"https:\/\/mouillere.com\/universconvergents\/2016\/03\/03\/cyberattaque-la-securite-a-coute-des-millions-deuros-a-tv5-monde\/","url_meta":{"origin":371,"position":0},"title":"Cyberattaque &#8211; La s\u00e9curit\u00e9 a co\u00fbt\u00e9 des millions d&#8217;euros \u00e0 TV5 Monde","author":"Fred","date":"3 mars 2016","format":false,"excerpt":"Apr\u00e8s l'importante cyberattaque dont il a \u00e9t\u00e9 la cible en 2015, le groupe TV5 Monde a d\u00fb r\u00e9parer les d\u00e9g\u00e2ts, mettre en place une politique de... http:\/\/www.zdnet.fr\/actualites\/cyberattaque-la-securite-a-coute-des-millions-d-euros-a-tv5-monde-39833578.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5594,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/07\/04\/typologie-et-cout-des-cyberattaques-en-france\/","url_meta":{"origin":371,"position":1},"title":"Typologie et co\u00fbt des cyberattaques en France","author":"Fred","date":"4 juillet 2023","format":false,"excerpt":"Le cabinet Aster\u00e8s \u00e9value le co\u00fbt des cyberattaques r\u00e9ussies contre les organismes publics et priv\u00e9s fran\u00e7ais \u00e0 2 Mds\u20ac en 2022. Ont \u00e9t\u00e9 analys\u00e9s les principaux impacts \u00e9conomiques des trois types d\u2019attaques r\u00e9ussies couvertes par l\u2019\u00e9tude : intrusion dans le syst\u00e8me d\u2019information, attaque par ran\u00e7ongiciel et par d\u00e9ni-de-service. Le co\u00fbt\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6789,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/11\/04\/souverainete-des-systemes-dinformation-de-letat\/","url_meta":{"origin":371,"position":2},"title":"Souverainet\u00e9 des syst\u00e8mes d\u2019information de l\u2019\u00c9tat","author":"Fred","date":"4 novembre 2025","format":false,"excerpt":"Le dernier rapport de la Cour des comptes sur la souverainet\u00e9 des syst\u00e8mes d'information civils de l'\u00c9tat met en lumi\u00e8re un d\u00e9calage persistant entre l'ambition affich\u00e9e par la France en mati\u00e8re de souverainet\u00e9 num\u00e9rique et la r\u00e9alit\u00e9 de sa mise en \u0153uvre face \u00e0 la pr\u00e9dominance des g\u00e9ants technologiques am\u00e9ricains,\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1280,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/31\/proteger-sa-vie-privee-sur-internet-combien-ca-coute-vraiment\/","url_meta":{"origin":371,"position":3},"title":"Prot\u00e9ger sa vie priv\u00e9e sur Internet, combien \u00e7a co\u00fbte vraiment ?","author":"Fred","date":"31 octobre 2015","format":false,"excerpt":"Virus, vol de donn\u00e9es, surveillance commerciale... On a tent\u00e9 de calculer combien il en co\u00fbterait en moyenne \u00e0 un internaute plut\u00f4t d\u00e9butant de s\u00e9curiser son utilisation d\u2019Internet. http:\/\/rue89.nouvelobs.com\/2015\/10\/31\/proteger-vie-privee-internet-combien-ca-coute-vraiment-261623","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":430,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/09\/quand-larchivage-rencontre-le-big-data-faire-du-decisionnel-a-bas-cout-dans-le-cloud-prive\/","url_meta":{"origin":371,"position":4},"title":"Quand l&#8217;archivage rencontre le Big Data : faire du d\u00e9cisionnel \u00e0 bas co\u00fbt dans le Cloud priv\u00e9","author":"Fred","date":"9 juillet 2015","format":false,"excerpt":"Les donn\u00e9es froides d\u00e9signent les donn\u00e9es rarement consult\u00e9es, mais n\u00e9cessaires. D\u00e9couvrez comment ce processus fonctionne et en quoi il peut aider... http:\/\/www.zdnet.fr\/actualites\/quand-l-archivage-rencontre-le-big-data-faire-du-decisionnel-a-bas-cout-dans-le-cloud-prive-39821276.htm","rel":"","context":"Dans &quot;Big Data&quot;","block_context":{"text":"Big Data","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/big-data\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5482,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/03\/23\/directive-green-claims-vs-greenwashing\/","url_meta":{"origin":371,"position":5},"title":"Directive Green Claims VS Greenwashing","author":"Fred","date":"23 mars 2023","format":false,"excerpt":"Les proc\u00e9dures pr\u00e9ventives ou curatives contre le blanchiment d'argent pr\u00e9voient des obligations de surveillance et une responsabilit\u00e9 p\u00e9nale pour tous ceux qui ont particip\u00e9 par n\u00e9gligence ou intentionnellement au blanchiment. Le greenwashing ou \u00e9coblanchiment avec ses promesses de voitures propres, d'\u00e9nergies propres, de green computing, etc. est encore plus\u00a0 trompeur\u2026","rel":"","context":"Dans &quot;Environnement&quot;","block_context":{"text":"Environnement","link":"https:\/\/mouillere.com\/universconvergents\/category\/environnement\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/03\/Directive-Green-Claims.jpg?fit=1080%2C1080&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/03\/Directive-Green-Claims.jpg?fit=1080%2C1080&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/03\/Directive-Green-Claims.jpg?fit=1080%2C1080&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/03\/Directive-Green-Claims.jpg?fit=1080%2C1080&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/03\/Directive-Green-Claims.jpg?fit=1080%2C1080&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/371\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/371\/revisions\/373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/372"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}