{"id":42609,"date":"2016-12-20T09:34:22","date_gmt":"2016-12-20T09:34:22","guid":{"rendered":"https:\/\/www.www.oodrive.fr\/blog\/?p=2350"},"modified":"2023-08-09T08:55:53","modified_gmt":"2023-08-09T08:55:53","slug":"2017-annee-de-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/","title":{"rendered":"2017, ann\u00e9e de la cybers\u00e9curit\u00e9 ?"},"content":{"rendered":"<p>Les entreprises, mais \u00e9galement les particuliers, seront probablement de plus en plus connect\u00e9s dans les ann\u00e9es \u00e0 venir.<\/p>\n<p>Le monde se digitalise de plus en plus, les appareils connect\u00e9s se multiplient, et le terrain de jeu des hackers ne cesse de s\u2019\u00e9tendre.<\/p>\n<p>Face au d\u00e9veloppement des attaques (plus nombreuses, plus sophistiqu\u00e9es), la menace est omnipr\u00e9sente.<\/p>\n<p>Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, <strong>\u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9<\/strong>\u00a0<strong>?<\/strong><\/p>\n<p>L\u2019ann\u00e9e 2016 touche \u00e0 sa fin. L\u2019heure du bilan et des pr\u00e9visions pour les prochains mois. LinkedIn, Tumblr et Myspace, le r\u00e9seau Swift, Ashley Madison, Yahoo, Dyn, Dailymotion\u2026<\/p>\n<p><a href=\"https:\/\/pp2.oodrive.com\/fr\/?s=cyberattaques&amp;lang=fr\">Les attaques informatiques<\/a> de grande ampleur se sont succ\u00e9d\u00e9 tout au long de l\u2019ann\u00e9e 2016. En France, une entreprise subit 50 attaques par jour en moyenne (\u00e9tude Deloitte).<\/p>\n<p>Rien d\u2019\u00e9tonnant donc \u00e0 ce que les entreprises aient pris la d\u00e9cision d\u2019<strong>investir en masse dans leur cybers\u00e9curit\u00e9 en 2017<\/strong>.<\/p>\n<p>L\u2019\u00e9tude montre que 55% d\u2019entre elles annoncent un budget consacr\u00e9 \u00e0 la cybers\u00e9curit\u00e9 en augmentation pour les 12 mois \u00e0 venir.<\/p>\n<h2><strong>De nouvelles exigences r\u00e9glementaires \u00e0 prendre en compte<\/strong><\/h2>\n<p>Pour la soci\u00e9t\u00e9 F5 Networks, les attaques DDoS bas\u00e9es sur l\u2019IoT font parties des principales menaces informatiques \u00e0 surveiller en 2017.<\/p>\n<p>Elle cite \u00e9galement la fraude en ligne, les attaques sur les services Cloud et le <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/vol-de-donnees-personnelles-en-entreprise-une-histoire-sans-fin\/\">vol de donn\u00e9es personnelles<\/a>.<\/p>\n<p>Pour faire face \u00e0 cette derni\u00e8re menace, les entreprises devront entre autres prendre en compte les \u00e9volutions l\u00e9gislatives comme le GDPR, qui entrera en vigueur en 2018.<\/p>\n<p>\u00ab\u00a0<em>Bon nombre d\u2019entreprises ignorent la quantit\u00e9 de donn\u00e9es clients dont elles sont d\u00e9positaires, de m\u00eame que leur emplacement. La plus grande difficult\u00e9 pour elles sera d\u2019\u00e9valuer le volume d\u2019informations dont elles ont la responsabilit\u00e9<\/em>\u00a0\u00bb, note F5 Networks.<\/p>\n<p>D\u2019apr\u00e8s un article du site anglais The Telegraph, publi\u00e9 en octobre 2016, le phishing devrait continuer \u00e0 faire de nombreuses victimes sur le web dans les mois \u00e0 venir.<\/p>\n<p>Selon Josh Goldfarb, directeur technique des technologies \u00e9mergentes chez FireEye, cette technique, qui consiste \u00e0 voler un mot de passe ou un identifiant pour s\u2019infiltrer dans le r\u00e9seau d\u2019une entreprise, devrait \u00ab\u00a0<em>continuer \u00e0 se renforcer en 2017 et au-del\u00e0<\/em>\u00a0\u00bb.<\/p>\n<h2><strong>Attention \u00e0 Locky\u00a0!<\/strong><\/h2>\n<p>De son c\u00f4t\u00e9, le sp\u00e9cialiste de la cybers\u00e9curit\u00e9 nouvelle g\u00e9n\u00e9ration Proofpoint, met en garde contre le <strong>logiciel ran\u00e7onneur Locky<\/strong> en rappelant qu\u2019en 2016 \u00ab\u00a0<em>il ne s\u2019est pas \u00e9coul\u00e9 une semaine sans une intensification des campagnes d\u2019emails<\/em>\u00a0\u00bb le propageant.<\/p>\n<p>La soci\u00e9t\u00e9 pr\u00e9dit qu\u2019en 2017, les auteurs de menaces avanc\u00e9es vont revenir \u00e0 des campagnes de moindre ampleur mais plus cibl\u00e9es.<\/p>\n<p>\u00ab\u00a0<em>Les campagnes d\u2019emails volum\u00e9triques ne vont pas dispara\u00eetre mais seront r\u00e9serv\u00e9es \u00e0 des codes malveillants banalis\u00e9s tels que des ex\u00e9cutables compress\u00e9s au format zip, afin de propager des variantes de ransomwares commerciaux, tandis que les campagnes plus cibl\u00e9es vont voir augmenter tant leur nombre que leur complexit\u00e9<\/em>\u00a0\u00bb.<\/p>\n<p>Selon Proofpoint, les entreprises devront \u00e9galement \u00eatre vigilantes en ce qui concerne les <strong>escroqueries par emails<\/strong> (BEC, Business Email Compromise).<\/p>\n<p>Ces attaques sont responsables de pertes financi\u00e8res \u00e0 hauteur de 3 milliards de dollars selon des estimations r\u00e9centes. \u00ab\u00a0<em>Le montant global de ces pr\u00e9judices est appel\u00e9 \u00e0 augmenter m\u00eame si le nombre d\u2019incidents de grande ampleur de ce type est en recul gr\u00e2ce au renforcement des proc\u00e9dures de contr\u00f4les financiers dans les grandes entreprises<\/em>\u00a0\u00bb.<\/p>\n<h2><strong>2017, une ann\u00e9e d\u00e9cisive\u00a0?<\/strong><\/h2>\n<p>Fortinet pr\u00e9voit un tournant d\u00e9cisif en mati\u00e8re de cybers\u00e9curit\u00e9 en 2017 \u00ab\u00a0<em>face \u00e0 des menaces plus intelligentes, autonomes et difficiles \u00e0 d\u00e9tecter\u00a0<\/em>\u00bb.<\/p>\n<p>Selon le sp\u00e9cialiste des solutions de cybers\u00e9curit\u00e9 hautes performances, \u00ab\u00a0<em>les vecteurs d\u2019attaque se multiplient compte tenu d\u2019innovations technologiques comme le Cloud computing et les objets connect\u00e9s. D\u2019autre part, la p\u00e9nurie de comp\u00e9tences en mati\u00e8re de cybers\u00e9curit\u00e9 et les pressions r\u00e9glementaires restent des freins \u00e0 une lutte efficace contre les cybermenaces<\/em>\u00a0\u00bb.<\/p>\n<p>A l\u2019avenir, \u00ab\u00a0<em>les besoins pour une s\u00e9curit\u00e9 fiable \u00e0 diff\u00e9rents niveaux s\u2019imposeront et affecteront les <a href=\"https:\/\/pp2.oodrive.com\/fr\/apercu\/\">\u00e9diteurs de solutions<\/a>, les gouvernements, les entreprises et le grand public. <strong>Des actions pertinentes s\u2019imposent<\/strong>, sauf \u00e0 risquer un impact particuli\u00e8rement lourd sur l\u2019\u00e9conomie digitale mondiale<\/em>\u00a0\u00bb, conclu Derek Manky, global security strategist chez Fortinet.<\/p>\n<h6 style=\"text-align: right;\"><span class=\"st\">\u00a0<\/span><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Les entreprises, mais \u00e9galement les particuliers, seront probablement de plus en plus connect\u00e9s dans les ann\u00e9es \u00e0 venir. Le monde se digitalise de plus en plus, les appareils connect\u00e9s se multiplient, et le terrain de jeu des hackers ne cesse de s\u2019\u00e9tendre. Face au d\u00e9veloppement des attaques (plus nombreuses, plus sophistiqu\u00e9es), la menace est omnipr\u00e9sente. [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":43174,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[305],"class_list":["post-42609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : 2017, une ann\u00e9e d\u00e9cisive ? | Oodrive<\/title>\n<meta name=\"description\" content=\"Face au d\u00e9veloppement des attaques la menace est omnipr\u00e9sente. Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, \u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9\u00a0?\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : 2017, une ann\u00e9e d\u00e9cisive ? | Oodrive\" \/>\n<meta property=\"og:description\" content=\"Face au d\u00e9veloppement des attaques la menace est omnipr\u00e9sente. Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, \u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9\u00a0?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-20T09:34:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-09T08:55:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lea Vaquero\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lea Vaquero\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/\"},\"author\":{\"name\":\"Lea Vaquero\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa\"},\"headline\":\"2017, ann\u00e9e de la cybers\u00e9curit\u00e9 ?\",\"datePublished\":\"2016-12-20T09:34:22+00:00\",\"dateModified\":\"2023-08-09T08:55:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/\",\"url\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/\",\"name\":\"Cybers\u00e9curit\u00e9 : 2017, une ann\u00e9e d\u00e9cisive ? | Oodrive\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg\",\"datePublished\":\"2016-12-20T09:34:22+00:00\",\"dateModified\":\"2023-08-09T08:55:53+00:00\",\"description\":\"Face au d\u00e9veloppement des attaques la menace est omnipr\u00e9sente. Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, \u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9\u00a0?\",\"breadcrumb\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg\",\"width\":750,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pp2.oodrive.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualit\u00e9s\",\"item\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/actualites\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2017, ann\u00e9e de la cybers\u00e9curit\u00e9 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pp2.oodrive.com\/#website\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...\",\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pp2.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa\",\"name\":\"Lea Vaquero\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"caption\":\"Lea Vaquero\"},\"description\":\"Responsable Marketing Op\u00e9rationnel\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : 2017, une ann\u00e9e d\u00e9cisive ? | Oodrive","description":"Face au d\u00e9veloppement des attaques la menace est omnipr\u00e9sente. Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, \u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9\u00a0?","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : 2017, une ann\u00e9e d\u00e9cisive ? | Oodrive","og_description":"Face au d\u00e9veloppement des attaques la menace est omnipr\u00e9sente. Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, \u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9\u00a0?","og_url":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/","og_site_name":"Oodrive","article_published_time":"2016-12-20T09:34:22+00:00","article_modified_time":"2023-08-09T08:55:53+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg","type":"image\/jpeg"}],"author":"Lea Vaquero","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lea Vaquero","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/"},"author":{"name":"Lea Vaquero","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa"},"headline":"2017, ann\u00e9e de la cybers\u00e9curit\u00e9 ?","datePublished":"2016-12-20T09:34:22+00:00","dateModified":"2023-08-09T08:55:53+00:00","mainEntityOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/","url":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/","name":"Cybers\u00e9curit\u00e9 : 2017, une ann\u00e9e d\u00e9cisive ? | Oodrive","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg","datePublished":"2016-12-20T09:34:22+00:00","dateModified":"2023-08-09T08:55:53+00:00","description":"Face au d\u00e9veloppement des attaques la menace est omnipr\u00e9sente. Apr\u00e8s une ann\u00e9e 2016, particuli\u00e8rement charg\u00e9e en termes de cyberattaques, \u00e0 quoi devons-nous nous attendre pour l\u2019ann\u00e9e prochaine en terme de cybers\u00e9curit\u00e9\u00a0?","breadcrumb":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#primaryimage","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2016\/12\/blog-key-computer-blue-button-showing-security-and-protection_gj5gzndo.jpg","width":750,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2017-annee-de-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pp2.oodrive.com\/"},{"@type":"ListItem","position":2,"name":"Actualit\u00e9s","item":"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/actualites\/"},{"@type":"ListItem","position":3,"name":"2017, ann\u00e9e de la cybers\u00e9curit\u00e9 ?"}]},{"@type":"WebSite","@id":"https:\/\/pp2.oodrive.com\/#website","url":"https:\/\/pp2.oodrive.com\/","name":"Oodrive","description":"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...","publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pp2.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pp2.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/pp2.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa","name":"Lea Vaquero","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","caption":"Lea Vaquero"},"description":"Responsable Marketing Op\u00e9rationnel"}]}},"_links":{"self":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/42609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=42609"}],"version-history":[{"count":0,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/42609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/43174"}],"wp:attachment":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=42609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=42609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}