{"id":480360,"date":"2022-10-03T07:53:21","date_gmt":"2022-10-03T07:53:21","guid":{"rendered":"https:\/\/pp2.oodrive.com\/?p=480360"},"modified":"2024-10-01T09:42:24","modified_gmt":"2024-10-01T09:42:24","slug":"panorama-cybersecurite-dans-ecosysteme-pme-tpe","status":"publish","type":"post","link":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/","title":{"rendered":"Panorama de la cybers\u00e9curit\u00e9 dans l\u2019\u00e9cosyst\u00e8me des TPE \/ PME"},"content":{"rendered":"\n<p>Si le monde de l\u2019entreprise a pris conscience des risques cyber, notamment dans un contexte sanitaire qui favorise le t\u00e9l\u00e9travail, un constat s\u2019impose&nbsp;: dans ce domaine, les petites structures manquent de maturit\u00e9. <\/p>\n\n\n\n<p>En effet, <strong>deux TPE \/ PME sur cinq ont d\u00e9j\u00e0 subi des tentatives d\u2019intrusions ou des attaques effectives<\/strong>, et 71 % d\u2019entre elles ont \u00e9t\u00e9 contraintes \u00e0 mettre fin \u00e0 leur activit\u00e9 suite \u00e0 une cyberattaque (selon une enqu\u00eate de la CPME). <\/p>\n\n\n\n<p>Pourquoi les TPE \/ PME sont-elles des cibles id\u00e9ales pour les pirates informatiques&nbsp;? Comment expliquer cette faible culture de la cybers\u00e9curit\u00e9&nbsp;? On fait le point.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les TPE \/ PME&nbsp;: des cibles parfaites pour les cyber-pirates<\/h2>\n\n\n\n<p>En France, les 3,5 millions de petites et moyennes entreprises repr\u00e9sentent 99,8 % du paysage entrepreneurial (minist\u00e8re de l\u2019\u00c9conomie). <\/p>\n\n\n\n<p>En soi, cette statistique \u00e9crasante explique que les TPE \/ PME soient si souvent vis\u00e9es. Mais les hackers profitent aussi de conditions \u00ab&nbsp;id\u00e9ales&nbsp;\u00bb&nbsp;: des processus s\u00e9curitaires moins rigoureux et des syst\u00e8mes de protection mal adapt\u00e9s.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Des processus s\u00e9curitaires moins rigoureux<\/h3>\n\n\n\n<p>En mati\u00e8re de cybers\u00e9curit\u00e9, on d\u00e9signe g\u00e9n\u00e9ralement les grands groupes comme les cibles naturelles des pirates informatiques. <\/p>\n\n\n\n<p>C\u2019est pourtant une fausse id\u00e9e. Car, pour les hackers, il est infiniment plus simple de s\u2019introduire dans les SI des petites structures que de franchir les protections des multinationales.<\/p>\n\n\n\n<p>C\u2019est d\u2019autant plus vrai que les processus s\u00e9curitaires y sont moins rigoureux. Un tiers seulement des TPE \/ PME d\u00e9clare disposer d\u2019un sp\u00e9cialiste informatique d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Le plus souvent, c\u2019est le chef d\u2019entreprise qui s\u2019en charge (dans 41 % des cas), un acteur tiers (8 %), ou bien personne. Plus l\u2019entreprise est petite, et plus cet enjeu est n\u00e9glig\u00e9. (Source&nbsp;: \u00e9tude Ifop pour Xerfi, d\u00e9cembre 2021).<\/p>\n\n\n\n<p>Cons\u00e9quence&nbsp;: en cas d\u2019attaque, les d\u00e9lais de prise en charge sont tr\u00e8s \u00e9tendus. Selon l\u2019ANSSI et l\u2019AMRAE, il se passe 167 jours en moyenne entre une intrusion et sa d\u00e9tection\u2026 Ce qui laisse amplement le temps aux hackers de causer des d\u00e9g\u00e2ts irr\u00e9versibles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Des solutions de protection mal adapt\u00e9es aux TPE \/ PME<\/h3>\n\n\n\n<p>Conscientes des risques, les petites et moyennes entreprises mettent en place des digues, mais celles-ci restent mal adapt\u00e9es \u00e0 leurs besoins. <\/p>\n\n\n\n<p>Trop souvent, l\u2019antivirus constitue la seule protection int\u00e9gr\u00e9e au syst\u00e8me d\u2019information&nbsp;: 97 % des TPE \/ PME utilisent ce genre de solution, 88 % un pare-feu, 79 % un syst\u00e8me de sauvegarde des donn\u00e9es en interne, et 60 % un <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/les-logiciels-de-sauvegarde-a-distance\/\">outil de backup externe<\/a> (Ifop\/Xerfi).<\/p>\n\n\n\n<p>C\u2019est insuffisant, mais l\u2019on peut se risquer \u00e0 avancer une explication&nbsp;: les solutions plus \u00e9labor\u00e9es sont difficilement accessibles en raison d\u2019une offre peu compr\u00e9hensible et souvent on\u00e9reuse. <\/p>\n\n\n\n<p>En outre, de nombreux prestataires de services en cybers\u00e9curit\u00e9 proposent des offres mal adapt\u00e9es, pr\u00e9f\u00e9rant se focaliser sur les grands comptes et cr\u00e9ant un m\u00e9canisme de protection cyber \u00e0 deux vitesses.<\/p>\n\n\n\n<section class=\"product__section\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">Le cloud priv\u00e9 SecNumCloud<\/p><p class=\"product__section-description\">Le r\u00e9f\u00e9rentiel qui garantit le plus haut niveau de s\u00e9curit\u00e9 pour la protection de vos donn\u00e9es sensibles.<\/p><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/bg-banner_work.svg\" class=\"product__section-bg\"\/><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/logo-snc.svg\" class=\"product__section-logo\" alt=\"SecNumCloud - Oodrive\"\/><div class=\"cta\"><a href=\"https:\/\/pp2.oodrive.com\/fr\/secnumcloud\/\">D\u00e9couvrir<\/a><\/div><\/div><\/section>\n\n\n\n<p>\u00c0 cela, il faut ajouter une r\u00e9alit\u00e9&nbsp;: dans l\u2019univers des petites et moyennes entreprises, la culture cyber est tout simplement moins ancr\u00e9e.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Une faible culture de la cybers\u00e9curit\u00e9 dans les petites et moyennes entreprises<\/h2>\n\n\n\n<p>On peut expliquer cette faible culture de quatre mani\u00e8res. Explorons-les&nbsp;!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Des risques cyber souvent minimis\u00e9s<\/h3>\n\n\n\n<p>Il existe un probl\u00e8me de perception du risque au sein des TPE \/ PME. 77 % des r\u00e9pondants au sondage Ifop\/Xerfi estiment que les petites structures sont rarement touch\u00e9es par les <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cybersecurite-top-10-des-cyberattaques-frequentes-en-2024\/\">attaques cyber<\/a>.<\/p>\n\n\n\n<p>Plus grave&nbsp;: elles sont 75 % \u00e0 \u00e9valuer leur propre profil de risque comme \u00ab&nbsp;assez faible&nbsp;\u00bb, voire \u00ab&nbsp;tr\u00e8s faible&nbsp;\u00bb. Dans le m\u00eame esprit, 80 % s\u2019estiment \u00ab&nbsp;bien prot\u00e9g\u00e9es&nbsp;\u00bb contre ces risques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. L\u2019absence d\u2019obligations r\u00e9glementaires&nbsp;?<\/h3>\n\n\n\n<p>S\u2019il existe des obligations r\u00e9glementaires, celles-ci se focalisent sur les grandes structures, les acteurs publics et les Op\u00e9rateurs de Services Essentiels. <\/p>\n\n\n\n<p>C\u2019est le cas de la <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/reglementation\/directive-nis2-tout-comprendre\/\">directive europ\u00e9enne NIS 2<\/a>. Ce faisant, les petites et moyennes entreprises se sentent moins concern\u00e9es \u2013 m\u00eame si le RGPD, dont les dispositions s\u2019appliquent \u00e0 tous de la m\u00eame mani\u00e8re, a contribu\u00e9 \u00e0 changer la donne.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Un travail de sensibilisation encore balbutiant<\/h3>\n\n\n\n<p>Le rapport de l\u2019ANSSI sur la <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/pme-tpe-13-questions-pour-saisir-enjeux-cybersecurite\/\">cybers\u00e9curit\u00e9 des TPE \/ PME<\/a> le montre bien&nbsp;: seule une TPE sur cinq m\u00e8ne, en interne, des campagnes de sensibilisation aux enjeux des risques cyber. <\/p>\n\n\n\n<p>Selon Ifop\/Xerfi, les actions pr\u00e9ventives simples, comme le changement r\u00e9gulier des mots de passe, ne concernent qu\u2019une minorit\u00e9 de TPE \/ PME. <\/p>\n\n\n\n<p>Or la sensibilisation d\u2019une part, et la formation d\u2019autre part, restent des pr\u00e9alables incontournables pour b\u00e2tir un environnement informatique s\u00e9curis\u00e9 et stable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Des investissements limit\u00e9s<\/h3>\n\n\n\n<p>Enfin, on note un manque criant d\u2019investissements. Les arguments qui justifient cette timidit\u00e9 sont fr\u00e9quemment contrefactuels.<\/p>\n\n\n\n<p>56 % des chefs d\u2019entreprises sur\u00e9valuent le co\u00fbt d\u2019une protection efficace \u00e0 plus de 100 euros par mois, alors que de nombreux outils proposent des offres s\u00e9curis\u00e9es pour bien moins cher. <\/p>\n\n\n\n<p>Plus encore&nbsp;: le ratio investissement\/risques est largement sous-\u00e9valu\u00e9, puisque le co\u00fbt m\u00e9dian d\u2019une cyberattaque sur les PME est estim\u00e9 \u00e0 9&nbsp;000 euros, et peut grimper jusqu\u2019\u00e0 500&nbsp;000 euros&nbsp;! <\/p>\n\n\n\n<p>Le diagnostic est donc sans appel&nbsp;: <strong>les TPE \/ PME sont mal pr\u00e9par\u00e9es aux risques cyber<\/strong>. <\/p>\n\n\n\n<p>Heureusement, aussi alarmant soit-il, ce constat n\u2019est pas d\u00e9nu\u00e9 d\u2019espoir&nbsp;: \u00e0 condition de mettre en place les pratiques ad\u00e9quates, les petites et moyennes entreprises sont en mesure de contrer cette fatalit\u00e9. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si le monde de l\u2019entreprise a pris conscience des risques cyber, notamment dans un contexte sanitaire qui favorise le t\u00e9l\u00e9travail, un constat s\u2019impose&nbsp;: dans ce domaine, les petites structures manquent de maturit\u00e9. En effet, deux TPE \/ PME sur cinq ont d\u00e9j\u00e0 subi des tentatives d\u2019intrusions ou des attaques effectives, et 71 % d\u2019entre elles [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":480355,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[574],"class_list":["post-480360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : \u00e9tat des lieux dans les TPE \/ PME<\/title>\n<meta name=\"description\" content=\"Comment les petites et moyennes entreprises \u00e9valuent-elles le risque cyber ? Pourquoi sont-elles des cibles ? Panorama de la cybers\u00e9curit\u00e9 pour les TPE \/ PME.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : \u00e9tat des lieux dans les TPE \/ PME\" \/>\n<meta property=\"og:description\" content=\"Comment les petites et moyennes entreprises \u00e9valuent-elles le risque cyber ? Pourquoi sont-elles des cibles ? Panorama de la cybers\u00e9curit\u00e9 pour les TPE \/ PME.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-03T07:53:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-01T09:42:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The oodrive team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"The oodrive team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/\"},\"author\":{\"name\":\"The oodrive team\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/675fa8e4aa1576c3f5fe574c1706608c\"},\"headline\":\"Panorama de la cybers\u00e9curit\u00e9 dans l\u2019\u00e9cosyst\u00e8me des TPE \/ PME\",\"datePublished\":\"2022-10-03T07:53:21+00:00\",\"dateModified\":\"2024-10-01T09:42:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/\"},\"wordCount\":986,\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/\",\"url\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/\",\"name\":\"Cybers\u00e9curit\u00e9 : \u00e9tat des lieux dans les TPE \/ PME\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg\",\"datePublished\":\"2022-10-03T07:53:21+00:00\",\"dateModified\":\"2024-10-01T09:42:24+00:00\",\"description\":\"Comment les petites et moyennes entreprises \u00e9valuent-elles le risque cyber ? Pourquoi sont-elles des cibles ? Panorama de la cybers\u00e9curit\u00e9 pour les TPE \/ PME.\",\"breadcrumb\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg\",\"width\":1920,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pp2.oodrive.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Panorama de la cybers\u00e9curit\u00e9 dans l\u2019\u00e9cosyst\u00e8me des TPE \/ PME\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pp2.oodrive.com\/#website\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...\",\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pp2.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/675fa8e4aa1576c3f5fe574c1706608c\",\"name\":\"The oodrive team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png\",\"caption\":\"The oodrive team\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : \u00e9tat des lieux dans les TPE \/ PME","description":"Comment les petites et moyennes entreprises \u00e9valuent-elles le risque cyber ? Pourquoi sont-elles des cibles ? Panorama de la cybers\u00e9curit\u00e9 pour les TPE \/ PME.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : \u00e9tat des lieux dans les TPE \/ PME","og_description":"Comment les petites et moyennes entreprises \u00e9valuent-elles le risque cyber ? Pourquoi sont-elles des cibles ? Panorama de la cybers\u00e9curit\u00e9 pour les TPE \/ PME.","og_url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/","og_site_name":"Oodrive","article_published_time":"2022-10-03T07:53:21+00:00","article_modified_time":"2024-10-01T09:42:24+00:00","og_image":[{"width":1920,"height":500,"url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg","type":"image\/jpeg"}],"author":"The oodrive team","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"The oodrive team","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#article","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/"},"author":{"name":"The oodrive team","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/675fa8e4aa1576c3f5fe574c1706608c"},"headline":"Panorama de la cybers\u00e9curit\u00e9 dans l\u2019\u00e9cosyst\u00e8me des TPE \/ PME","datePublished":"2022-10-03T07:53:21+00:00","dateModified":"2024-10-01T09:42:24+00:00","mainEntityOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/"},"wordCount":986,"publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/","url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/","name":"Cybers\u00e9curit\u00e9 : \u00e9tat des lieux dans les TPE \/ PME","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg","datePublished":"2022-10-03T07:53:21+00:00","dateModified":"2024-10-01T09:42:24+00:00","description":"Comment les petites et moyennes entreprises \u00e9valuent-elles le risque cyber ? Pourquoi sont-elles des cibles ? Panorama de la cybers\u00e9curit\u00e9 pour les TPE \/ PME.","breadcrumb":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#primaryimage","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/10\/Panorama-de-la-cybersecurite-dans-lecosysteme-des-PME-TPE.jpg","width":1920,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/panorama-cybersecurite-dans-ecosysteme-pme-tpe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pp2.oodrive.com\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Panorama de la cybers\u00e9curit\u00e9 dans l\u2019\u00e9cosyst\u00e8me des TPE \/ PME"}]},{"@type":"WebSite","@id":"https:\/\/pp2.oodrive.com\/#website","url":"https:\/\/pp2.oodrive.com\/","name":"Oodrive","description":"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...","publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pp2.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pp2.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/pp2.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/675fa8e4aa1576c3f5fe574c1706608c","name":"The oodrive team","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png","caption":"The oodrive team"}}]}},"_links":{"self":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/480360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=480360"}],"version-history":[{"count":0,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/480360\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/480355"}],"wp:attachment":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=480360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=480360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}