{"id":20383,"date":"2019-06-03T15:46:21","date_gmt":"2019-06-03T13:46:21","guid":{"rendered":"https:\/\/www.oodrive.fr\/?p=20383"},"modified":"2023-08-10T15:14:12","modified_gmt":"2023-08-10T15:14:12","slug":"cyberattaques-quel-cout-pour-une-entreprise","status":"publish","type":"post","link":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/","title":{"rendered":"Cyberattaques : quels co\u00fbts pour une entreprise ?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Infographie &#8211; Le co\u00fbt d&rsquo;une cyberattaque pour une entreprise<\/h2>\n\n\n\n<p>Une cyberattaque peut co\u00fbter cher \u00e0 une entreprise. Parfois m\u00eame plusieurs millions d&rsquo;euros. Apr\u00e8s une cyberattaque, un certain nombre d\u2019organisations, notamment parmi les PME, ne sont pas en mesure de relancer leur activit\u00e9. Une interruption d\u2019activit\u00e9 suite \u00e0 un <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/le-pra-pour-proteger-vos-donnees-des-sinistres-informatiques\/\">incident informatique<\/a> n\u2019est pas un \u00e9v\u00e9nement anodin. En effet, les cons\u00e9quences d\u2019une cyberattaque pour une entreprise peuvent \u00eatre tr\u00e8s lourdes : pertes financi\u00e8res, impact sur l\u2019image de l\u2019entreprise, perte de confiance des clients et des partenaires. Mais quel est le v\u00e9ritable co\u00fbt d&rsquo;une cyberattaque ?<\/p>\n\n\n\n<figure class=\"wp-block-image alignleft\"><img fetchpriority=\"high\" decoding=\"async\" width=\"410\" height=\"1024\" src=\"https:\/\/www.oodrive.fr\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-410x1024.png\" alt=\"\" class=\"wp-image-20410\" srcset=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-410x1024.png 410w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-120x300.png 120w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-768x1920.png 768w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-140x349.png 140w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-166x416.png 166w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-231x578.png 231w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1-158x394.png 158w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/05\/infographie-cout-cyberattaque-1.png 800w\" sizes=\"(max-width: 410px) 100vw, 410px\" \/><\/figure>\n\n\n\n<p>D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/cyberattaques-pertes-financieres-hausse-entreprises-francaises\/\">co\u00fbt d&rsquo;une cyberattaque<\/a> peut \u00eatre consid\u00e9rable pour une entreprise. Et ce constat est valable partout dans le monde. Une attaque informatique co\u00fbte d\u00e9sormais en moyenne 13 millions de dollars \u00e0 sa victime, soit une augmentation de 12% sur un an.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybers\u00e9curit\u00e9 : adopter une approche plus globale<\/h2>\n\n\n\n<p>\u00ab\u00a0Cette \u00e9tude d\u00e9montre qu\u2019en mati\u00e8re de <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cybersecurite-en-entreprise-enjeux-risques-et-bonnes-pratiques\/\">gestion des cyber-risques<\/a>, il est temps d\u2019adopter une approche plus globale, proactive et pr\u00e9ventive. Cela n\u00e9cessite un engagement total des acteurs des entreprises et de l\u2019\u00e9cosyst\u00e8me de partenaires\u00a0\u00bb, a d\u00e9clar\u00e9 Gilles Cast\u00e9ran, Directeur ex\u00e9cutif d\u2019Accenture Security pour la France.<\/p>\n\n\n\n<p>Selon Accenture, la cybercriminalit\u00e9 pourrait co\u00fbter aux entreprises 4,6 milliards d\u2019euros dans le monde au cours des 5 prochaines ann\u00e9es. \u00ab&nbsp;De cette valeur, 23% pourraient provenir indirectement d\u2019attaques de cybercriminels ciblant les syst\u00e8mes d\u2019information de tierce partie (partenaires, sous-traitants, prestataires, etc) pour atteindre des syst\u00e8mes critiques&nbsp;\u00bb, ont sp\u00e9cifi\u00e9 les auteurs de l\u2019\u00e9tude.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les co\u00fbts cach\u00e9s d&rsquo;une cyberattaque<\/h2>\n\n\n\n<p>Deloitte a \u00e9galement men\u00e9 l\u2019enqu\u00eate en ce qui concerne les co\u00fbts li\u00e9s \u00e0 une cyberattaque. Pour le cabinet d\u2019audit et de conseil, il y a 14 facteurs \u00e0 prendre en compte pour \u00e9valuer de mani\u00e8re ex haustive les cons\u00e9quences d\u2019une attaque. Il s\u2019agit de co\u00fbts directs et indirects qui entrent en ligne de compte pour mesurer l\u2019impact financier d\u2019un cyberincident :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Partie \u00e9merg\u00e9e (co\u00fbts financiers les plus connus)<\/strong><\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Enqu\u00eates techniques<\/li>\n\n\n\n<li>Notification client de l\u2019intrusion<\/li>\n\n\n\n<li>Mise en conformit\u00e9 r\u00e9glementaire<\/li>\n\n\n\n<li>Honoraires d\u2019avocat et frais de justice<\/li>\n\n\n\n<li>S\u00e9curisation des donn\u00e9es client post-incident<\/li>\n\n\n\n<li>Relations publiques<\/li>\n\n\n\n<li>Am\u00e9lioration des dispositifs de cybers\u00e9curit\u00e9<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Partie immerg\u00e9e (co\u00fbts financiers cach\u00e9s ou moins visibles)<\/strong><\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Augmentation des primes d\u2019assurance<\/li>\n\n\n\n<li>Augmentation du co\u00fbt de la dette<\/li>\n\n\n\n<li>Impacts li\u00e9s \u00e0 la perturbation ou l\u2019interruption des activit\u00e9s<\/li>\n\n\n\n<li>Erosion du chiffre d\u2019affaires li\u00e9e \u00e0 la perte de contrats client<\/li>\n\n\n\n<li>D\u00e9pr\u00e9ciation de la valeur de marque<\/li>\n\n\n\n<li>Perte de propri\u00e9t\u00e9 intellectuelle<\/li>\n\n\n\n<li>Perte de la confiance accord\u00e9e par le client<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Infographie &#8211; Le co\u00fbt d&rsquo;une cyberattaque pour une entreprise Une cyberattaque peut co\u00fbter cher \u00e0 une entreprise. Parfois m\u00eame plusieurs millions d&rsquo;euros. Apr\u00e8s une cyberattaque, un certain nombre d\u2019organisations, notamment parmi les PME, ne sont pas en mesure de relancer leur activit\u00e9. Une interruption d\u2019activit\u00e9 suite \u00e0 un incident informatique n\u2019est pas un \u00e9v\u00e9nement anodin. [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":20509,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[574],"class_list":["post-20383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaques : quels co\u00fbts pour une entreprise ? Oodrive<\/title>\n<meta name=\"description\" content=\"D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le co\u00fbt d&#039;une cyberattaque peut \u00eatre consid\u00e9rable pour une entreprise.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques : quels co\u00fbts pour une entreprise ? Oodrive\" \/>\n<meta property=\"og:description\" content=\"D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le co\u00fbt d&#039;une cyberattaque peut \u00eatre consid\u00e9rable pour une entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-03T13:46:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-10T15:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lea Vaquero\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lea Vaquero\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/\"},\"author\":{\"name\":\"Lea Vaquero\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa\"},\"headline\":\"Cyberattaques : quels co\u00fbts pour une entreprise ?\",\"datePublished\":\"2019-06-03T13:46:21+00:00\",\"dateModified\":\"2023-08-10T15:14:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/\"},\"wordCount\":480,\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/\",\"url\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/\",\"name\":\"Cyberattaques : quels co\u00fbts pour une entreprise ? Oodrive\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg\",\"datePublished\":\"2019-06-03T13:46:21+00:00\",\"dateModified\":\"2023-08-10T15:14:12+00:00\",\"description\":\"D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le co\u00fbt d'une cyberattaque peut \u00eatre consid\u00e9rable pour une entreprise.\",\"breadcrumb\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg\",\"width\":800,\"height\":400,\"caption\":\"cout-cyberattaque-entreprise\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pp2.oodrive.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberattaques : quels co\u00fbts pour une entreprise ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pp2.oodrive.com\/#website\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...\",\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pp2.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa\",\"name\":\"Lea Vaquero\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"caption\":\"Lea Vaquero\"},\"description\":\"Responsable Marketing Op\u00e9rationnel\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques : quels co\u00fbts pour une entreprise ? Oodrive","description":"D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le co\u00fbt d'une cyberattaque peut \u00eatre consid\u00e9rable pour une entreprise.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques : quels co\u00fbts pour une entreprise ? Oodrive","og_description":"D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le co\u00fbt d'une cyberattaque peut \u00eatre consid\u00e9rable pour une entreprise.","og_url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/","og_site_name":"Oodrive","article_published_time":"2019-06-03T13:46:21+00:00","article_modified_time":"2023-08-10T15:14:12+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg","type":"image\/jpeg"}],"author":"Lea Vaquero","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lea Vaquero","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#article","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/"},"author":{"name":"Lea Vaquero","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa"},"headline":"Cyberattaques : quels co\u00fbts pour une entreprise ?","datePublished":"2019-06-03T13:46:21+00:00","dateModified":"2023-08-10T15:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/"},"wordCount":480,"publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/","url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/","name":"Cyberattaques : quels co\u00fbts pour une entreprise ? Oodrive","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg","datePublished":"2019-06-03T13:46:21+00:00","dateModified":"2023-08-10T15:14:12+00:00","description":"D\u2019apr\u00e8s une \u00e9tude internationale d\u2019Accenture Security et du Ponemon Institute, le co\u00fbt d'une cyberattaque peut \u00eatre consid\u00e9rable pour une entreprise.","breadcrumb":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#primaryimage","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2019\/06\/couts-cyberattaques.jpg","width":800,"height":400,"caption":"cout-cyberattaque-entreprise"},{"@type":"BreadcrumbList","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cyberattaques-quel-cout-pour-une-entreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pp2.oodrive.com\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Cyberattaques : quels co\u00fbts pour une entreprise ?"}]},{"@type":"WebSite","@id":"https:\/\/pp2.oodrive.com\/#website","url":"https:\/\/pp2.oodrive.com\/","name":"Oodrive","description":"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...","publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pp2.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pp2.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/pp2.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa","name":"Lea Vaquero","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","caption":"Lea Vaquero"},"description":"Responsable Marketing Op\u00e9rationnel"}]}},"_links":{"self":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/20383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=20383"}],"version-history":[{"count":0,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/20383\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/20509"}],"wp:attachment":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=20383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=20383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}