{"id":1336,"date":"2022-03-07T15:33:57","date_gmt":"2022-03-07T15:33:57","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1336"},"modified":"2022-03-07T15:35:08","modified_gmt":"2022-03-07T15:35:08","slug":"des-compromissions-de-donnees-dorigine-interne","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/brands\/proofpoint\/des-compromissions-de-donnees-dorigine-interne\/","title":{"rendered":"Des compromissions de donn\u00e9es d&#8217;origine interne"},"content":{"rendered":"<h3>Exemples r\u00e9els de fuites de donn\u00e9es, de menaces internes et d&#8217;utilisateurs compromis<\/h3>\n<p>Les fuites de donn\u00e9es ne se produisent pas par magie. Ce sont les utilisateurs qui les d\u00e9clenchent. Elles peuvent r\u00e9sulter du partage accidentel d&#8217;un fichier, d&#8217;un acte de sabotage par un utilisateur interne malintentionn\u00e9, d&#8217;une erreur de configuration d&#8217;un serveur ou d&#8217;un utilisateur compromis. Quel que soit le sc\u00e9nario, les fuites de donn\u00e9es sont un probl\u00e8me humain. Cet eBook passe en revue cinq cas r\u00e9els de fuite de donn\u00e9es, notamment leurs points communs et leurs sp\u00e9cificit\u00e9s, et explique comment ils auraient pu \u00eatre \u00e9vit\u00e9s.<\/p>\n<p>[dlm_gf_form download_id=1333 ajax=&#8221;true&#8221;]<\/p>","protected":false},"excerpt":{"rendered":"<p>Exemples r\u00e9els de fuites de donn\u00e9es, de menaces internes et d&#8217;utilisateurs compromis Les fuites de donn\u00e9es ne se produisent pas&#8230;<\/p>","protected":false},"author":26,"featured_media":1334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54,16,44],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-french","category-information-technology","category-proofpoint"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Des compromissions de donn\u00e9es d&#039;origine interne - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des compromissions de donn\u00e9es d&#039;origine interne - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Exemples r\u00e9els de fuites de donn\u00e9es, de menaces internes et d&#8217;utilisateurs compromis Les fuites de donn\u00e9es ne se produisent pas...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T15:33:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-07T15:35:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1074\" \/>\n\t<meta property=\"og:image:height\" content=\"753\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/\",\"url\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/\",\"name\":\"Des compromissions de donn\u00e9es d'origine interne - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg\",\"datePublished\":\"2022-03-07T15:33:57+00:00\",\"dateModified\":\"2022-03-07T15:35:08+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg\",\"width\":1074,\"height\":753},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brands\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Proofpoint\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/proofpoint\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Des compromissions de donn\u00e9es d&#8217;origine interne\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des compromissions de donn\u00e9es d'origine interne - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/","og_locale":"de_DE","og_type":"article","og_title":"Des compromissions de donn\u00e9es d'origine interne - Techknowledge","og_description":"Exemples r\u00e9els de fuites de donn\u00e9es, de menaces internes et d&#8217;utilisateurs compromis Les fuites de donn\u00e9es ne se produisent pas...","og_url":"https:\/\/b2btechknowledge.net\/de\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/","og_site_name":"Techknowledge","article_published_time":"2022-03-07T15:33:57+00:00","article_modified_time":"2022-03-07T15:35:08+00:00","og_image":[{"width":1074,"height":753,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg","type":"image\/jpeg"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"John Gallacher","Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/","url":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/","name":"Des compromissions de donn\u00e9es d'origine interne - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg","datePublished":"2022-03-07T15:33:57+00:00","dateModified":"2022-03-07T15:35:08+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-FR.jpg","width":1074,"height":753},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/information-technology\/des-compromissions-de-donnees-dorigine-interne\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Brands","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/"},{"@type":"ListItem","position":3,"name":"Proofpoint","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/proofpoint\/"},{"@type":"ListItem","position":4,"name":"Des compromissions de donn\u00e9es d&#8217;origine interne"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/1334"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}