{"id":22845,"date":"2024-12-05T06:46:29","date_gmt":"2024-12-05T05:46:29","guid":{"rendered":"https:\/\/jng-web.com\/labo\/?p=22845"},"modified":"2024-11-15T19:38:06","modified_gmt":"2024-11-15T18:38:06","slug":"quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger","status":"publish","type":"post","link":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/","title":{"rendered":"Qu&rsquo;est-ce qu&rsquo;un Data Breach et Pourquoi Est-Ce Crucial de s&rsquo;en Prot\u00e9ger ?"},"content":{"rendered":"<div class=\"advads-avant-le-contenu\" id=\"advads-662807565\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4944504088214075\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-4944504088214075\" \ndata-ad-slot=\"4514395581\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><div class=\"advads-test\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"advads-614374855\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4944504088214075\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-4944504088214075\" \ndata-ad-slot=\"4514395581\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p>Le terme <strong>data breach<\/strong> (ou violation de donn\u00e9es en fran\u00e7ais) d\u00e9signe un incident o\u00f9 des informations confidentielles ou sensibles sont expos\u00e9es \u00e0 des tiers non autoris\u00e9s, souvent \u00e0 cause de failles de s\u00e9curit\u00e9 dans un syst\u00e8me informatique. Ce type de br\u00e8che peut concerner divers types de donn\u00e9es : informations personnelles, donn\u00e9es bancaires, secrets commerciaux, ou autres informations sensibles. Comprendre les data breaches, leurs impacts et les moyens de s\u2019en prot\u00e9ger est devenu essentiel, tant pour les particuliers que pour les entreprises.<\/p>\n<h3>Les Causes Fr\u00e9quentes d&rsquo;un Data Breach<\/h3>\n<p>Plusieurs facteurs peuvent \u00eatre \u00e0 l&rsquo;origine d&rsquo;une violation de donn\u00e9es. Voici les principales causes :<\/p>\n<ol>\n<li><strong>Piratage<\/strong> : Les cyberattaques sont souvent \u00e0 l&rsquo;origine des violations de donn\u00e9es. Les pirates exploitent les vuln\u00e9rabilit\u00e9s des syst\u00e8mes pour voler des informations.<\/li>\n<li><strong>Erreur Humaine<\/strong> : Des erreurs humaines, telles qu&rsquo;un employ\u00e9 envoyant des informations confidentielles \u00e0 la mauvaise personne ou utilisant un mot de passe faible, peuvent exposer des donn\u00e9es sensibles.<\/li>\n<li><strong>Phishing et Ing\u00e9nierie Sociale<\/strong> : Ces techniques manipulent les utilisateurs pour qu&rsquo;ils r\u00e9v\u00e8lent involontairement leurs informations d&rsquo;acc\u00e8s, permettant aux attaquants d&rsquo;acc\u00e9der aux syst\u00e8mes.<\/li>\n<li><strong>Perte ou Vol de Mat\u00e9riel<\/strong> : Perdre un ordinateur ou un t\u00e9l\u00e9phone non s\u00e9curis\u00e9 peut permettre \u00e0 quelqu&rsquo;un d&rsquo;acc\u00e9der aux donn\u00e9es stock\u00e9es.<\/li>\n<li><strong>Failles de S\u00e9curit\u00e9 Interne<\/strong> : Parfois, les failles proviennent de l&rsquo;int\u00e9rieur m\u00eame de l&rsquo;entreprise, que ce soit par une mauvaise configuration des syst\u00e8mes de s\u00e9curit\u00e9 ou par la n\u00e9gligence des r\u00e8gles de s\u00e9curit\u00e9 informatique.<\/li>\n<\/ol>\n<h3>Cons\u00e9quences d&rsquo;un Data Breach<\/h3>\n<p>Les impacts d&rsquo;un data breach peuvent \u00eatre d\u00e9vastateurs :<\/p>\n<ul>\n<li><strong>Perte de Confiance des Clients<\/strong> : Les clients dont les donn\u00e9es sont expos\u00e9es perdent confiance en l&rsquo;entreprise, ce qui peut nuire \u00e0 sa r\u00e9putation et entra\u00eener une baisse d&rsquo;activit\u00e9.<\/li>\n<li><strong>Amendes et Sanctions Juridiques<\/strong> : Des r\u00e9glementations comme le RGPD (R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es) imposent de lourdes amendes en cas de manquement \u00e0 la protection des donn\u00e9es.<\/li>\n<li><strong>Co\u00fbt de Rem\u00e9diation<\/strong> : Les entreprises doivent souvent investir massivement pour s\u00e9curiser leurs syst\u00e8mes apr\u00e8s une attaque et r\u00e9cup\u00e9rer les donn\u00e9es expos\u00e9es.<\/li>\n<li><strong>Risque pour les Individus<\/strong> : Les utilisateurs individuels peuvent faire face \u00e0 des risques de vol d&rsquo;identit\u00e9, d&rsquo;escroqueries, et d&rsquo;attaques cibl\u00e9es \u00e0 la suite de la fuite de leurs donn\u00e9es personnelles.<\/li>\n<\/ul>\n<h3>Comment Pr\u00e9venir un Data Breach<\/h3>\n<p>La pr\u00e9vention d\u2019une violation de donn\u00e9es repose sur une strat\u00e9gie de s\u00e9curit\u00e9 robuste et des bonnes pratiques :<\/p>\n<ol>\n<li><strong>Utilisation de Mots de Passe Forts<\/strong> : Les mots de passe faibles sont des cibles faciles. Il est recommand\u00e9 d&rsquo;utiliser des gestionnaires de mots de passe pour cr\u00e9er des mots de passe forts et uniques pour chaque compte.<\/li>\n<li><strong>Authentification Multi-Facteur (MFA)<\/strong> : L\u2019activation de la MFA ajoute une couche de s\u00e9curit\u00e9 en exigeant une v\u00e9rification suppl\u00e9mentaire (comme un code sur votre t\u00e9l\u00e9phone) en plus du mot de passe.<\/li>\n<li><strong>Formation des Employ\u00e9s<\/strong> : En formant les employ\u00e9s \u00e0 reconna\u00eetre les tentatives de phishing et les bonnes pratiques de cybers\u00e9curit\u00e9, on r\u00e9duit les erreurs humaines.<\/li>\n<li><strong>Mises \u00e0 Jour R\u00e9guli\u00e8res<\/strong> : Maintenir les logiciels \u00e0 jour permet de corriger les vuln\u00e9rabilit\u00e9s connues et r\u00e9duit les risques d&rsquo;exploitation par des attaquants.<\/li>\n<li><strong>Sauvegardes et Chiffrement des Donn\u00e9es<\/strong> : Les sauvegardes permettent de r\u00e9cup\u00e9rer les donn\u00e9es en cas de perte, tandis que le chiffrement les rend illisibles aux personnes non autoris\u00e9es.<\/li>\n<\/ol>\n<h3>Comment v\u00e9rifier si vos donn\u00e9es ont \u00e9t\u00e9 pirat\u00e9es ?<\/h3>\n<p>Pour v\u00e9rifier si vos donn\u00e9es ont \u00e9t\u00e9 pirat\u00e9es vous pouvez utiliser le site <a href=\"https:\/\/databreach.com\/\" target=\"_blank\" rel=\"noopener\">Databreach.com<\/a>.\u00a0 Sur le site vous pouvez renseigner l\u2019une de vos informations personnelles, comme votre adresse e-mail ou votre num\u00e9ro de t\u00e9l\u00e9phone. Le site vous informera ensuite des bases de donn\u00e9es o\u00f9 votre information a \u00e9t\u00e9 retrouv\u00e9e et fournira une description de la cyberattaque en question. Cerise sur le g\u00e2teau, le site ne stocke pas vos donn\u00e9es.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le terme data breach (ou violation de donn\u00e9es en fran\u00e7ais) d\u00e9signe un incident o\u00f9 des informations confidentielles ou sensibles sont expos\u00e9es \u00e0 des tiers non &hellip; <\/p>\n","protected":false},"author":2,"featured_media":22846,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[128],"class_list":["post-22845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","tag-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Qu&#039;est-ce qu&#039;un Data Breach et Pourquoi Est-Ce Crucial de s&#039;en Prot\u00e9ger ? - Labo JNG WEB<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce qu&#039;un Data Breach et Pourquoi Est-Ce Crucial de s&#039;en Prot\u00e9ger ? - Labo JNG WEB\" \/>\n<meta property=\"og:description\" content=\"Le terme data breach (ou violation de donn\u00e9es en fran\u00e7ais) d\u00e9signe un incident o\u00f9 des informations confidentielles ou sensibles sont expos\u00e9es \u00e0 des tiers non &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\" \/>\n<meta property=\"og:site_name\" content=\"Labo JNG WEB\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webmaster.referencement.dijon\" \/>\n<meta property=\"article:author\" content=\"https:\/\/fr-fr.facebook.com\/JNGWEB.webmaster\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-05T05:46:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-15T18:38:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jng-web.com\/labo\/wp-content\/uploads\/2024\/11\/databreach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1916\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"J\u00e9r\u00f4me\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"J\u00e9r\u00f4me\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\"},\"author\":{\"name\":\"J\u00e9r\u00f4me\",\"@id\":\"https:\/\/jng-web.com\/labo\/#\/schema\/person\/8dceaae857bc9738baa63b3d19fb4590\"},\"headline\":\"Qu&rsquo;est-ce qu&rsquo;un Data Breach et Pourquoi Est-Ce Crucial de s&rsquo;en Prot\u00e9ger ?\",\"datePublished\":\"2024-12-05T05:46:29+00:00\",\"dateModified\":\"2024-11-15T18:38:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\"},\"wordCount\":690,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/jng-web.com\/labo\/#organization\"},\"keywords\":[\"S\u00e9curit\u00e9\"],\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\",\"url\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\",\"name\":\"Qu'est-ce qu'un Data Breach et Pourquoi Est-Ce Crucial de s'en Prot\u00e9ger ? - Labo JNG WEB\",\"isPartOf\":{\"@id\":\"https:\/\/jng-web.com\/labo\/#website\"},\"datePublished\":\"2024-12-05T05:46:29+00:00\",\"dateModified\":\"2024-11-15T18:38:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Labo Jng Web\",\"item\":\"https:\/\/jng-web.com\/labo\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualit\u00e9s\",\"item\":\"https:\/\/jng-web.com\/labo\/actualites\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Qu&rsquo;est-ce qu&rsquo;un Data Breach et Pourquoi Est-Ce Crucial de s&rsquo;en Prot\u00e9ger ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jng-web.com\/labo\/#website\",\"url\":\"https:\/\/jng-web.com\/labo\/\",\"name\":\"Labo JNG WEB\",\"description\":\"R\u00e9f\u00e9rencement, Webmastering, CMS, Logiciels ...\",\"publisher\":{\"@id\":\"https:\/\/jng-web.com\/labo\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jng-web.com\/labo\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jng-web.com\/labo\/#organization\",\"name\":\"JNG WEB \/\/ J\u00e9r\u00f4me Guri\",\"url\":\"https:\/\/jng-web.com\/labo\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jng-web.com\/labo\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jng-web.com\/labo\/wp-content\/uploads\/2015\/04\/logo.png\",\"contentUrl\":\"https:\/\/jng-web.com\/labo\/wp-content\/uploads\/2015\/04\/logo.png\",\"width\":342,\"height\":110,\"caption\":\"JNG WEB \/\/ J\u00e9r\u00f4me Guri\"},\"image\":{\"@id\":\"https:\/\/jng-web.com\/labo\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webmaster.referencement.dijon\",\"https:\/\/twitter.com\/jng_web\",\"https:\/\/fr.linkedin.com\/in\/jeromeguri\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/jng-web.com\/labo\/#\/schema\/person\/8dceaae857bc9738baa63b3d19fb4590\",\"name\":\"J\u00e9r\u00f4me\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jng-web.com\/labo\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/21ca560712e7f1303d8c7c22d9ac9254b56517b653bfcb97d6736933471b2ea3?s=96&d=http%3A%2F%2Fwww.jng-web.com%2Flabo%2Fwp-content%2Fuploads%2F2013%2F12%2Favatar-blog-jng-web.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/21ca560712e7f1303d8c7c22d9ac9254b56517b653bfcb97d6736933471b2ea3?s=96&d=http%3A%2F%2Fwww.jng-web.com%2Flabo%2Fwp-content%2Fuploads%2F2013%2F12%2Favatar-blog-jng-web.png&r=g\",\"caption\":\"J\u00e9r\u00f4me\"},\"description\":\"Passionn\u00e9 par le web, je m'int\u00e9resse depuis quelques ann\u00e9es aux technologies de l'information et de la communication, et plus particuli\u00e8rement \u00e0 la cr\u00e9ation et au r\u00e9f\u00e9rencement de sites internet.\",\"sameAs\":[\"http:\/\/www.jng-web.com\",\"https:\/\/fr-fr.facebook.com\/JNGWEB.webmaster\",\"https:\/\/twitter.com\/JngWeb21\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu'est-ce qu'un Data Breach et Pourquoi Est-Ce Crucial de s'en Prot\u00e9ger ? - Labo JNG WEB","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/","og_locale":"fr_FR","og_type":"article","og_title":"Qu'est-ce qu'un Data Breach et Pourquoi Est-Ce Crucial de s'en Prot\u00e9ger ? - Labo JNG WEB","og_description":"Le terme data breach (ou violation de donn\u00e9es en fran\u00e7ais) d\u00e9signe un incident o\u00f9 des informations confidentielles ou sensibles sont expos\u00e9es \u00e0 des tiers non &hellip;","og_url":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/","og_site_name":"Labo JNG WEB","article_publisher":"https:\/\/www.facebook.com\/webmaster.referencement.dijon","article_author":"https:\/\/fr-fr.facebook.com\/JNGWEB.webmaster","article_published_time":"2024-12-05T05:46:29+00:00","article_modified_time":"2024-11-15T18:38:06+00:00","og_image":[{"width":1916,"height":910,"url":"https:\/\/jng-web.com\/labo\/wp-content\/uploads\/2024\/11\/databreach.png","type":"image\/png"}],"author":"J\u00e9r\u00f4me","twitter_misc":{"\u00c9crit par":"J\u00e9r\u00f4me","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#article","isPartOf":{"@id":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/"},"author":{"name":"J\u00e9r\u00f4me","@id":"https:\/\/jng-web.com\/labo\/#\/schema\/person\/8dceaae857bc9738baa63b3d19fb4590"},"headline":"Qu&rsquo;est-ce qu&rsquo;un Data Breach et Pourquoi Est-Ce Crucial de s&rsquo;en Prot\u00e9ger ?","datePublished":"2024-12-05T05:46:29+00:00","dateModified":"2024-11-15T18:38:06+00:00","mainEntityOfPage":{"@id":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/"},"wordCount":690,"commentCount":0,"publisher":{"@id":"https:\/\/jng-web.com\/labo\/#organization"},"keywords":["S\u00e9curit\u00e9"],"articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/","url":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/","name":"Qu'est-ce qu'un Data Breach et Pourquoi Est-Ce Crucial de s'en Prot\u00e9ger ? - Labo JNG WEB","isPartOf":{"@id":"https:\/\/jng-web.com\/labo\/#website"},"datePublished":"2024-12-05T05:46:29+00:00","dateModified":"2024-11-15T18:38:06+00:00","breadcrumb":{"@id":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jng-web.com\/labo\/quest-ce-quun-data-breach-et-pourquoi-est-ce-crucial-de-sen-proteger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Labo Jng Web","item":"https:\/\/jng-web.com\/labo\/"},{"@type":"ListItem","position":2,"name":"Actualit\u00e9s","item":"https:\/\/jng-web.com\/labo\/actualites\/"},{"@type":"ListItem","position":3,"name":"Qu&rsquo;est-ce qu&rsquo;un Data Breach et Pourquoi Est-Ce Crucial de s&rsquo;en Prot\u00e9ger ?"}]},{"@type":"WebSite","@id":"https:\/\/jng-web.com\/labo\/#website","url":"https:\/\/jng-web.com\/labo\/","name":"Labo JNG WEB","description":"R\u00e9f\u00e9rencement, Webmastering, CMS, Logiciels ...","publisher":{"@id":"https:\/\/jng-web.com\/labo\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jng-web.com\/labo\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/jng-web.com\/labo\/#organization","name":"JNG WEB \/\/ J\u00e9r\u00f4me Guri","url":"https:\/\/jng-web.com\/labo\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jng-web.com\/labo\/#\/schema\/logo\/image\/","url":"https:\/\/jng-web.com\/labo\/wp-content\/uploads\/2015\/04\/logo.png","contentUrl":"https:\/\/jng-web.com\/labo\/wp-content\/uploads\/2015\/04\/logo.png","width":342,"height":110,"caption":"JNG WEB \/\/ J\u00e9r\u00f4me Guri"},"image":{"@id":"https:\/\/jng-web.com\/labo\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webmaster.referencement.dijon","https:\/\/twitter.com\/jng_web","https:\/\/fr.linkedin.com\/in\/jeromeguri"]},{"@type":"Person","@id":"https:\/\/jng-web.com\/labo\/#\/schema\/person\/8dceaae857bc9738baa63b3d19fb4590","name":"J\u00e9r\u00f4me","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jng-web.com\/labo\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/21ca560712e7f1303d8c7c22d9ac9254b56517b653bfcb97d6736933471b2ea3?s=96&d=http%3A%2F%2Fwww.jng-web.com%2Flabo%2Fwp-content%2Fuploads%2F2013%2F12%2Favatar-blog-jng-web.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ca560712e7f1303d8c7c22d9ac9254b56517b653bfcb97d6736933471b2ea3?s=96&d=http%3A%2F%2Fwww.jng-web.com%2Flabo%2Fwp-content%2Fuploads%2F2013%2F12%2Favatar-blog-jng-web.png&r=g","caption":"J\u00e9r\u00f4me"},"description":"Passionn\u00e9 par le web, je m'int\u00e9resse depuis quelques ann\u00e9es aux technologies de l'information et de la communication, et plus particuli\u00e8rement \u00e0 la cr\u00e9ation et au r\u00e9f\u00e9rencement de sites internet.","sameAs":["http:\/\/www.jng-web.com","https:\/\/fr-fr.facebook.com\/JNGWEB.webmaster","https:\/\/twitter.com\/JngWeb21"]}]}},"views":1151,"_links":{"self":[{"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/posts\/22845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/comments?post=22845"}],"version-history":[{"count":0,"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/posts\/22845\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/media\/22846"}],"wp:attachment":[{"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/media?parent=22845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/categories?post=22845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jng-web.com\/labo\/wp-json\/wp\/v2\/tags?post=22845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}