{"id":841,"date":"2015-09-09T08:49:34","date_gmt":"2015-09-09T07:49:34","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=841"},"modified":"2015-09-10T08:50:22","modified_gmt":"2015-09-10T07:50:22","slug":"securite-et-byod-la-france-en-retard","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/09\/securite-et-byod-la-france-en-retard\/","title":{"rendered":"S\u00e9curit\u00e9 et BYOD : la France en retard"},"content":{"rendered":"<p>Quand on parle du Bring Your Own Device ou encore de mobilit\u00e9 en entreprise, la question de la s\u00e9curit\u00e9 vient rapidement sur la table. Pourtant,&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/securite-et-byod-la-france-en-retard-39824634.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/securite-et-byod-la-france-en-retard-39824634.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quand on parle du Bring Your Own Device ou encore de mobilit\u00e9 en entreprise, la question de la s\u00e9curit\u00e9 vient rapidement sur la table. Pourtant,&#8230; http:\/\/www.zdnet.fr\/actualites\/securite-et-byod-la-france-en-retard-39824634.htm<\/p>\n","protected":false},"author":1,"featured_media":842,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/F-Secure-BYOD-France.jpg?fit=750%2C615&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-dz","jetpack-related-posts":[{"id":690,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/06\/25\/byod-et-securite-un-rapport-accablant-pour-les-tpe-et-pme\/","url_meta":{"origin":841,"position":0},"title":"BYOD et s\u00e9curit\u00e9 : un rapport accablant pour les TPE et PME","author":"Fred","date":"25 juin 2015","format":false,"excerpt":"Trop insouciantes, les tr\u00e8s petites, petites et moyennes entreprises oublient trop souvent qu\u2019il n\u2019y a pas que les soci\u00e9t\u00e9s cot\u00e9es en bourse \u00e0 \u00eatre... http:\/\/www.zdnet.fr\/actualites\/byod-et-securite-un-rapport-accablant-pour-les-tpe-et-pme-39821488.htm \u00a0","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":519,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/byod-lanssi-et-la-cgpme-conseillent-fortement-de-separer-les-donnees-personnelles-et-professionnelles\/","url_meta":{"origin":841,"position":1},"title":"BYOD : l\u2019ANSSI et la CGPME conseillent fortement de s\u00e9parer les donn\u00e9es personnelles et professionnelles","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Pour l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information ainsi que la Conf\u00e9d\u00e9ration g\u00e9n\u00e9rale des petites et moyennes entreprises, s\u00e9parer... http:\/\/www.zdnet.fr\/actualites\/byod-l-anssi-et-la-cgpme-conseillent-fortement-de-separer-les-donnees-personnelles-et-professionnelles-39823028.htm Guide des bonnes pratiques de l\u2019informatique","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy1.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":360,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/le-byod-progresse-ou-regresse-t-il\/","url_meta":{"origin":841,"position":2},"title":"Le BYOD progresse ou r\u00e9gresse-t-il ?","author":"Fred","date":"22 juillet 2015","format":false,"excerpt":"Apporter son propre appareil personnel au travail est-il une pratique plus populaire aujourd\u2019hui qu\u2019hier ou non ? Deux \u00e9tudes d\u00e9voil\u00e9es r\u00e9cemment... http:\/\/www.zdnet.fr\/actualites\/le-byod-progresse-ou-regresse-t-il-39822700.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/byod_survey_chart-100596658-large.idge_.jpg?fit=500%2C376&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":368,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/comment-faire-fonctionner-le-byod-en-entreprise\/","url_meta":{"origin":841,"position":3},"title":"Comment faire fonctionner le BYOD en entreprise","author":"Fred","date":"22 juillet 2015","format":false,"excerpt":"Si l'utilisation d'appareils personnels sur le lieu de travail fonctionne effectivement, elle est dans le meilleur des cas un compromis pr\u00e9par\u00e9 \u00e0... http:\/\/www.zdnet.fr\/actualites\/comment-faire-fonctionner-le-byod-en-entreprise-39822594.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2329,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/05\/08\/les-lignes-directrices-du-g29-pour-faciliter-la-mise-en-oeuvre-du-reglement-general-sur-la-protection-des-donnees\/","url_meta":{"origin":841,"position":4},"title":"Les lignes directrices du G29 pour faciliter la mise en oeuvre du R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es","author":"Fred","date":"8 mai 2017","format":false,"excerpt":"Lors de sa derni\u00e8re assembl\u00e9e pl\u00e9ni\u00e8re du 4 et 5 avril 2017, le G29 a adopt\u00e9 des lignes directrices pour faciliter la mise en oeuvre\u00a0du R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es qui entrera en vigueur le 25 mai 2018. Le G29 a adopt\u00e9 la version d\u00e9finitive de ses premi\u00e8res\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":585,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/31\/securite-it-en-france-les-investissements-sont-maintenus\/","url_meta":{"origin":841,"position":5},"title":"S\u00e9curit\u00e9 IT en France : les investissements sont maintenus","author":"Fred","date":"31 juillet 2015","format":false,"excerpt":"Malgr\u00e9 les restrictions de budget, les investissements dans la s\u00e9curit\u00e9 informatique en France ne fl\u00e9chissent pas. La mise en conformit\u00e9 avec la... http:\/\/www.zdnet.fr\/actualites\/securite-it-en-france-les-investissements-sont-maintenus-39823162.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=841"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/841\/revisions"}],"predecessor-version":[{"id":843,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/841\/revisions\/843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/842"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}