{"id":1069,"date":"2019-02-11T18:58:41","date_gmt":"2019-02-11T23:58:41","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1069"},"modified":"2019-11-01T19:38:21","modified_gmt":"2019-11-01T23:38:21","slug":"comment-deceler-une-menace-interne","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/comment-deceler-une-menace-interne\/","title":{"rendered":"COMMENT D\u00c9CELER UNE MENACE INTERNE"},"content":{"rendered":"<p>La plupart des entreprises sont conscientes des menaces pos\u00e9es par les pirates informatiques externes ou les acteurs malveillants envers leurs affaires. Des milliers, si ce n\u2019est des millions, de dollars sont investis chaque ann\u00e9e par ces entreprises pour prot\u00e9ger leur r\u00e9seau contre des acc\u00e8s externes non autoris\u00e9s. Mais la plupart des entreprises n\u2019investissent pas autant d\u2019effort ou de ressources pour se prot\u00e9ger de menaces provenant de l\u2019interne. Les menaces internes repr\u00e9sentent autant une menace et peuvent causer autant de dommages aux entreprises que les menaces des pirates informatiques externes. Les statistiques suivantes illustrent le danger des menaces internes aux entreprises\u00a0:<\/p>\n<ul>\n<li><strong>Soixante pour cent de toutes les attaques contre les r\u00e9seaux <\/strong>qui\u00a0<a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=SEL03123USEN&amp;\">ciblaient les organisations de soins de la sant\u00e9<\/a> en 2016 provenaient de menaces internes.<\/li>\n<li>En 2018,\u00a0<a href=\"https:\/\/www.ca.com\/content\/dam\/ca\/us\/files\/ebook\/insider-threat-report.pdf\"><strong>53 pour cent des entreprises<\/strong><\/a>ont d\u00e9clar\u00e9 avoir \u00e9t\u00e9 victimes de menaces internes lors des 12 mois pr\u00e9c\u00e9dents.<\/li>\n<li>Le\u00a0<a href=\"https:\/\/153j3ttjub71nfe89mc7r5gb-wpengine.netdna-ssl.com\/wp-content\/uploads\/2018\/04\/ObserveIT-Insider-Threat-Global-Report-FINAL.pdf\">co\u00fbt total moyen<\/a>pour les entreprises touch\u00e9es par des menaces internes est de\u00a0<strong>8,76 million $<\/strong>.<\/li>\n<li>Le temps moyen requis pour contenir une menace interne est de\u00a0<strong>73 jours<\/strong>.<\/li>\n<\/ul>\n<h2>TYPES DE MENACES INTERNES<\/h2>\n<p>Il existe deux types de menaces internes dont les entreprises devraient \u00eatre conscientes lorsqu\u2019elles tentent de s\u00e9curiser leurs r\u00e9seaux. N\u00e9gliger l\u2019un ou l\u2019autre de ces types de menaces internes peut rendre une entreprise vuln\u00e9rable \u00e0 une attaque interne. Les types de menaces internes incluent\u00a0:<\/p>\n<ul>\n<li><strong>Personnes internes malveillantes\/intentionnelles<\/strong>.\u00a0Il s\u2019agit d\u2019individus qui cherchent intentionnellement des fa\u00e7ons de faire du sabotage contre l\u2019entreprise en compromettant ses donn\u00e9es.<\/li>\n<li><strong>Personnes internes accidentelles\/non intentionnelles.<\/strong>Ces individus exposent involontairement l\u2019entreprise \u00e0 des risques par n\u00e9gligence ou par des pratiques de travail inad\u00e9quates.<\/li>\n<\/ul>\n<h2>EXEMPLES DE MENACES INTERNES<\/h2>\n<p>Voici quelques exemples d\u2019entreprises qui ont \u00e9t\u00e9 victimes de menaces internes pour diff\u00e9rentes raisons:<\/p>\n<ul>\n<li><strong>Anthem<\/strong>:\u00a0En 2017, la compagnie d\u2019assurance maladie BlueCross BlueShield a envoy\u00e9 un avis \u00e0 environ <a href=\"https:\/\/www.healthcareitnews.com\/news\/anthem-insider-theft-exposes-data-18000-medicare-members\">18 000 de ses clients couverts par une assurance maladie<\/a>pour les informer qu\u2019il y avait eu violation de leurs donn\u00e9es. LaunchPoint Ventures, le fournisseur des services de coordination du r\u00e9gime d\u2019assurance maladie d\u2019Anthem, a d\u00e9clar\u00e9 avoir d\u00e9couvert qu\u2019un de ses employ\u00e9s volait des renseignements personnels des clients, tels que les num\u00e9ros d\u2019assurance maladie, num\u00e9ros d\u2019assurance sociale et num\u00e9ros d\u2019assurance sant\u00e9.<\/li>\n<li><strong>Target<\/strong>:\u00a0Les supermarch\u00e9s Target ont \u00e9t\u00e9 victimes d\u2019une\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned\/\">importante violation de donn\u00e9es en 2013<\/a>. Ils ont annonc\u00e9 que les renseignements personnels d\u2019environ <strong>110 millions<\/strong>de leurs clients avaient \u00e9t\u00e9 compromis; les donn\u00e9es compromises incluaient des renseignements personnels et de cartes de cr\u00e9dit\/d\u00e9bit. Un employ\u00e9 d\u2019un fournisseur ind\u00e9pendant de Target avait involontairement facilit\u00e9 cette violation en \u00e9tant victime d\u2019un courriel d\u2019hame\u00e7onnage; les pirates informatiques ont ensuite pu installer un logiciel malveillant pour acc\u00e9der aux donn\u00e9es prot\u00e9g\u00e9es.<\/li>\n<li><strong>Sage<\/strong>:\u00a0En 2016, la firme de logiciels Sage a annonc\u00e9 qu\u2019une violation de donn\u00e9es avait <a href=\"https:\/\/www.ibtimes.co.uk\/business-software-firm-sage-hit-by-data-breach-apparent-insider-attack-1576041\">compromis les donn\u00e9es<\/a>d\u2019environ\u00a0<strong>280<\/strong>\u00a0de leurs clients d\u2019affaires au Royaume-Uni. Un de leurs employ\u00e9s avait utilis\u00e9 un nom d\u2019utilisateur interne pour acc\u00e9der \u00e0 des donn\u00e9es non autoris\u00e9es et, ainsi, avait \u00e9t\u00e9 capable de compromettre le r\u00e9seau.<\/li>\n<\/ul>\n<h2>FACTEURS DE RISQUES DES MENACES INTERNES<\/h2>\n<p>Consid\u00e9rant les dommages qui peuvent \u00eatre caus\u00e9s par des menaces internes, il est essentiel de rapidement d\u00e9celer et mitiger toute vuln\u00e9rabilit\u00e9 potentielle. Certains facteurs qui peuvent exposer les entreprises \u00e0 des risques accrus de menaces internes incluent\u00a0:<\/p>\n<ul>\n<li><strong>Acc\u00e8s sans restriction:<\/strong> Les employ\u00e9s dont l\u2019acc\u00e8s n\u2019est pas r\u00e9glement\u00e9 ou qui est contr\u00f4l\u00e9 de fa\u00e7on inad\u00e9quate constituent souvent une grave menace \u00e0 l\u2019entreprise. Les violations de donn\u00e9es volontaires ou involontaires caus\u00e9es par ces employ\u00e9s peuvent souvent \u00eatre d\u00e9sastreuses. Id\u00e9alement, le principe du droit d\u2019acc\u00e8s minimal devrait \u00eatre utilis\u00e9 lorsqu\u2019un acc\u00e8s est allou\u00e9; un employ\u00e9 ne devrait avoir que l\u2019acc\u00e8s minimal requis pour ex\u00e9cuter ses t\u00e2ches.<\/li>\n<li><strong>Pratiques de s\u00e9curit\u00e9 inad\u00e9quates<\/strong>:\u00a0L\u2019utilisation, par les employ\u00e9s, de pratiques de s\u00e9curit\u00e9 inad\u00e9quates, telles qu\u2019utiliser des mots de passe faibles, r\u00e9utiliser des mots de passe, cliquer sur des liens contenus dans des courriels douteux ou laisser des ordinateurs d\u00e9verrouill\u00e9s, peuvent exposer les entreprises \u00e0 des risques de menaces internes. De la formation r\u00e9guli\u00e8re devrait \u00eatre donn\u00e9e pour conscientiser les utilisateurs sur l\u2019importance de bonnes pratiques de s\u00e9curit\u00e9.<\/li>\n<li><strong>Apportez votre appareil personnel (BYOD)<\/strong>:\u00a0Les employ\u00e9s qui utilisent leurs appareils personnels pour effectuer des activit\u00e9s reli\u00e9es au travail peuvent exposer leurs entreprises \u00e0 des risques. Les appareils personnels ne peuvent pas \u00eatre s\u00e9curis\u00e9s ad\u00e9quatement et repr\u00e9sentent donc un risque.<\/li>\n<\/ul>\n<p>Chez Orenda Security, nous connaissons tous les risques de menaces internes et externes pour les r\u00e9seaux d\u2019entreprises. Nous offrons la s\u00e9curit\u00e9 infonuagique, les\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/penetration-testing-services\">tests d\u2019intrusion<\/a>, et les tests dynamiques pour prot\u00e9ger votre r\u00e9seau.<\/p>\n<p>Contactez-nous d\u00e8s aujourd\u2019hui et demandez une soumission!<\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1069\" data-postid=\"1069\" class=\"themify_builder_content themify_builder_content-1069 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>La plupart des entreprises sont conscientes des menaces pos\u00e9es par les pirates informatiques externes ou les acteurs malveillants envers leurs affaires. Des milliers, si ce n\u2019est des millions, de dollars sont investis chaque ann\u00e9e par ces entreprises pour prot\u00e9ger leur r\u00e9seau contre des acc\u00e8s externes non autoris\u00e9s. Mais la plupart des entreprises n\u2019investissent pas autant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":824,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[40],"tags":[],"class_list":["post-1069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sensibilisation-securite","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>COMMENT D\u00c9CELER UNE MENACE INTERNE - Orenda Security<\/title>\n<meta name=\"description\" content=\"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"COMMENT D\u00c9CELER UNE MENACE INTERNE - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-11T23:58:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:38:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"COMMENT D\u00c9CELER UNE MENACE INTERNE\",\"datePublished\":\"2019-02-11T23:58:41+00:00\",\"dateModified\":\"2019-11-01T23:38:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"articleSection\":[\"Sensibilisation \u00e0 la s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/\",\"name\":\"COMMENT D\u00c9CELER UNE MENACE INTERNE - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"datePublished\":\"2019-02-11T23:58:41+00:00\",\"dateModified\":\"2019-11-01T23:38:21+00:00\",\"description\":\"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-to-spot-an-insider-threat-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"COMMENT D\u00c9CELER UNE MENACE INTERNE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"COMMENT D\u00c9CELER UNE MENACE INTERNE - Orenda Security","description":"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/","og_locale":"fr_FR","og_type":"article","og_title":"COMMENT D\u00c9CELER UNE MENACE INTERNE - Orenda Security","og_description":"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/","og_site_name":"Orenda Security","article_published_time":"2019-02-11T23:58:41+00:00","article_modified_time":"2019-11-01T23:38:21+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"COMMENT D\u00c9CELER UNE MENACE INTERNE","datePublished":"2019-02-11T23:58:41+00:00","dateModified":"2019-11-01T23:38:21+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/"},"wordCount":861,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","articleSection":["Sensibilisation \u00e0 la s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/","name":"COMMENT D\u00c9CELER UNE MENACE INTERNE - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","datePublished":"2019-02-11T23:58:41+00:00","dateModified":"2019-11-01T23:38:21+00:00","description":"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-to-spot-an-insider-threat-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"COMMENT D\u00c9CELER UNE MENACE INTERNE"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1069"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1069\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media\/824"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}