{"id":617,"date":"2015-10-02T10:59:59","date_gmt":"2015-10-02T09:59:59","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=617"},"modified":"2015-10-06T18:56:43","modified_gmt":"2015-10-06T17:56:43","slug":"cout-cybercriminalite","status":"publish","type":"post","link":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite","title":{"rendered":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d&rsquo;euros"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>Selon un\u00a0nouveau rapport publi\u00e9 par Allianz Corporate &amp; Specialty et intitul\u00e9 Un guide pour les Cyber-Risques: g\u00e9rer l&rsquo;impact du d\u00e9veloppement\u00a0de l&rsquo;interconnectivit\u00e9 (<a href=\"http:\/\/www.agcs.allianz.com\/assets\/PDFs\/risk%20bulletins\/CyberRiskGuide.pdf\" target=\"_blank\">A guide to Cyber-Risk &#8211; Managing the Impact of Increasing Interconnectivity<\/a>) r\u00e9v\u00e8le que la cybercriminalit\u00e9 co\u00fbte, dans le monde, 445 milliards\u00a0de dollars US\u00a0par ann\u00e9e, soit environ 400 milliards d&rsquo;euros ou encore l&rsquo;\u00e9quivalent du budget total de la France, avec les dix premi\u00e8res \u00e9conomies mondiales repr\u00e9sentant plus de 50% des co\u00fbts \u00e0 elles seules. Depuis 2005 il ya eu 5,029 incidents signal\u00e9s de violation de donn\u00e9es aux \u00c9tats-Unis seulement, et au moins 200 infractions en Europe impliquant 227 millions d&rsquo;enregistrements.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" target=\"_blank\" rel=\"Author\"><img loading=\"lazy\" class=\"aligncenter wp-image-619\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9.jpeg?resize=640%2C427\" alt=\"cybercriminalit\u00e9\" width=\"640\" height=\"427\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9.jpeg?resize=300%2C200 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9.jpeg?resize=75%2C50 75w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9.jpeg?w=424 424w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">On estime que le co\u00fbt moyen de chaque attaque sur les\u00a0donn\u00e9es est de 3,8 millions $, ce qui repr\u00e9sente\u00a0\u00a0une augmentation de plus de 15% en un an.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Cybercriminalit\u00e9: des risques tr\u00e8s sous-estim\u00e9s<\/strong><\/h2>\n<p style=\"text-align: justify;\">Le rapport nous informe que le risque de cyber-attaque est celui qui est le plus sous estim\u00e9 par les Entreprises bien que tout le monde soit aujourd&rsquo;hui une cible.<\/p>\n<p style=\"text-align: justify;\">73% des participants\u00a0\u00e0 l&rsquo;enqu\u00eate\u00a0Allianz 2015 consid\u00e8rent\u00a0que la sous-estimation des cyber-risques emp\u00eache les entreprises de s&rsquo;y pr\u00e9parer correctement. Parmi les autres obstacles on trouve\u00a0les contraintes budg\u00e9taires (59%), l&rsquo;insuffisance d&rsquo;analyse du\u00a0probl\u00e8me (54%), l&rsquo;infrastructure informatique qui n&rsquo;est pas adapt\u00e9e\u00a0\u00e0 des changements majeurs (30%) et l&rsquo;impossibilit\u00e9 d&rsquo;identifier le personnel comp\u00e9tent (10%).<\/p>\n<p style=\"text-align: justify;\">L&rsquo;enqu\u00eate montre \u00e9galement que les\u00a0\u00c9tats-Unis ont\u00a0des niveaux plus \u00e9lev\u00e9s de sensibilisation\u00a0au cyber-risque en\u00a0raison de leurs lois\u00a0plus s\u00e9v\u00e8res que dans les autres pays. La majorit\u00e9 des \u00c9tats am\u00e9ricains exigent des\u00a0entreprises qu&rsquo;elles informent les personnes victimes d&rsquo;une\u00a0violation. L&rsquo;Europe se dirige dans la m\u00eame direction, avec l&rsquo;Union europ\u00e9enne (UE) qui est actuellement en train de finaliser\u00a0sa loi sur la protection des donn\u00e9es, pr\u00e9vue pour \u00eatre introduite fin 2015, qui pr\u00e9voit\u00a0d&rsquo;introduire une r\u00e9glementation\u00a0beaucoup plus strictes en termes de violations de donn\u00e9es.<\/p>\n<p style=\"text-align: justify;\">Les chiffres\u00a0montrent clairement une augmentation sensible des\u00a0cyberattaques qui deviennent dans le m\u00eame temps de\u00a0plus en plus fr\u00e9quentes et sophistiqu\u00e9es. Le nombre de cyber-attaques d\u00e9tect\u00e9es a augment\u00e9 de 48% en 2014 selon le rapport publi\u00e9 cette ann\u00e9e par PwC.<\/p>\n<p style=\"text-align: justify;\">Afin de se prot\u00e9ger contre les failles de s\u00e9curit\u00e9, les entreprises devraient identifier quels sont leurs\u00a0actifs \u00a0cl\u00e9 \u00e0 risque et prendre des d\u00e9cisions \u00e9clairer sur leur comportement vis \u00e0 vis de ces risques : les accepter, les \u00e9viter, les att\u00e9nuer ou encore les\u00a0transf\u00e9rer.<\/p>\n<h2 style=\"text-align: justify;\"><strong>La tendance de l&rsquo;\u00e9volution<\/strong><\/h2>\n<p style=\"text-align: justify;\">Le rapport d&rsquo;Allianz\u00a0pr\u00e9voit que les entreprises seront de plus en plus expos\u00e9es\u00a0au cyber-risques au niveau de leur\u00a0cha\u00eene d&rsquo;approvisionnement et que nous n&rsquo;avons pas encore \u00e9t\u00e9 les t\u00e9moins d&rsquo;un \u00e9v\u00e9nement majeur de cybercriminalit\u00e9 aux\u00a0proportions v\u00e9ritablement catastrophiques.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Jens Krickhahn, Practice Leader chez AGCS\u00a0Cyber &amp; Fidelity Europe Centrale et de l&rsquo;Est , explique:<\/p>\n<p style=\"text-align: justify;\"><em>\u00ab\u00a0Les \u00e9changes commerciaux avec les partenaires sont de plus en plus r\u00e9alis\u00e9s \u00e9lectroniquement.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>M\u00eame si une soci\u00e9t\u00e9 a confiance dans\u00a0ses propres contr\u00f4les IT, elle\u00a0demeure expos\u00e9e au cyber-risque par le biais de ses partenaires d&rsquo;affaires, de ses sous-traitants et de sa\u00a0cha\u00eene d&rsquo;approvisionnement.\u00a0\u00bb<\/em><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">L&rsquo;Internet des objets est consid\u00e9r\u00e9 comme l&rsquo;un des facteurs les plus importants qui vont changer le visage de cyber-menaces conduisant \u00e0 des risques interconnect\u00e9s. Il va exacerber les vuln\u00e9rabilit\u00e9s\u00a0et\u00a0augmenter de fa\u00e7on notable\u00a0le potentiel de perte physique\u00a0et de violation des donn\u00e9es.<\/p>\n<h2 style=\"text-align: justify;\"><strong>\u00a0Alors, on fait quoi?<\/strong><\/h2>\n<p style=\"text-align: justify;\">La direction de la Communication du Gouvernement Britannique (GCHQ) consid\u00e8re qu&rsquo;approximativement 80% des cyber-attaques pourraient \u00eatre emp\u00each\u00e9es ou leur impact r\u00e9duit gr\u00e2ce\u00a0une gestion \u00e9l\u00e9mentaire\u00a0des cyber-risques bas\u00e9e sur des bonnes pratiques tr\u00e8s simples :<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 1:<\/strong>\u00a0Mettre en place une structure de gouvernance efficace, maintenir l&rsquo;engagement fort du\u00a0conseil<br \/>\nd&rsquo;administration et produire des politiques de s\u00e9curit\u00e9 de l&rsquo;information adapt\u00e9es\u00a0qui devraient inclure:<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 2 :<\/strong>\u00a0La sensibilisation et la formation\u00a0de l&rsquo;ensemble du personnel<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 3 :\u00a0<\/strong>Suivi des politiques et des proc\u00e9dures pour tous les r\u00e9seaux et syst\u00e8mes<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 4 :<\/strong>\u00a0Proc\u00e9dures de gestion des incidents, y compris la r\u00e9ponse et la reprise apr\u00e8s sinistre<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 5 :<\/strong>\u00a0Les politiques et les proc\u00e9dures de s\u00e9curit\u00e9 des r\u00e9seaux<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 6 :<\/strong> Gestion et contr\u00f4le des privil\u00e8ges utilisateurs<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 7 :<\/strong> Lignes directrices de s\u00e9curisation des configurations<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 8 :<\/strong> Proc\u00e9dures de protection contre les malwares<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 9 :<\/strong>\u00a0Contr\u00f4le de l&rsquo;utilisation de supports amovibles<\/p>\n<p style=\"text-align: justify;\"><strong>Etape 10 :<\/strong>\u00a0Proc\u00e9dures de contr\u00f4le des terminaux mobiles et du t\u00e9l\u00e9-travail<\/p>\n<p style=\"text-align: justify;\">La gestion des risques de s\u00e9curit\u00e9 \u00a0de l&rsquo;information est au c\u0153ur de la norme ISO 27001, la norme internationale qui d\u00e9finit les sp\u00e9cifications d&rsquo;un syst\u00e8me de gestion de s\u00e9curit\u00e9 de l&rsquo;information (SMSI).<\/p>\n<p style=\"text-align: justify;\">ISO 27001 exige que, pour obtenir la conformit\u00e9 \u00e0 la norme, les organisations effectuent des \u00e9valuations des risques fond\u00e9es sur des crit\u00e8res\u00a0d\u00e9finis. Le r\u00e9sultat de l&rsquo;\u00e9valuation du risque permettra \u00e0 l&rsquo;entreprise d&rsquo;\u00e9quilibrer les\u00a0co\u00fbts\u00a0des\u00a0contr\u00f4les de s\u00e9curit\u00e9 \u00e0 impl\u00e9menter et \u00e0 maintenir avec le co\u00fbt du pr\u00e9judice\u00a0que\u00a0l&rsquo;entreprise est susceptible de subir suite \u00e0 des\u00a0failles\u00a0de s\u00e9curit\u00e9.<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Co%C3%BBt%20de%20la%20cybercriminalit%C3%A9%20%3A%20400%20milliards%20d%27euros&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fcout-cybercriminalite&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"7469bb2e8a\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-617\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-617\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-617\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-617\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Selon un\u00a0nouveau rapport publi\u00e9 par Allianz Corporate &amp; Specialty et intitul\u00e9 Un guide pour les Cyber-Risques: g\u00e9rer l&rsquo;impact du d\u00e9veloppement\u00a0de l&rsquo;interconnectivit\u00e9 (A guide to Cyber-Risk &#8211; Managing the Impact of Increasing Interconnectivity) r\u00e9v\u00e8le que la cybercriminalit\u00e9 co\u00fbte, dans le monde, 445 milliards\u00a0de dollars US\u00a0par ann\u00e9e, soit environ 400 milliards d&rsquo;euros ou encore l&rsquo;\u00e9quivalent du&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Co%C3%BBt%20de%20la%20cybercriminalit%C3%A9%20%3A%20400%20milliards%20d%27euros&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fcout-cybercriminalite&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"7469bb2e8a\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-617\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-617\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-617\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-617\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[62],"tags":[101,127,69,126,64,68,114,125,100,87,109],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d&#039;euros - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"Le co\u00fbt annuel de la cybercriminalit\u00e9 avoisine les 400 milliards d&#039;euros soit environ le budget de la France ou la moiti\u00e9 du budget des USA. Que faire?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d&#039;euros\" \/>\n<meta property=\"og:description\" content=\"Le co\u00fbt annuel de la cybercriminalit\u00e9 avoisine les 400 milliards d&#039;euros soit environ le budget de la France ou la moiti\u00e9 du budget des USA. Que faire?\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-02T09:59:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-06T17:56:43+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9-300x200.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\\u00e9.jpeg?fit=424%2C283\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\\u00e9.jpeg?fit=424%2C283\",\"width\":424,\"height\":283,\"caption\":\"cybercriminalit\\u00e9\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#webpage\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\",\"name\":\"Co\\u00fbt de la cybercriminalit\\u00e9 : 400 milliards d'euros - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#primaryimage\"},\"datePublished\":\"2015-10-02T09:59:59+00:00\",\"dateModified\":\"2015-10-06T17:56:43+00:00\",\"description\":\"Le co\\u00fbt annuel de la cybercriminalit\\u00e9 avoisine les 400 milliards d'euros soit environ le budget de la France ou la moiti\\u00e9 du budget des USA. Que faire?\",\"breadcrumb\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Co\\u00fbt de la cybercriminalit\\u00e9 : 400 milliards d&rsquo;euros\"}]},{\"@type\":\"Article\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#webpage\"},\"author\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"Co\\u00fbt de la cybercriminalit\\u00e9 : 400 milliards d&rsquo;euros\",\"datePublished\":\"2015-10-02T09:59:59+00:00\",\"dateModified\":\"2015-10-06T17:56:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#webpage\"},\"wordCount\":871,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\\u00e9-300x200.jpeg\",\"keywords\":[\"cyber-r\\u00e9silience\",\"cyber-risque\",\"cyber-s\\u00e9curit\\u00e9\",\"hacker\",\"ISO 27001\",\"ISO 27002\",\"ISO 27005\",\"pirate informatique\",\"resilia\",\"s\\u00e9curit\\u00e9\",\"s\\u00e9curit\\u00e9 de l'information\"],\"articleSection\":[\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d'euros - Blog de la Transformation Digitale","description":"Le co\u00fbt annuel de la cybercriminalit\u00e9 avoisine les 400 milliards d'euros soit environ le budget de la France ou la moiti\u00e9 du budget des USA. Que faire?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite","og_locale":"fr_FR","og_type":"article","og_title":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d'euros","og_description":"Le co\u00fbt annuel de la cybercriminalit\u00e9 avoisine les 400 milliards d'euros soit environ le budget de la France ou la moiti\u00e9 du budget des USA. Que faire?","og_url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-10-02T09:59:59+00:00","article_modified_time":"2015-10-06T17:56:43+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9-300x200.jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"https:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.ab-consulting.fr\/blog\/#website","url":"https:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#primaryimage","inLanguage":"fr-FR","url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9.jpeg?fit=424%2C283","contentUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9.jpeg?fit=424%2C283","width":424,"height":283,"caption":"cybercriminalit\u00e9"},{"@type":"WebPage","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#webpage","url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite","name":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d'euros - Blog de la Transformation Digitale","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#primaryimage"},"datePublished":"2015-10-02T09:59:59+00:00","dateModified":"2015-10-06T17:56:43+00:00","description":"Le co\u00fbt annuel de la cybercriminalit\u00e9 avoisine les 400 milliards d'euros soit environ le budget de la France ou la moiti\u00e9 du budget des USA. Que faire?","breadcrumb":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d&rsquo;euros"}]},{"@type":"Article","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#article","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#webpage"},"author":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d&rsquo;euros","datePublished":"2015-10-02T09:59:59+00:00","dateModified":"2015-10-06T17:56:43+00:00","mainEntityOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#webpage"},"wordCount":871,"commentCount":3,"publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00e9-300x200.jpeg","keywords":["cyber-r\u00e9silience","cyber-risque","cyber-s\u00e9curit\u00e9","hacker","ISO 27001","ISO 27002","ISO 27005","pirate informatique","resilia","s\u00e9curit\u00e9","s\u00e9curit\u00e9 de l'information"],"articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite#respond"]}]},{"@type":"Person","@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-risque<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">hacker<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27005<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">pirate informatique<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cyber-risque<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">hacker<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">ISO 27005<\/span>","<span class=\"advgb-post-tax-term\">pirate informatique<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>"]}},"comment_count":"3","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 2 octobre 2015","modified":"Updated on 6 octobre 2015"},"absolute_dates_time":{"created":"Posted on 2 octobre 2015 10 h 59 min","modified":"Updated on 6 octobre 2015 18 h 56 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-9X","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":10722,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/risques-cyber-lenjeu-majeur-pour-les-entreprises","url_meta":{"origin":617,"position":0},"title":"Risques cyber : l&rsquo;enjeu majeur pour les entreprises","date":"4 novembre 2019","format":false,"excerpt":"Le Forum Economique Mondial, dans son rapport 2019, a reconnu la cybercriminalit\u00e9 comme un risque majeur. Elle se situe dans le top 4 des risques les plus critiques. Au m\u00eame titre donc que les catastrophes naturelles et les effets du changement climatique.","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"Risque cyber : Nouvel enjeu strat\u00e9gique des entreprises","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2019\/10\/cyber-risque-enjeu.jpg?fit=1200%2C677&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":665,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","url_meta":{"origin":617,"position":1},"title":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","date":"6 octobre 2015","format":false,"excerpt":"Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d'abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"cyber-attaque contre T-Mobile","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":420,"url":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","url_meta":{"origin":617,"position":2},"title":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience","date":"15 septembre 2015","format":false,"excerpt":"On entend de plus en plus parler de cyber-s\u00e9curit\u00e9 et de cyber-r\u00e9silience. Mais au final, qu\u2019est-ce qui se cache derri\u00e8re ces termes compliqu\u00e9s pour le commun des mortels\u00a0? C\u2019est ce que nous allons essayer d\u2019expliquer au travers de cet article. S\u00e9curit\u00e9 ou R\u00e9silience\u00a0? De quoi parlons-nous\u00a0? Sous l\u2019administration Obama, les\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"cyber-curit\u00c3\u00a9 vs cyber-r\u00c3\u00a9silience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1088,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom","url_meta":{"origin":617,"position":3},"title":"Encore un piratage d&rsquo;op\u00e9rateur mobile","date":"26 octobre 2015","format":false,"excerpt":"Apr\u00e8s le piratage, d\u00e9but octobre, de l'op\u00e9rateur t\u00e9l\u00e9com T-Mobile aux USA, c'est au tour de l'op\u00e9rateur britannique TalkTalk d'avoir\u00a0\u00e9t\u00e9 victime d'une \u00ab cyberattaque \u00bb r\u00e9v\u00e9l\u00e9 en\u00a0fin de semaine derni\u00e8re. Cette cyber-attaque a permis \u00e0 des hackers de mettre la main sur un fichier complet de 4 millions de clients, donn\u00e9es\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Op\u00c3\u00a9rateur Talk Talk pirat\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk-300x225.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":766,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyberterrorisme-menace-sous-estimee","url_meta":{"origin":617,"position":4},"title":"Cyberterrorisme, une menace sous-estim\u00e9e","date":"8 octobre 2015","format":false,"excerpt":"De nombreux experts estiment que la premi\u00e8re cyber-guerre est d\u00e9j\u00e0 bien entam\u00e9e. Il ne s'agit\u00a0pas exactement une \u00abguerre froide\u00bb, au sens o\u00f9\u00a0la g\u00e9n\u00e9ration pr\u00e9c\u00e9dente l'entendait. Les dommages sont d\u00e9j\u00e0 consid\u00e9rables et s'\u00e9valuent\u00a0en milliards\u00a0de dollars et l'intention hostile des pirates, souvent parrain\u00e9s par les \u00c9tats, est \u00e9vidente.\u00a0Dans le m\u00eame temps, les\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"cyberterrorisme","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyberterrorisme-300x211.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":899,"url":"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience","url_meta":{"origin":617,"position":5},"title":"RESILIA, objectif cyber-r\u00e9silience","date":"14 octobre 2015","format":false,"excerpt":"RESILIA, le cadre de r\u00e9f\u00e9rence de cyber-r\u00e9silience, publi\u00e9 r\u00e9cemment par AXELOS, fait une entr\u00e9e remarqu\u00e9e dans le paysage des r\u00e9f\u00e9rentiels de bonnes pratiques au moment-m\u00eame o\u00f9 se d\u00e9roule le mois de la cyber-s\u00e9curit\u00e9, auquel AB Consulting s'associe au travers de la publication d'articles et de sa participation \u00e0 une s\u00e9rie\u2026","rel":"","context":"Dans &quot;RESILIA&quot;","img":{"alt_text":"RESILIA - cyber-resilience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/617"}],"collection":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=617"}],"version-history":[{"count":20,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/617\/revisions"}],"predecessor-version":[{"id":712,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/617\/revisions\/712"}],"wp:attachment":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=617"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}