{"id":1085,"date":"2018-12-07T19:07:36","date_gmt":"2018-12-08T00:07:36","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1085"},"modified":"2019-11-01T19:40:15","modified_gmt":"2019-11-01T23:40:15","slug":"4-conseils-de-cybersecurite-pour-aider-apres-la-violation-de-donnees-du-marriott","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/4-conseils-de-cybersecurite-pour-aider-apres-la-violation-de-donnees-du-marriott\/","title":{"rendered":"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT"},"content":{"rendered":"<p>La semaine derni\u00e8re, nous avons appris que le syst\u00e8me de r\u00e9servations de Starwood avait \u00e9t\u00e9 pirat\u00e9, touchant 500 millions de clients. La chaine Starwood est une filiale de Marriott International. Ils r\u00e9parent encore les dommages caus\u00e9s par la violation qui remonte \u00e0 2014. Des renseignements personnels de 500 millions de clients ont \u00e9t\u00e9 compromis, incluant les noms, adresses courriel, num\u00e9ros de passeports et donn\u00e9es de cartes de cr\u00e9dit. CNN a qualifi\u00e9 cet incident de \u201cdeuxi\u00e8me plus importante violation de donn\u00e9es corporatives de l\u2019histoire.\u201d<\/p>\n<p>Les h\u00f4tels Starwood qui ont \u00e9t\u00e9 affect\u00e9s incluent:<\/p>\n<ul>\n<li>W Hotels<\/li>\n<li>Regis<\/li>\n<li>Sheraton Hotels &amp; Resorts<\/li>\n<li>Westin\u00a0Hotels &amp; Resorts<\/li>\n<li>Element Hotels<\/li>\n<li>Aloft Hotels<\/li>\n<li>The Luxury Collection<\/li>\n<li>Tribute Portfolio<\/li>\n<li>Le\u00a0Meridien\u00a0Hotels &amp; Resorts<\/li>\n<li>Four Points by Sheraton and Design Hotels<\/li>\n<li>Les propri\u00e9t\u00e9s \u00e0 temps partag\u00e9 de la banni\u00e8re Starwood<\/li>\n<\/ul>\n<p>Alors, que fait-on pour r\u00e9gler ce probl\u00e8me et qu\u2019est-ce que vous pouvez faire?<\/p>\n<p>Marriott a d\u00e9but\u00e9 un processus d\u2019envoi de courriels \u00e0 tous les clients qui ont \u00e9t\u00e9 affect\u00e9s. Ils ont \u00e9galement mis sur pied un site web pour r\u00e9pondre \u00e0 vos questions concernant la violation de donn\u00e9es. Mais nous avons certaines mesures de s\u00e9curit\u00e9 utiles que vous devriez prendre pour prot\u00e9ger vos donn\u00e9es. Ces mesures devraient \u00eatre observ\u00e9es sur une base quotidienne.<\/p>\n<h2>Mesure de s\u00e9curit\u00e9 #1: arr\u00eatez de trop partager<\/h2>\n<p>Les m\u00e9dias sociaux sont utilis\u00e9s de fa\u00e7on frivole par des utilisateurs qui partagent trop d\u2019information, allant de leur horaire de salle de bain \u00e0 l\u2019adresse de leur r\u00e9sidence. La plupart des personnes ne r\u00e9v\u00e9leraient pas ces d\u00e9tails \u00e0 un \u00e9tranger qui se tiendrait devant eux mais, parce qu\u2019ils utilisent un appareil \u00e9lectronique, ils ne ressentent pas la r\u00e9alit\u00e9 de leur visibilit\u00e9.<\/p>\n<p>Alors, que devez-vous faire?<\/p>\n<p>La fa\u00e7on avis\u00e9e de partager est de publier des faits marquants plut\u00f4t que chaque petit d\u00e9tail, et de le faire de temps \u00e0 autres plut\u00f4t qu\u2019\u00e0 tous les jours. N\u2019affichez pas de renseignements sensibles tels que des probl\u00e8mes familiaux; les personnes impliqu\u00e9es ne souhaitent probablement pas que la situation soit connue de tierces personnes. Si vous cherchez de l\u2019aide, parlez plut\u00f4t aux bonnes personnes au t\u00e9l\u00e9phone ou en personne. Vous obtiendrez de meilleurs r\u00e9sultats.<\/p>\n<h2>Mesure de s\u00e9curit\u00e9 #2: surveillez vos comptes<\/h2>\n<p>Les entreprises incitent les consommateurs \u00e0 ne plus utiliser de formulaires papier et \u00e0 saisir leurs renseignements sur une multitude de sites web. Qu\u2019il s\u2019agisse d\u2019op\u00e9rations bancaires, d\u2019achats ou de recherches d\u2019emploi, il est difficile d\u2019obtenir des r\u00e9sultats sans laisser vos renseignements personnels sur un appareil. Tout le monde est connect\u00e9 et nous tentons de diminuer la quantit\u00e9 de papier utilis\u00e9, ce qui est louable, mais nous devons faire preuve de davantage de prudence.<\/p>\n<p>Les comptes bancaires, et maintenant les comptes des clients privil\u00e9gi\u00e9s de Starwood, sont parmi les plus importants \u00e0 surveiller. Marriott a \u00e9mis plusieurs recommandations pour prot\u00e9ger vos donn\u00e9es:<\/p>\n<ul>\n<li>Bloquez vos cartes de cr\u00e9dit.<\/li>\n<li>Envisagez l\u2019utilisation de services de surveillance du cr\u00e9dit.<\/li>\n<li>Utilisez des services de protection contre le vol d\u2019identit\u00e9.<\/li>\n<li>D\u00e9diez une carte de cr\u00e9dit \u00e0 certains types de transactions, comme les achats en ligne.<\/li>\n<\/ul>\n<p>Que vous ayez d\u00e9j\u00e0 s\u00e9journ\u00e9 dans un h\u00f4tel Starwood ou non, vous devriez toujours v\u00e9rifier vos comptes r\u00e9guli\u00e8rement et \u00eatre \u00e0 l\u2019affut de toute activit\u00e9 suspecte. Une bonne fa\u00e7on de renforcer cette pratique est de conserver tous vous re\u00e7us; si vous oubliez un produit que vous avez achet\u00e9 ou un magasin que vous avez visit\u00e9 pour la premi\u00e8re fois, vos re\u00e7us vous aideront \u00e0 valider ce qui est suspect dans votre compte et ce qui ne l\u2019est pas.<\/p>\n<h2>Mesure de s\u00e9curit\u00e9 #3: r\u00e9fl\u00e9chissez avant de cliquer<\/h2>\n<p>Venez-vous juste de recevoir un courriel d\u2019une personne ou d\u2019une entreprise? Que vous connaissiez cette personne ou non, ou que vous d\u00e9teniez un compte \u00e0 cette banque ou non, ne cliquez sur aucun lien. M\u00eame s\u2019il ne fait aucun doute pour vous que votre ami ou votre banque vous a bel et bien envoy\u00e9 ce courriel, quittez le monde virtuel et v\u00e9rifiez au t\u00e9l\u00e9phone ou en personne si tout est l\u00e9gitime.<\/p>\n<p>Notre propre vice-pr\u00e9sident et cofondateur a re\u00e7u une invitation par hame\u00e7onnage via LinkedIn Messenger. Peu importe quel navigateur ou plateforme vous utilisez, soyez toujours sceptique avant de cliquer sur un lien ou de livrer vos renseignements personnels.<\/p>\n<h2>Mesure de s\u00e9curit\u00e9 #4: demandez de l\u2019aide professionnelle certifi\u00e9e<\/h2>\n<p>Gr\u00e2ce \u00e0 des tests d\u2019intrusion, les experts de Orenda Security peuvent simuler de r\u00e9elles cyberattaques afin de d\u00e9celer les vuln\u00e9rabilit\u00e9s cach\u00e9es de votre syst\u00e8me. \u00c0 partir des r\u00e9sultats de nos \u00e9valuations des risques de cybers\u00e9curit\u00e9, nous vous aiderons \u00e0 obtenir une solide posture de s\u00e9curit\u00e9. Contactez-nous d\u00e8s aujourd\u2019hui et demandez une soumission!<\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1085\" data-postid=\"1085\" class=\"themify_builder_content themify_builder_content-1085 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>La semaine derni\u00e8re, nous avons appris que le syst\u00e8me de r\u00e9servations de Starwood avait \u00e9t\u00e9 pirat\u00e9, touchant 500 millions de clients. La chaine Starwood est une filiale de Marriott International. Ils r\u00e9parent encore les dommages caus\u00e9s par la violation qui remonte \u00e0 2014. Des renseignements personnels de 500 millions de clients ont \u00e9t\u00e9 compromis, incluant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[40],"tags":[],"class_list":["post-1085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sensibilisation-securite","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT - Orenda Security<\/title>\n<meta name=\"description\" content=\"4 Mesures de s\u00e9curit\u00e9 utiles que vous devez prendre pour prot\u00e9ger vos donn\u00e9es apr\u00e8s avoir \u00e9t\u00e9 victime d&#039;un incident de violation de donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"4 Mesures de s\u00e9curit\u00e9 utiles que vous devez prendre pour prot\u00e9ger vos donn\u00e9es apr\u00e8s avoir \u00e9t\u00e9 victime d&#039;un incident de violation de donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-08T00:07:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:40:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT\",\"datePublished\":\"2018-12-08T00:07:36+00:00\",\"dateModified\":\"2019-11-01T23:40:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"articleSection\":[\"Sensibilisation \u00e0 la s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/\",\"name\":\"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"datePublished\":\"2018-12-08T00:07:36+00:00\",\"dateModified\":\"2019-11-01T23:40:15+00:00\",\"description\":\"4 Mesures de s\u00e9curit\u00e9 utiles que vous devez prendre pour prot\u00e9ger vos donn\u00e9es apr\u00e8s avoir \u00e9t\u00e9 victime d'un incident de violation de donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT - Orenda Security","description":"4 Mesures de s\u00e9curit\u00e9 utiles que vous devez prendre pour prot\u00e9ger vos donn\u00e9es apr\u00e8s avoir \u00e9t\u00e9 victime d'un incident de violation de donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/","og_locale":"fr_FR","og_type":"article","og_title":"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT - Orenda Security","og_description":"4 Mesures de s\u00e9curit\u00e9 utiles que vous devez prendre pour prot\u00e9ger vos donn\u00e9es apr\u00e8s avoir \u00e9t\u00e9 victime d'un incident de violation de donn\u00e9es.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/","og_site_name":"Orenda Security","article_published_time":"2018-12-08T00:07:36+00:00","article_modified_time":"2019-11-01T23:40:15+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT","datePublished":"2018-12-08T00:07:36+00:00","dateModified":"2019-11-01T23:40:15+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/"},"wordCount":861,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","articleSection":["Sensibilisation \u00e0 la s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/","name":"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","datePublished":"2018-12-08T00:07:36+00:00","dateModified":"2019-11-01T23:40:15+00:00","description":"4 Mesures de s\u00e9curit\u00e9 utiles que vous devez prendre pour prot\u00e9ger vos donn\u00e9es apr\u00e8s avoir \u00e9t\u00e9 victime d'un incident de violation de donn\u00e9es.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"4 CONSEILS DE CYBERS\u00c9CURIT\u00c9 POUR AIDER APR\u00c8S LA VIOLATION DE DONN\u00c9ES DU MARRIOTT"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1085"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1085\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media\/825"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}