{"id":645,"date":"2015-08-07T13:24:20","date_gmt":"2015-08-07T12:24:20","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=645"},"modified":"2015-08-18T13:27:55","modified_gmt":"2015-08-18T12:27:55","slug":"securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/07\/securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques\/","title":{"rendered":"S\u00e9curit\u00e9 des donn\u00e9es : entre complexit\u00e9 et fragilit\u00e9 de nos syst\u00e8mes informatiques"},"content":{"rendered":"<p>Il est devenu impossible de faire des promesses de s\u00e9curit\u00e9 durables. Au lieu de bl\u00e2mer la s\u00e9curit\u00e9 des utilisateurs finaux, il faut augmenter&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques-39823382.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques-39823382.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il est devenu impossible de faire des promesses de s\u00e9curit\u00e9 durables. Au lieu de bl\u00e2mer la s\u00e9curit\u00e9 des utilisateurs finaux, il faut augmenter&#8230; http:\/\/www.zdnet.fr\/actualites\/securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques-39823382.htm<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,16],"tags":[],"class_list":["post-645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-donnees-personnelles"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1667%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-ap","jetpack-related-posts":[{"id":2475,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/06\/05\/les-entreprises-seront-elles-en-conformite-avec-le-rgdp-en-mai-2018\/","url_meta":{"origin":645,"position":0},"title":"Les entreprises seront-elles en conformit\u00e9 avec le RGDP en mai 2018 ?","author":"Fred","date":"5 juin 2017","format":false,"excerpt":"Le 25 mai 2018, les entreprises europ\u00e9ennes devront appliquer le RGDP et s\u2019assurer de la s\u00e9curisation des donn\u00e9es. Elles seront enti\u00e8rement responsables de la cha\u00eene de traitement des donn\u00e9es et devront s\u2019assurer des garanties apport\u00e9es par les sous-traitants et fournisseurs. Les entreprises de plus de 250 salari\u00e9s devront tenir un\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/34042190.jpg?fit=354%2C397&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":5842,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/22\/chiffrement-et-securite-des-donnees-dans-le-cloud\/","url_meta":{"origin":645,"position":1},"title":"Chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud","author":"Fred","date":"22 janvier 2024","format":false,"excerpt":"La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud. La s\u00e9curit\u00e9 est indispensable pour apporter la confiance dans la gestion des donn\u00e9es personnelles de l\u2019entreprise. En 2022, pr\u00e8s d\u2019un tiers des sanctions de la CNIL visaient des manquements aux obligations de s\u00e9curit\u00e9.\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":713,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/27\/ue-vers-lobligation-pour-les-entreprises-du-numerique-a-devoiler-leurs-failles-de-securite\/","url_meta":{"origin":645,"position":2},"title":"UE : vers l\u2019obligation pour les entreprises du num\u00e9rique \u00e0 d\u00e9voiler leurs failles de s\u00e9curit\u00e9 ?","author":"Fred","date":"27 ao\u00fbt 2015","format":false,"excerpt":"La future directive NIS leur imposerait de notifier les intrusions sur leurs syst\u00e8mes informatiques. A l'instar des obligations qui incombent d\u00e9j\u00e0 aux op\u00e9rateurs d'importance vitale. Un projet de directive europ\u00e9enne d\u00e9voil\u00e9 cet \u00e9t\u00e9 par l'agence de presse Reuters suscite de vives r\u00e9actions aupr\u00e8s des acteurs du secteur du num\u00e9rique. Si\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6339,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/11\/05\/fuite-de-donnees-des-jeunes-des-missions-locales-apres-celle-des-chomeurs-de-france-travail\/","url_meta":{"origin":645,"position":3},"title":"Fuite de donn\u00e9es des jeunes des missions locales apr\u00e8s celle des ch\u00f4meurs de France Travail","author":"Fred","date":"5 novembre 2024","format":false,"excerpt":"Le minist\u00e8re du Travail et de l\u2019emploi vient de signaler le piratage du syst\u00e8me d\u2019information utilis\u00e9 par le r\u00e9seau des missions locales dans la nuit du 23 au 24 octobre 2024 avec un risque de divulgation des donn\u00e9es personnelles des 1,1 million de jeunes aid\u00e9s dans leur recherche d\u2019emploi ou\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":645,"position":4},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":519,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/byod-lanssi-et-la-cgpme-conseillent-fortement-de-separer-les-donnees-personnelles-et-professionnelles\/","url_meta":{"origin":645,"position":5},"title":"BYOD : l\u2019ANSSI et la CGPME conseillent fortement de s\u00e9parer les donn\u00e9es personnelles et professionnelles","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Pour l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information ainsi que la Conf\u00e9d\u00e9ration g\u00e9n\u00e9rale des petites et moyennes entreprises, s\u00e9parer... http:\/\/www.zdnet.fr\/actualites\/byod-l-anssi-et-la-cgpme-conseillent-fortement-de-separer-les-donnees-personnelles-et-professionnelles-39823028.htm Guide des bonnes pratiques de l\u2019informatique","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=645"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/645\/revisions"}],"predecessor-version":[{"id":646,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/645\/revisions\/646"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}