{"id":8442,"date":"2019-04-22T09:00:02","date_gmt":"2019-04-22T09:00:02","guid":{"rendered":"https:\/\/yeeply.com\/fr\/blog\/?p=6094"},"modified":"2024-05-07T13:06:48","modified_gmt":"2024-05-07T11:06:48","slug":"menaces-cybersecurite-2019","status":"publish","type":"post","link":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/","title":{"rendered":"5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 \u00e9viter en 2019"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">L\u2019am\u00e9lioration et le d\u00e9veloppement de nouvelles techniques sont visibles dans la sph\u00e8re du monde num\u00e9rique. Il n\u2019y a pas de diff\u00e9rence quant \u00e0 la s\u00e9curit\u00e9 internet, aussi bien en termes de <\/span><b>menaces que de protection<\/b><span style=\"font-weight: 300;\">. De nouvelles menaces \u00e0 la cybers\u00e9curit\u00e9 apparaissent quotidiennement et les cyber-attaques sont de plus en plus fr\u00e9quentes.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Les pirates informatiques attaquent les syst\u00e8mes des entreprises, les ordinateurs personnels et <\/span><b>trouvent diff\u00e9rents moyens de les exploiter<\/b><span style=\"font-weight: 300;\">. Pour assurer votre s\u00e9curit\u00e9, vous devez \u00eatre conscient des menaces \u00e0 la s\u00e9curit\u00e9 internet que vous \u00eates le plus susceptible de rencontrer. Par cons\u00e9quent, n\u2019attendez plus pour en savoir plus sur les cyber-attaques.<\/span><\/p>\n<div class=\"bt-proyecto\"><a href=\"https:\/\/yeeply.com\/fr\/transformation-digitale\/?rel=FR-BP-proyecto-transformacion#publish-project\" target=\"_blank\" rel=\"noopener noreferrer\">TROUVEZ LA MEILLEURE \u00c9QUIPE POUR VOTRE TRANSFORMATION DIGITALE<\/a><\/div>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Menaces \u00e0 la cybers\u00e9curit\u00e9 pour 2019<\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Jetez un coup d\u2019oeil \u00e0 notre liste des 5 menaces \u00e0 la cybers\u00e9curit\u00e9 dont vous devez \u00eatre conscient en 2019.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Ran\u00e7ongiciel<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Prot\u00e9ger vos donn\u00e9es est l\u2019une de vos priorit\u00e9s, particuli\u00e8rement si vous <\/span><b>montez un business<\/b><span style=\"font-weight: 300;\">. \u00a0Les entreprises accordent plus d\u2019importance \u00e0 leurs donn\u00e9es et \u00e0 leurs informations confidentielles qu&rsquo;\u00e0 autre chose. C\u2019est pour cette raison que les attaques ran\u00e7ongiciel sont de plus en plus communes. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Les experts pr\u00e9disent qu\u2019en 2019 le nombre d\u2019attaque ran\u00e7ongiciel atteindra un record. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Mais, <\/span><b>qu\u2019est-ce qu\u2019est vraiment une attaque ran\u00e7ongiciel<\/b><span style=\"font-weight: 300;\">?<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Si vous n\u2019en avez jamais entendu parler, le nom sugg\u00e8re la r\u00e9ponse. Un ran\u00e7ongiciel c\u2019est \u201c<\/span><i><span style=\"font-weight: 300;\">un logiciel malveillant qui prend en otage des donn\u00e9es personnelles. Pour ce faire, un ran\u00e7ongiciel chiffre des donn\u00e9es personnelles puis demande \u00e0 leur propri\u00e9taire d&rsquo;envoyer de l&rsquo;argent en \u00e9change de la cl\u00e9 qui permettra de les d\u00e9chiffrer.\u201d<\/span><\/i><span style=\"font-weight: 300;\"> (<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\">Wikipedia<\/span><\/a><span style=\"font-weight: 300;\">) <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">\u00c7a signifie que le logiciel atteint vos donn\u00e9es et \u00e0 moins que vous payez la ran\u00e7on, il pourra potentiellement les d\u00e9truire. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Les menaces avanc\u00e9es n\u00e9cessitent des mesures de protection avanc\u00e9es. Restez \u00e0 l&rsquo;aff\u00fbt de nouveaux <\/span><b>syst\u00e8mes de protection et des mises \u00e0 jour logiciels<\/b><span style=\"font-weight: 300;\"> pour prot\u00e9ger vos donn\u00e9es.<\/span><\/p>\n<figure id=\"attachment_6098\" aria-describedby=\"caption-attachment-6098\" style=\"width: 748px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-6098 size-full\" title=\"cybersecurite cadenas\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/cyber_security_threats-1.jpg\" alt=\"cybersecurite cadenas\" width=\"748\" height=\"449\" \/><figcaption id=\"caption-attachment-6098\" class=\"wp-caption-text\">Source : <a href=\"https:\/\/pixabay.com\/illustrations\/cyber-security-protection-technology-3400657\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\">Pixabay<\/span><\/a><\/figcaption><\/figure>\n<h3><span style=\"font-weight: 400;\">2. Cryptominage<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">les pirates informatiques se donnent du mal pour r\u00e9aliser de brillantes cyber-attaques et ce n\u2019est pas pour leur plaisir. Le but premier de ces attaques est toujours le m\u00eame : gagner de l\u2019argent.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">C\u2019est la raison pour laquelle ces pirates informatiques ont tendance \u00e0 vous voler directement ou tentent d\u2019\u00eatre encore plus sournois : <\/span><b>en faisant de vous leur propre main-d\u2019oeuvre.<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">C\u2019est exactement ce dont traite le cryptominage ou cryptojacking.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">\u00c7a fait r\u00e9f\u00e9rence aux logiciels et composants malveillants d\u00e9velopp\u00e9s pour prendre le contr\u00f4le des ressources d\u2019un ordinateur et par la suite les utiliser pour exploiter de la crypto monnaie sans demander la permission de l\u2019utilisateur.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">D\u00e9composons-le un peu : <\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">un hacker vous manipule pour pouvoir installer un cryptominer<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">ils utilisent la puissance de traitement de votre ordinateur<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">votre ordinateur devient une r\u00e9elle mine pour les crypto-monnaies<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">vous n\u2019avez pas la moindre id\u00e9e de ce qu\u2019il se passe<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">le seul sympt\u00f4me c\u2019est que votre ordinateur est ralenti<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Voici comment votre ordinateur devient une mine d\u2019or pour l\u2019hacker qui vous laisse dans l\u2019ignorance.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Pour vous prot\u00e9ger du crypto jacking, gardez vos <\/span><b>antivirus<\/b><span style=\"font-weight: 300;\"> \u00e0 jour et fonctionnels et d&rsquo;autre part, activez les <\/span><b>bloqueurs d\u2019annonces<\/b><span style=\"font-weight: 300;\"> dans votre navigateur.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><i><span style=\"font-weight: 300;\">A essayer | <\/span><\/i><a href=\"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/securite-developpement-mobile-autorisations\/\"><i><span style=\"font-weight: 300;\">La s\u00e9curit\u00e9 en d\u00e9veloppement mobile<\/span><\/i><\/a><\/p>\n<h3><span style=\"font-weight: 400;\">3. Hame\u00e7onnage<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">L\u2019une des fa\u00e7ons les plus efficaces pour un pirate informatique de <\/span><b>d\u00e9rober vos informations confidentielles <\/b><span style=\"font-weight: 300;\">c\u2019est de pr\u00e9tendre \u00eatre quelqu\u2019un qu\u2019il n\u2019est pas.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">La technique de l\u2019hame\u00e7onnage consiste \u201c<\/span><i><span style=\"font-weight: 300;\">\u00e0 faire croire \u00e0 la victime qu&rsquo;elle s&rsquo;adresse \u00e0 un tiers de confiance \u2014 banque, administration, etc. \u2014 afin de lui soutirer des renseignements personnels : <\/span><\/i><i><span style=\"font-weight: 300;\">mot<\/span><\/i><i><span style=\"font-weight: 300;\"> de passe<\/span><\/i><i><span style=\"font-weight: 300;\">, num\u00e9ro de <\/span><\/i><i><span style=\"font-weight: 300;\">carte de cr\u00e9dit<\/span><\/i><i><span style=\"font-weight: 300;\">, num\u00e9ro ou photocopie de la <\/span><\/i><i><span style=\"font-weight: 300;\">carte nationale d&rsquo;identit\u00e9<\/span><\/i><i><span style=\"font-weight: 300;\">, date de naissance, etc<\/span><\/i><span style=\"font-weight: 300;\">\u201d (<\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Hame\u00e7onnage\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\">Wikipedia<\/span><\/a><span style=\"font-weight: 300;\">)<\/span><\/p>\n<p><!--HubSpot Call-to-Action Code --><!-- end HubSpot Call-to-Action Code --><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">En d\u2019autres mots, l\u2019hacker vous envoie un courriel ou un message pr\u00e9tendant \u00eatre : <\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">votre PDG<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">Google<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">une autre entreprise<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">un site de confiance<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Si vous ne r\u00e9alisez pas que le message est une arnaque et que vous cliquez sur le lien que l\u2019on vous a envoy\u00e9, ouvrez la pi\u00e8ce jointe ou dans la plupart des cas ouvrez seulement le message vous d\u00e9clenchez l\u2019attaque. En d&rsquo;autres termes, cela signifie que l\u2019hacker aura acc\u00e8s \u00e0 vos :<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">d\u00e9tails de carte de cr\u00e9dit<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">mots de passe<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">identifiants<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">informations d\u2019entreprise<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">informations personnelles<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Dans le but d\u2019\u00e9viter de devenir une victime de l\u2019hame\u00e7onnage, vous devez \u00eatre conscient des circonstances dans lesquels il se produit. Par cons\u00e9quent, renseignez-vous sur comment les reconna\u00eetre et <\/span><b>prot\u00e9gez vous vous et votre business<\/b><span style=\"font-weight: 300;\"> des potentielles pertes financi\u00e8res et commerciales.<\/span><\/p>\n<figure id=\"attachment_6099\" aria-describedby=\"caption-attachment-6099\" style=\"width: 748px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-6099 size-full\" title=\"smartphone et cybersecurite\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/cyber_security_threats_apps-1.jpg\" alt=\"smartphone et cybersecurite\" width=\"748\" height=\"499\" \/><figcaption id=\"caption-attachment-6099\" class=\"wp-caption-text\">Source : <a href=\"https:\/\/pixabay.com\/photos\/cyber-security-smartphone-cell-phone-2765707\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\"> Pixabay<\/span><\/a><\/figcaption><\/figure>\n<h3><span style=\"font-weight: 400;\">4. Botnets<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Les pirates informatiques ont une autre technique pour faire de votre ordinateur leur serviteur et pouvoir exploiter sa puissance afin de r\u00e9aliser des <\/span><b>attaques \u00e0 grande \u00e9chelle et vous arnaque<\/b><span style=\"font-weight: 300;\">r. Voici ce que sont les botnets et comment ils fonctionnent. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Comme le d\u00e9finit le \u00a0<\/span><a href=\"https:\/\/en.oxforddictionaries.com\/definition\/botnet\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\">Oxford Dictionary<\/span><\/a><span style=\"font-weight: 300;\">; un botnet est un r\u00e9seau d\u2019ordinateurs priv\u00e9s infect\u00e9s par des logiciels malveillants et contr\u00f4l\u00e9s comme un groupe \u00e0 l\u2019insu de leur propri\u00e9taire. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Voici comment il fonctionne: <\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">un hacker cr\u00e9\u00e9 un logiciel malveillant pour prendre le contr\u00f4le de milliers d\u2019ordinateurs<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">ce logiciel fait de votre ordinateur et de milliers d\u2019autres ses serviteurs et utilisent leur puissance pour r\u00e9aliser des attaques \u00e0 grande \u00e9chelle<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">ce r\u00e9seau d\u2019ordinateurs pirat\u00e9s est contr\u00f4l\u00e9 \u00e0 distance par un r\u00e9seau de Command &amp; Control <\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Une fois que l\u2019hacker a cr\u00e9\u00e9 cet outil puissant et pirat\u00e9 les ordinateurs il commence \u00e0 attaquer les syst\u00e8mes, voler des informations, menace de faire couler le syst\u00e8me et demande de l\u2019argent. C\u2019est <\/span><b>une des menaces \u00e0 la cybers\u00e9curit\u00e9 les plus importantes<\/b><span style=\"font-weight: 300;\">.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Le pire c\u2019est qu\u2019il est difficile de d\u00e9tecter que vous faites partie d\u2019un botnet. Vous pouvez remarquer que votre ordinateur est plus lent que d\u2019habitude mais c\u2019est votre seul indice. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Pour vous prot\u00e9ger de la menace botnet, assurez-vous que vos <\/span><b>protections antivirus \u00a0et vos logiciels de s\u00e9curit\u00e9 <\/b><span style=\"font-weight: 300;\">fonctionnent toujours correctement.<\/span><\/p>\n<p><a href=\"https:\/\/yeeply.com\/fr\/landing\/telecharger-ebook-transformation-digitale-pme\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2020\/06\/FR-E6-Banner-blog-1020x387-1.png\" alt=\"E6 Ebook transformaci\u00f3n digital\" \/><\/a><\/p>\n<h3><span style=\"font-weight: 400;\">5. Virus et parasites <\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Malgr\u00e9 que les virus et les parasites existent depuis longtemps, volant la s\u00e9curit\u00e9 et \u00e9tant \u00e0 l\u2019origine de beaucoup d\u2019attaques sur internet, ils restent une grande menace pour toutes les personnes en possession d\u2019un ordinateur. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Avec chaque ann\u00e9e \u00e0 venir et des syst\u00e8mes de s\u00e9curit\u00e9 qui apportent de l\u2019innovation et des am\u00e9liorations, <\/span><b>les virus et parasites deviennent plus dangereux et r\u00e9sistants que jamais.<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Les virus et parasites informatiques sont des programmes nuisibles, malveillant et destructeurs con\u00e7us pour infecter les syst\u00e8mes, d\u00e9truire les donn\u00e9es et ainsi, emp\u00eacher le bon fonctionnement du r\u00e9seau.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Le virus et les parasites fonctionnent de la m\u00eame fa\u00e7on ils : <\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">sont joint \u00e0 une pi\u00e8ce jointe, un document, un syst\u00e8me<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">entrent dans votre syst\u00e8me<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">commencent \u00e0 se multiplier entre eux<\/span><\/li>\n<li style=\"font-weight: 300;\"><span style=\"font-weight: 300;\">infectent votre syst\u00e8me <\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Si votre syst\u00e8me n\u2019est pas prot\u00e9g\u00e9 ou poss\u00e8de une protection inad\u00e9quate, vous pouvez facilement devenir la victime de virus ou de parasites informatiques et par cons\u00e9quent, victime \u00e9galement de beaucoup d\u2019autres cyber-attaques puissantes. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">Assurez-vous de <\/span><a href=\"http:\/\/federalnewsradio.com\/commentary\/2018\/07\/critical-cybersecurity-rules-every-federal-employee-should-know-follow\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\">prot\u00e9ger tous vos appareils <\/span><\/a><span style=\"font-weight: 300;\">en installant un <\/span><b>antilogiciel espion<\/b><span style=\"font-weight: 300;\"> et en le gardant toujours \u00e0 jour. \u00c7a vous aidera \u00e0 prot\u00e9ger votre syst\u00e8me et \u00e0 repousser les virus et les parasites avant qu\u2019ils ne vous atteignent. \u00a0<\/span><\/p>\n<figure id=\"attachment_6100\" aria-describedby=\"caption-attachment-6100\" style=\"width: 748px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-6100 size-full\" title=\"liste de choses a faire et ordinateur sur bureau\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/threats_cybersecurity_todo-list-1.jpg\" alt=\"liste de choses a faire et ordinateur sur bureau\" width=\"748\" height=\"499\" \/><figcaption id=\"caption-attachment-6100\" class=\"wp-caption-text\">Source : <a href=\"https:\/\/burst.shopify.com\/photos\/security-todo-list-in-notebook?q=cyber+security\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 300;\">Burst<\/span><\/a><\/figcaption><\/figure>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Derni\u00e8res remarques <\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">L\u2019ann\u00e9e 2019 est tr\u00e8s certainement porteuse de beaucoup de menaces \u00e0 la cybers\u00e9curit\u00e9. Vous \u00eates constamment confront\u00e9 au risque d\u2019\u00eatre pi\u00e9g\u00e9, escroqu\u00e9 ou encore exploit\u00e9 par des pirates informatiques. Assurez-vous de s\u00e9curiser votre ordinateur et votre syst\u00e8me pour ne pas \u00eatre victime d\u2019une <\/span><b>cyber-attaque<\/b><span style=\"font-weight: 300;\">.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 300;\">J\u2019esp\u00e8re que la liste des menaces au-dessus vous aidera \u00e0 d\u00e9tecter \u00e0 l\u2019avenir les potentiels pirates informatiques ou escroqueurs. Cependant, faire appel \u00e0 un sp\u00e9cialiste peut vous aider \u00e0 \u00e9viter toutes cyber-attaques. Mieux vaut pr\u00e9venir que gu\u00e9rir.<\/span><\/p>\n<p><a href=\"https:\/\/yeeply.com\/fr\/transformation-digitale\/?rel=FR-BP-proyecto-transformacion#publish-project\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2020\/07\/FR-CTA-Banner-Digital-Transformation.png\" alt=\"Projet Transformation Digitale\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019am\u00e9lioration et le d\u00e9veloppement de nouvelles techniques sont visibles dans la sph\u00e8re du monde num\u00e9rique. Il n\u2019y a pas de diff\u00e9rence quant \u00e0 la s\u00e9curit\u00e9 &#8230;<\/p>\n","protected":false},"author":2,"featured_media":8189,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[641],"tags":[],"class_list":["post-8442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tendances-competences"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les 5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 conna\u00eetre en 2019<\/title>\n<meta name=\"description\" content=\"Le ran\u00e7ongiciel et l\u2019hame\u00e7onnage sont parmi les menaces \u00e0 la cybers\u00e9curit\u00e9 en 2019. D\u00e9couvrez comment les \u00e9viter pour prot\u00e9ger votre entreprise ! \u2705\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les 5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 conna\u00eetre en 2019\" \/>\n<meta property=\"og:description\" content=\"Le ran\u00e7ongiciel et l\u2019hame\u00e7onnage sont parmi les menaces \u00e0 la cybers\u00e9curit\u00e9 en 2019. D\u00e9couvrez comment les \u00e9viter pour prot\u00e9ger votre entreprise ! \u2705\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"Yeeply\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YeeplyMobile\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-22T09:00:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T11:06:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"748\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yeeply\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:site\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christopher Mercer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/\"},\"author\":{\"name\":\"Yeeply\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\"},\"headline\":\"5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 \u00e9viter en 2019\",\"datePublished\":\"2019-04-22T09:00:02+00:00\",\"dateModified\":\"2024-05-07T11:06:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/\"},\"wordCount\":1405,\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/748x493_cybersecurity_threats_2019-2.jpg\",\"articleSection\":[\"Tendances et Comp\u00e9tences\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/\",\"name\":\"Les 5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 conna\u00eetre en 2019\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/748x493_cybersecurity_threats_2019-2.jpg\",\"datePublished\":\"2019-04-22T09:00:02+00:00\",\"dateModified\":\"2024-05-07T11:06:48+00:00\",\"description\":\"Le ran\u00e7ongiciel et l\u2019hame\u00e7onnage sont parmi les menaces \u00e0 la cybers\u00e9curit\u00e9 en 2019. D\u00e9couvrez comment les \u00e9viter pour prot\u00e9ger votre entreprise ! \u2705\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#primaryimage\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/748x493_cybersecurity_threats_2019-2.jpg\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/748x493_cybersecurity_threats_2019-2.jpg\",\"width\":748,\"height\":493,\"caption\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/tendances-competences\\\/menaces-cybersecurite-2019\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 \u00e9viter en 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/\",\"name\":\"Yeeply\",\"description\":\"A platform for the development of digital projects\",\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#organization\",\"name\":\"Yeeply\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"width\":360,\"height\":120,\"caption\":\"Yeeply\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YeeplyMobile\\\/\",\"https:\\\/\\\/x.com\\\/Yeeply_EN\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/yeeply\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\",\"name\":\"Yeeply\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"caption\":\"Yeeply\"},\"url\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les 5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 conna\u00eetre en 2019","description":"Le ran\u00e7ongiciel et l\u2019hame\u00e7onnage sont parmi les menaces \u00e0 la cybers\u00e9curit\u00e9 en 2019. D\u00e9couvrez comment les \u00e9viter pour prot\u00e9ger votre entreprise ! \u2705","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/","og_locale":"fr_FR","og_type":"article","og_title":"Les 5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 conna\u00eetre en 2019","og_description":"Le ran\u00e7ongiciel et l\u2019hame\u00e7onnage sont parmi les menaces \u00e0 la cybers\u00e9curit\u00e9 en 2019. D\u00e9couvrez comment les \u00e9viter pour prot\u00e9ger votre entreprise ! \u2705","og_url":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/","og_site_name":"Yeeply","article_publisher":"https:\/\/www.facebook.com\/YeeplyMobile\/","article_published_time":"2019-04-22T09:00:02+00:00","article_modified_time":"2024-05-07T11:06:48+00:00","og_image":[{"width":748,"height":493,"url":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg","type":"image\/jpeg"}],"author":"Yeeply","twitter_card":"summary_large_image","twitter_creator":"@Yeeply_EN","twitter_site":"@Yeeply_EN","twitter_misc":{"\u00c9crit par":"Christopher Mercer","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#article","isPartOf":{"@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/"},"author":{"name":"Yeeply","@id":"https:\/\/yeeply.com\/fr\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14"},"headline":"5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 \u00e9viter en 2019","datePublished":"2019-04-22T09:00:02+00:00","dateModified":"2024-05-07T11:06:48+00:00","mainEntityOfPage":{"@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/"},"wordCount":1405,"publisher":{"@id":"https:\/\/yeeply.com\/fr\/#organization"},"image":{"@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg","articleSection":["Tendances et Comp\u00e9tences"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/","url":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/","name":"Les 5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 conna\u00eetre en 2019","isPartOf":{"@id":"https:\/\/yeeply.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#primaryimage"},"image":{"@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg","datePublished":"2019-04-22T09:00:02+00:00","dateModified":"2024-05-07T11:06:48+00:00","description":"Le ran\u00e7ongiciel et l\u2019hame\u00e7onnage sont parmi les menaces \u00e0 la cybers\u00e9curit\u00e9 en 2019. D\u00e9couvrez comment les \u00e9viter pour prot\u00e9ger votre entreprise ! \u2705","breadcrumb":{"@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#primaryimage","url":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg","contentUrl":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg","width":748,"height":493,"caption":""},{"@type":"BreadcrumbList","@id":"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yeeply.com\/fr\/"},{"@type":"ListItem","position":2,"name":"5 menaces \u00e0 la cybers\u00e9curit\u00e9 \u00e0 \u00e9viter en 2019"}]},{"@type":"WebSite","@id":"https:\/\/yeeply.com\/fr\/#website","url":"https:\/\/yeeply.com\/fr\/","name":"Yeeply","description":"A platform for the development of digital projects","publisher":{"@id":"https:\/\/yeeply.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yeeply.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/yeeply.com\/fr\/#organization","name":"Yeeply","url":"https:\/\/yeeply.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/yeeply.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","contentUrl":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","width":360,"height":120,"caption":"Yeeply"},"image":{"@id":"https:\/\/yeeply.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YeeplyMobile\/","https:\/\/x.com\/Yeeply_EN","https:\/\/www.linkedin.com\/company\/yeeply"]},{"@type":"Person","@id":"https:\/\/yeeply.com\/fr\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14","name":"Yeeply","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","caption":"Yeeply"},"url":""}]}},"uagb_featured_image_src":{"full":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",748,493,false],"thumbnail":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2-150x150.jpg",150,150,true],"medium":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2-300x198.jpg",300,198,true],"medium_large":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",640,422,false],"large":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",640,422,false],"1536x1536":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",748,493,false],"2048x2048":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",748,493,false],"gform-image-choice-sm":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",300,198,false],"gform-image-choice-md":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",400,264,false],"gform-image-choice-lg":["https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/04\/748x493_cybersecurity_threats_2019-2.jpg",600,395,false]},"uagb_author_info":{"display_name":"Christopher Mercer","author_link":""},"uagb_comment_info":0,"uagb_excerpt":"L\u2019am\u00e9lioration et le d\u00e9veloppement de nouvelles techniques sont visibles dans la sph\u00e8re du monde num\u00e9rique. Il n\u2019y a pas de diff\u00e9rence quant \u00e0 la s\u00e9curit\u00e9 ...","_links":{"self":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts\/8442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/comments?post=8442"}],"version-history":[{"count":1,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts\/8442\/revisions"}],"predecessor-version":[{"id":18223,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts\/8442\/revisions\/18223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/media\/8189"}],"wp:attachment":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/media?parent=8442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/categories?post=8442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/tags?post=8442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}