{"id":1075,"date":"2019-02-01T19:00:13","date_gmt":"2019-02-02T00:00:13","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1075"},"modified":"2019-11-01T19:38:58","modified_gmt":"2019-11-01T23:38:58","slug":"quest-ce-qui-rend-les-systemes-de-securite-vulnerables-aux-cyberattaques","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/quest-ce-qui-rend-les-systemes-de-securite-vulnerables-aux-cyberattaques\/","title":{"rendered":"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES?"},"content":{"rendered":"<p>Tout le monde pr\u00e9tend avoir une s\u00e9curit\u00e9 de r\u00e9seau en place. Cela ne signifie pas que tout le monde ait une s\u00e9curit\u00e9 de r\u00e9seau qui fonctionne. Une cybers\u00e9curit\u00e9 non valid\u00e9e, non test\u00e9e, est mieux qu\u2019aucune s\u00e9curit\u00e9, mais cela ne suffit pas.<\/p>\n<p>Plusieurs entreprises sont aux prises avec un syst\u00e8me de protection qui ne fonctionne plus, pour autant qu\u2019il ait d\u00e9j\u00e0 fonctionn\u00e9. Le <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">Rapport des investigations sur les violations de donn\u00e9es<\/a>\u00a02018 de Verizon sugg\u00e8re que l\u2019internet fait face \u00e0 \u201cune dystopie de la s\u00e9curit\u00e9 des renseignements\u201d. Selon le rapport, \u201cles cybercriminels ont encore du succ\u00e8s avec les m\u00eames techniques \u00e9prouv\u00e9es et leurs victimes font encore les m\u00eames erreurs\u201d.<\/p>\n<p>Une s\u00e9curit\u00e9 insuffisante expose les renseignements personnels des individus \u00e0 des risques. Les industries telles que celle des soins de la sant\u00e9 ont \u00e9t\u00e9 t\u00e9moins de violations r\u00e9p\u00e9t\u00e9es. Le HIPAA Journal mentionnait en mars 2018 que les\u00a0<a href=\"https:\/\/www.hipaajournal.com\/security-breaches-in-healthcare-in-the-last-three-years\/\">violations de donn\u00e9es<\/a>\u00a0avaient expos\u00e9 les renseignements personnels de plus de 41 pour cent des personnes aux \u00c9tats-Unis.<\/p>\n<h2>Erreurs courantes en s\u00e9curit\u00e9<\/h2>\n<p>Les erreurs les plus couramment rencontr\u00e9es dans les syst\u00e8mes de s\u00e9curit\u00e9 incluent l\u2019utilisation de solutions inefficaces, trop d\u2019efforts aux mauvais endroits, ou encore travailler \u00e0 partir d\u2019une bonne id\u00e9e mais sans aller syst\u00e9matiquement jusqu\u2019au bout des choses.<\/p>\n<h3>Voici quelques exemples:<\/h3>\n<ul>\n<li><strong>Un programme de gestion des correctifs inad\u00e9quat ou inexistant.<\/strong>Simplement insister pour que les employ\u00e9s gardent leurs logiciels \u00e0 jour n\u2019est pas un programme de gestion des correctifs. Sans une approche syst\u00e9matique, les personnes n\u00e9gligeront les composantes de logiciels qui sont s\u00e9rieusement d\u00e9pass\u00e9es. Les gens \u00e9vitent parfois de mettre \u00e0 jour leurs logiciels par crainte que ceux-ci cessent de fonctionner. Une composante passe parfois inaper\u00e7ue parce la responsabilit\u00e9 de la garder \u00e0 jour n\u2019a \u00e9t\u00e9 assign\u00e9e \u00e0 personne. Une approche syst\u00e9matique est n\u00e9cessaire pour s\u2019assurer que rien ne soit oubli\u00e9.<\/li>\n<li><strong>Absence de balayage de vuln\u00e9rabilit\u00e9s.<\/strong>Prioriser les mises \u00e0 jour des logiciels requiert de d\u2019abord connaitre o\u00f9 se situent les faiblesse critiques. Un balayage de vuln\u00e9rabilit\u00e9s identifie les logiciels qui ont des faiblesses connues et classe les probl\u00e8mes par s\u00e9v\u00e9rit\u00e9. Sans v\u00e9rification des vuln\u00e9rabilit\u00e9s, des failles de s\u00e9curit\u00e9 importantes passeront inaper\u00e7ues.<\/li>\n<li><strong>Protection de comptes inad\u00e9quate.<\/strong>Plusieurs organisations n\u2019ont pas de politique qui d\u00e9finit et exige des mots de passe forts, ou alors elles ne les appliquent pas. Elles n\u2019\u00e9liminent pas les comptes p\u00e9rim\u00e9s. Elles accordent des privil\u00e8ges trop librement. Elles ne limitent pas le nombre de tentatives de connexion. Il n\u2019y a aucune migration vers l\u2019authentification \u00e0 facteurs multiples. Sans ces protections, la vie est facile pour ceux qui tentent d\u2019acc\u00e9der ill\u00e9galement \u00e0 des comptes.<\/li>\n<li><strong>Protection insuffisante au niveau des applications.<\/strong>Une protection qui couvre uniquement le r\u00e9seau ignore les menaces qui ciblent les applications. Les serveurs web et autres applications qui font face au public ont besoin de leurs propres filtrage et d\u00e9tection de menaces.<\/li>\n<li><strong>Couverture r\u00e9seau incompl\u00e8te.<\/strong>Un syst\u00e8me de s\u00e9curit\u00e9 inad\u00e9quat ne couvre pas tous les appareils. Les erreurs courantes incluent de laisser les appareils mobiles et sans fil se connecter sans restriction et permettre le t\u00e9l\u00e9travail sans mettre sur pied un r\u00e9seau priv\u00e9 virtuel (VPN) ou une protection \u00e9quivalente. Acc\u00e9der au r\u00e9seau peut \u00eatre aussi facile que d\u2019utiliser un ordinateur portable dans l\u2019aire de stationnement.<\/li>\n<li><strong>Absence de tests et de surveillance.<\/strong>Un syst\u00e8me de s\u00e9curit\u00e9 peut sembler fort lorsque ses auteurs en parlent, mais sans une v\u00e9rification ind\u00e9pendante, il n\u2019y a aucun moyen d\u2019en \u00eatre certain. Aucune protection n\u2019est parfaite et la d\u00e9tection des intrusions est aussi importante que leur pr\u00e9vention. Le rapport Verizon mentionne que les deux tiers des syst\u00e8mes compromis le sont sans qu\u2019on le remarque avant plusieurs mois, parfois plus longtemps.<\/li>\n<\/ul>\n<p>Un syst\u00e8me efficace de cybers\u00e9curit\u00e9 requiert une approche multiniveaux. Il prot\u00e8ge tout le p\u00e9rim\u00e8tre du r\u00e9seau, incluant les connexions infonuagiques et celles d\u00e9tenues par les utilisateurs. Il limite les ports et les services qui sont disponibles par un acc\u00e8s internet direct. Il surveille tous les syst\u00e8mes pour d\u00e9tecter tout signe d\u2019intrusion ou de logiciel malveillant. Il n\u2019y a aucun point de d\u00e9faillance unique; un cyberpr\u00e9dateur doit franchir plusieurs obstacles avant de pouvoir faire du dommage.<\/p>\n<p>Les cons\u00e9quences d\u2019une s\u00e9curit\u00e9 inad\u00e9quate sont couteuses. Les pannes de syst\u00e8me et la perte de donn\u00e9es ont des co\u00fbts directs. Par ailleurs, un manquement \u00e0 prendre des pr\u00e9cautions ad\u00e9quates pourrait \u00eatre une preuve de n\u00e9gligence. Des amendes pour infractions aux r\u00e8glementations, telles celles de la HIPAA, peuvent \u00eatre \u00e9normes si une violation est due \u00e0 une n\u00e9gligence. Les personnes dont les renseignements ont \u00e9t\u00e9 compromis peuvent s\u2019adresser aux tribunaux.<\/p>\n<p>Si la s\u00e9curit\u00e9 de votre r\u00e9seau n\u2019a pas fait l\u2019objet d\u2019un examen approfondi derni\u00e8rement, il faut proc\u00e9der \u00e0 un tel examen pour s\u2019assurer que votre r\u00e9seau puisse faire face aux nombreuses menaces actuelles. Orenda Security peut vous aider avec une \u00e9valuation des risques, des\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/penetration-testing-services\">tests d\u2019intrusion,<\/a>\u00a0et des tests dynamiques de s\u00e9curit\u00e9 des applications (DAST).<\/p>\n<p><strong>Contactez-nous d\u00e8s aujourd\u2019hui pour demander une soumission!<\/strong><\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1075\" data-postid=\"1075\" class=\"themify_builder_content themify_builder_content-1075 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Tout le monde pr\u00e9tend avoir une s\u00e9curit\u00e9 de r\u00e9seau en place. Cela ne signifie pas que tout le monde ait une s\u00e9curit\u00e9 de r\u00e9seau qui fonctionne. Une cybers\u00e9curit\u00e9 non valid\u00e9e, non test\u00e9e, est mieux qu\u2019aucune s\u00e9curit\u00e9, mais cela ne suffit pas. Plusieurs entreprises sont aux prises avec un syst\u00e8me de protection qui ne fonctionne plus, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":810,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[38],"tags":[],"class_list":["post-1075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-violation","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES? - Orenda Security<\/title>\n<meta name=\"description\" content=\"Les erreurs les plus courantes dans les syst\u00e8mes de s\u00e9curit\u00e9 consistent \u00e0 utiliser des solutions inefficaces, \u00e0 consentir trop d\u2019efforts aux mauvais endroits ou \u00e0 travailler \u00e0 partir d\u2019une bonne id\u00e9e, sans pour autant y donner suite.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES? - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Les erreurs les plus courantes dans les syst\u00e8mes de s\u00e9curit\u00e9 consistent \u00e0 utiliser des solutions inefficaces, \u00e0 consentir trop d\u2019efforts aux mauvais endroits ou \u00e0 travailler \u00e0 partir d\u2019une bonne id\u00e9e, sans pour autant y donner suite.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-02T00:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:38:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/adult-business-computer-1181354.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES?\",\"datePublished\":\"2019-02-02T00:00:13+00:00\",\"dateModified\":\"2019-11-01T23:38:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/\"},\"wordCount\":941,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/adult-business-computer-1181354.jpg\",\"articleSection\":[\"Violation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/\",\"name\":\"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES? - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/adult-business-computer-1181354.jpg\",\"datePublished\":\"2019-02-02T00:00:13+00:00\",\"dateModified\":\"2019-11-01T23:38:58+00:00\",\"description\":\"Les erreurs les plus courantes dans les syst\u00e8mes de s\u00e9curit\u00e9 consistent \u00e0 utiliser des solutions inefficaces, \u00e0 consentir trop d\u2019efforts aux mauvais endroits ou \u00e0 travailler \u00e0 partir d\u2019une bonne id\u00e9e, sans pour autant y donner suite.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/adult-business-computer-1181354.jpg\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/adult-business-computer-1181354.jpg\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES? - Orenda Security","description":"Les erreurs les plus courantes dans les syst\u00e8mes de s\u00e9curit\u00e9 consistent \u00e0 utiliser des solutions inefficaces, \u00e0 consentir trop d\u2019efforts aux mauvais endroits ou \u00e0 travailler \u00e0 partir d\u2019une bonne id\u00e9e, sans pour autant y donner suite.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/","og_locale":"fr_FR","og_type":"article","og_title":"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES? - Orenda Security","og_description":"Les erreurs les plus courantes dans les syst\u00e8mes de s\u00e9curit\u00e9 consistent \u00e0 utiliser des solutions inefficaces, \u00e0 consentir trop d\u2019efforts aux mauvais endroits ou \u00e0 travailler \u00e0 partir d\u2019une bonne id\u00e9e, sans pour autant y donner suite.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/","og_site_name":"Orenda Security","article_published_time":"2019-02-02T00:00:13+00:00","article_modified_time":"2019-11-01T23:38:58+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/adult-business-computer-1181354.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES?","datePublished":"2019-02-02T00:00:13+00:00","dateModified":"2019-11-01T23:38:58+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/"},"wordCount":941,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/adult-business-computer-1181354.jpg","articleSection":["Violation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/","name":"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES? - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/adult-business-computer-1181354.jpg","datePublished":"2019-02-02T00:00:13+00:00","dateModified":"2019-11-01T23:38:58+00:00","description":"Les erreurs les plus courantes dans les syst\u00e8mes de s\u00e9curit\u00e9 consistent \u00e0 utiliser des solutions inefficaces, \u00e0 consentir trop d\u2019efforts aux mauvais endroits ou \u00e0 travailler \u00e0 partir d\u2019une bonne id\u00e9e, sans pour autant y donner suite.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/adult-business-computer-1181354.jpg","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/adult-business-computer-1181354.jpg","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/what-makes-security-systems-vulnerable-to-cyber-attacks-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"QU\u2019EST-CE QUI REND LES SYST\u00c8MES DE S\u00c9CURIT\u00c9 VULN\u00c9RABLES AUX CYBERATTAQUES?"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1075"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1075\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media\/810"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}