{"id":12111,"date":"2021-08-11T16:11:30","date_gmt":"2021-08-11T14:11:30","guid":{"rendered":"https:\/\/www.alinto.com\/?p=12111"},"modified":"2024-09-24T16:39:09","modified_gmt":"2024-09-24T14:39:09","slug":"securite-de-lemail-etat-des-lieux","status":"publish","type":"post","link":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/","title":{"rendered":"S\u00e9curit\u00e9 de l&#8217;email : \u00e9tat des lieux"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">On ne le r\u00e9p\u00e8tera jamais assez, <\/span><b>l\u2019email est le canal privil\u00e9gi\u00e9 des cyberattaques<\/b><span style=\"font-weight: 400;\">. Et cela s\u2019intensifie ann\u00e9e apr\u00e8s ann\u00e9e, malgr\u00e9 l\u2019am\u00e9lioration de la s\u00e9curit\u00e9 des messageries personnelles et professionnelles, la sensibilisation des utilisateurs et la diffusion d\u2019alertes aux phishing et aux cyberattaques. De leur c\u00f4t\u00e9, les cybercriminels utilisent des logiciels malveillants de plus en plus sophistiqu\u00e9s et leurs techniques sont plus abouties, pouvant donc pr\u00eater \u00e0 confusion.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware, <a href=\"https:\/\/www.alinto.com\/fr\/quest-ce-quun-test-de-phishing-et-pourquoi-est-ce-benefique\/\">phishing<\/a>, malware\u2026 sont autant de menaces pour les entreprises, qui doivent alors<\/span><b> redoubler de vigilance et sensibiliser leurs collaborateurs<\/b><span style=\"font-weight: 400;\">. D\u2019autant plus que les cybercriminels surfent sur la pand\u00e9mie de Coronavirus, usant de la peur pour inciter au clic.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pour y voir plus clair, nous vous proposons un \u00e9tat des lieux de la situation.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybers\u00e9curit\u00e9 : l\u2019augmentation inqui\u00e9tante des attaques par l\u2019email<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12119 alignright\" src=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/02\/AdobeStock_293342378-300x169.jpg\" alt=\"cybers\u00e9curit\u00e9 entreprise\" width=\"424\" height=\"239\" \/>En 2020, les attaques informatiques ont quadrupl\u00e9 par rapport aux ann\u00e9es pr\u00e9c\u00e9dentes (1)<\/span><span style=\"font-weight: 400;\">. Les cybercriminels sont aujourd&rsquo;hui mieux organis\u00e9s, envoient de nombreux emails frauduleux et ciblent les vuln\u00e9rabilit\u00e9s dans les r\u00e9seaux IT des entreprises. Les attaques sont industrialis\u00e9es, planifi\u00e9es. Nous sommes loin d\u2019une personne qui agit seule derri\u00e8re son ordinateur.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Voici quelques chiffres pour illustrer la situation actuelle et la vuln\u00e9rabilit\u00e9 li\u00e9e aux messageries en France :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Les ransomwares repr\u00e9sentent <\/span><b>11 % du volume total d&#8217;emails malveillants <\/b>(2)<span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>80 % des entreprises fran\u00e7aises cyber-attaqu\u00e9es en 2020<\/b><span style=\"font-weight: 400;\"> l\u2019ont \u00e9t\u00e9 via des emails de phishing ou spear-phishing (3)<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">En 2020, <\/span><b>une entreprise sur cinq d\u00e9clare avoir subi au moins une attaque<\/b><span style=\"font-weight: 400;\"> par ransomware au cours de l\u2019ann\u00e9e (4)<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Seule <\/span><b>une entreprise sur deux est confiante<\/b><span style=\"font-weight: 400;\"> en sa capacit\u00e9 de faire face \u00e0 une cyberattaque (4)<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">La crise sanitaire apporte de nouveaux risques : <\/span><b>augmentation de 35 % des cyberattaques <span style=\"font-weight: 400;\">(4)<\/span><\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>57 %<\/b> des entreprises pr\u00e9voient d\u2019<b>augmenter leur budget<\/b> d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9 (4).<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>85 %<\/b><span style=\"font-weight: 400;\"> des entreprises souhaitent<\/span><b> acqu\u00e9rir de nouvelles solutions techniques<\/b><span style=\"font-weight: 400;\"> pour am\u00e9liorer leur s\u00e9curit\u00e9 IT (4)<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>75 %<\/b><span style=\"font-weight: 400;\"> des emails re\u00e7us sont<\/span><b> ind\u00e9sirables <\/b>(5)<b>.<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Les <b>signalements au gouvernement<\/b> de cyberattaques de la part de professionnels ont augment\u00e9 de <b>30 %<\/b> par rapport en 2019 (6).<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Le d\u00e9veloppement du t\u00e9l\u00e9travail, la peur induite par la pand\u00e9mie, le d\u00e9veloppement du cloud, la professionnalisation des attaques par email expliquent cette \u00e9volution. Rien n\u2019indique un changement de tendance : le ph\u00e9nom\u00e8ne devrait se maintenir pour les ann\u00e9es \u00e0 venir et rester une v\u00e9ritable pr\u00e9occupation pour les organisations.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cyberattaques : des cons\u00e9quences importantes pour les entreprises<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12122 alignleft\" src=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/02\/AdobeStock_436038998-300x200.jpg\" alt=\"cons\u00e9quences cyberattaque\" width=\"332\" height=\"221\" \/>Il est difficile d\u2019estimer le co\u00fbt d\u2019une cyberattaque. Cela ne se traduit pas uniquement par des cons\u00e9quences \u00e9conomiques, mais \u00e9galement par l\u2019impact sur la r\u00e9putation de l\u2019entreprise, la fragilisation de l\u2019infrastructure IT, ou encore des difficult\u00e9s op\u00e9rationnelles pour les diff\u00e9rents m\u00e9tiers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">En 2020, <\/span><b>58 % des cyberattaques ont eu des cons\u00e9quences av\u00e9r\u00e9es sur le business<\/b><span style=\"font-weight: 400;\">, avec des perturbations directes sur la production dans 27 % des cas (7)<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Les principales cons\u00e9quences des attaques (8)<\/span><span style=\"font-weight: 400;\"> se r\u00e9partissent ainsi :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vol de donn\u00e9es (<\/span><b>30 %<\/b><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">D\u00e9ni de service (<\/span><b>29 %<\/b><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Blocage de l\u2019activit\u00e9 suite au chiffrage des donn\u00e9es par un ran\u00e7ongiciel (<\/span><b>24 %<\/b><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Usurpation d\u2019identit\u00e9 (<b>23 %<\/b>)<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Une \u00e9tude men\u00e9e par le cabinet Bess\u00e9 montre que le risque de d\u00e9faillance d\u2019une entreprise augmente de 50 % dans les trois mois qui suivent l\u2019annonce de la cyberattaque. Ce risque atteint m\u00eame parfois 80 %<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Une autre \u00e9tude men\u00e9e par IBM Ponemon Institute \u00e9tablit que 80 % des entreprises fran\u00e7aises n\u2019ont pas de plan de r\u00e9ponse aux incidents. Autre chiffre significatif : il faut en moyenne <\/span><b>201 jours<\/b><span style=\"font-weight: 400;\"> \u00e0 une entreprise pour d\u00e9couvrir qu\u2019elle a \u00e9t\u00e9 victime d\u2019une cyberattaque. Les cons\u00e9quences directes peuvent aussi toucher les clients si leurs donn\u00e9es personnelles ont \u00e9t\u00e9 vol\u00e9es.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Un simple clic anodin sur un lien dans un email peut donc fragiliser de fa\u00e7on irr\u00e9m\u00e9diable l\u2019ensemble de l\u2019entreprise. C\u2019est pourquoi il est important de continuer \u00e0 sensibiliser les collaborateurs, mais aussi de renforcer la s\u00e9curit\u00e9 IT \u00e0 travers diff\u00e9rentes solutions d\u00e9di\u00e9es <\/span><a href=\"https:\/\/www.alinto.com\/fr\/relais-de-messagerie-securise-alinto-protect\/\"><b>de protection<\/b><span style=\"font-weight: 400;\"> de la messagerie<\/span><\/a><span style=\"font-weight: 400;\"> performantes.<\/span><\/p>\n<blockquote>\n<h3><span style=\"font-weight: 400;\">Quelques exemples de cyberattaques et de leurs cons\u00e9quences :<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Un h\u00f4pital du New Jersey (USA) a pay\u00e9 une ran\u00e7on de plus de 600 000 dollars (2020).\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Verne Harnish, PDG de Gazelles inc. s\u2019est fait voler 400 000 $ de son compte bancaire lorsque des pirates ont pu acc\u00e9der \u00e0 son ordinateur et intercepter des courriels entre lui et son adjoint (2019).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EasyJet annonce avoir \u00e9t\u00e9 victime d\u2019une cyberattaque d\u2019ampleur : plus de 9 millions de donn\u00e9es de clients (adresses email et information de voyage), dont 2 000 donn\u00e9es de cartes bancaires ont \u00e9t\u00e9 ill\u00e9galement consult\u00e9es (2020).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">L\u2019Universit\u00e9 de Californie \u00e0 San Francisco (UCSF) a \u00e9t\u00e9 touch\u00e9e par un ransomware paralysant l\u2019acc\u00e8s aux donn\u00e9es de son r\u00e9seau informatique. Finalement, l\u2019Universit\u00e9 s\u2019est r\u00e9solue \u00e0 payer une ran\u00e7on d\u2019environ un million d\u2019euros (2020)<\/span><\/li>\n<\/ul>\n<\/blockquote>\n<a href=\"https:\/\/marketing.alinto.com\/landing-page-messagerie-professionnelle--comment-proteger-votre-entreprise-des-cyberattaques-\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12194 \" src=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/02\/CTA-WP-Messagerie-Pro.jpg\" alt=\"livre blanc antispam\" width=\"592\" height=\"373\" \/><\/a>\n<p>(1) <span style=\"font-weight: 400;\">Cyberattaques : le nombre de piratages a quadrupl\u00e9 l&rsquo;ann\u00e9e derni\u00e8re, selon un expert en cybers\u00e9curit\u00e9 &#8211; France TV info<br \/>\n(2) Intervention Devensys &#8211; Les m\u00e9thodes pour am\u00e9liorer votre s\u00e9curit\u00e9 mail 2018<br \/>\n(3) Les cyberattaques les plus courantes contre les entreprises fran\u00e7aises &#8211; Statista<br \/>\n(4) 6\u00e8me \u00e9dition du barom\u00e8tre annuel du CESIN<br \/>\n(5) Messagerie : chiffres et menaces &#8211; s\u00e9curit\u00e9 dsisionnel<br \/>\n(6) Cybers\u00e9curit\u00e9 : des signalements plus nombreux en 2020 &#8211; magazine vie-publique<br \/>\n(7) 6\u00e8me \u00e9dition du barom\u00e8tre annuel du CESIN<br \/>\n(8) Les cyberattaques les plus courantes contre les entreprises, CESIN et OpinionWay<br \/>\n(9) Sur un panel d\u2019ETI<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On ne le r\u00e9p\u00e8tera jamais assez, l\u2019email est le canal privil\u00e9gi\u00e9 des cyberattaques. Et cela s\u2019intensifie (&#8230;)<\/p>\n","protected":false},"author":9,"featured_media":12116,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[122],"tags":[],"class_list":["post-12111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 de l&#039;email : \u00e9tat des lieux - Alinto<\/title>\n<meta name=\"description\" content=\"Ransomware, phishing, malware sont de r\u00e9elles menaces pour les entreprises, Alinto vous propose un \u00e9tat des lieux de la s\u00e9curit\u00e9 de l&#039;email\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 de l&#039;email : \u00e9tat des lieux - Alinto\" \/>\n<meta property=\"og:description\" content=\"Ransomware, phishing, malware sont de r\u00e9elles menaces pour les entreprises, Alinto vous propose un \u00e9tat des lieux de la s\u00e9curit\u00e9 de l&#039;email\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/\" \/>\n<meta property=\"og:site_name\" content=\"Alinto\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-11T14:11:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-24T14:39:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2021\/10\/AdobeStock_67794217-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"571\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rodolphe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rfrering@alinto.net\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rodolphe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/\"},\"author\":{\"name\":\"Rodolphe\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\"},\"headline\":\"S\u00e9curit\u00e9 de l&#8217;email : \u00e9tat des lieux\",\"datePublished\":\"2021-08-11T14:11:30+00:00\",\"dateModified\":\"2024-09-24T14:39:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/\"},\"wordCount\":929,\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/AdobeStock_67794217-1.jpeg\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/\",\"name\":\"S\u00e9curit\u00e9 de l'email : \u00e9tat des lieux - Alinto\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/AdobeStock_67794217-1.jpeg\",\"datePublished\":\"2021-08-11T14:11:30+00:00\",\"dateModified\":\"2024-09-24T14:39:09+00:00\",\"description\":\"Ransomware, phishing, malware sont de r\u00e9elles menaces pour les entreprises, Alinto vous propose un \u00e9tat des lieux de la s\u00e9curit\u00e9 de l'email\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/AdobeStock_67794217-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/AdobeStock_67794217-1.jpeg\",\"width\":1200,\"height\":571,\"caption\":\"s\u00e9curit\u00e9 email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/securite-de-lemail-etat-des-lieux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 de l&#8217;email : \u00e9tat des lieux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"name\":\"Alinto\",\"description\":\"Solutions email &amp; securit\u00e9 email\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\",\"name\":\"Alinto\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"caption\":\"Alinto\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\",\"name\":\"Rodolphe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"caption\":\"Rodolphe\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/rfrering@alinto.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 de l'email : \u00e9tat des lieux - Alinto","description":"Ransomware, phishing, malware sont de r\u00e9elles menaces pour les entreprises, Alinto vous propose un \u00e9tat des lieux de la s\u00e9curit\u00e9 de l'email","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 de l'email : \u00e9tat des lieux - Alinto","og_description":"Ransomware, phishing, malware sont de r\u00e9elles menaces pour les entreprises, Alinto vous propose un \u00e9tat des lieux de la s\u00e9curit\u00e9 de l'email","og_url":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/","og_site_name":"Alinto","article_published_time":"2021-08-11T14:11:30+00:00","article_modified_time":"2024-09-24T14:39:09+00:00","og_image":[{"width":1200,"height":571,"url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2021\/10\/AdobeStock_67794217-1.jpeg","type":"image\/jpeg"}],"author":"Rodolphe","twitter_card":"summary_large_image","twitter_creator":"@rfrering@alinto.net","twitter_misc":{"\u00c9crit par":"Rodolphe","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#article","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/"},"author":{"name":"Rodolphe","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297"},"headline":"S\u00e9curit\u00e9 de l&#8217;email : \u00e9tat des lieux","datePublished":"2021-08-11T14:11:30+00:00","dateModified":"2024-09-24T14:39:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/"},"wordCount":929,"publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2021\/10\/AdobeStock_67794217-1.jpeg","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/","url":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/","name":"S\u00e9curit\u00e9 de l'email : \u00e9tat des lieux - Alinto","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#primaryimage"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2021\/10\/AdobeStock_67794217-1.jpeg","datePublished":"2021-08-11T14:11:30+00:00","dateModified":"2024-09-24T14:39:09+00:00","description":"Ransomware, phishing, malware sont de r\u00e9elles menaces pour les entreprises, Alinto vous propose un \u00e9tat des lieux de la s\u00e9curit\u00e9 de l'email","breadcrumb":{"@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#primaryimage","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2021\/10\/AdobeStock_67794217-1.jpeg","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2021\/10\/AdobeStock_67794217-1.jpeg","width":1200,"height":571,"caption":"s\u00e9curit\u00e9 email"},{"@type":"BreadcrumbList","@id":"https:\/\/www.alinto.com\/fr\/securite-de-lemail-etat-des-lieux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.alinto.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 de l&#8217;email : \u00e9tat des lieux"}]},{"@type":"WebSite","@id":"https:\/\/www.alinto.com\/fr\/#website","url":"https:\/\/www.alinto.com\/fr\/","name":"Alinto","description":"Solutions email &amp; securit\u00e9 email","publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.alinto.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.alinto.com\/fr\/#organization","name":"Alinto","url":"https:\/\/www.alinto.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","caption":"Alinto"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297","name":"Rodolphe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","caption":"Rodolphe"},"sameAs":["https:\/\/x.com\/rfrering@alinto.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/12111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/comments?post=12111"}],"version-history":[{"count":0,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/12111\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media\/12116"}],"wp:attachment":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media?parent=12111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/categories?post=12111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/tags?post=12111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}