{"id":1531,"date":"2017-06-12T15:27:04","date_gmt":"2017-06-12T13:27:04","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=1531"},"modified":"2017-06-13T15:57:04","modified_gmt":"2017-06-13T13:57:04","slug":"1531-2","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/fr\/1531-2\/","title":{"rendered":"Le facteur humain : une \u00e9tude analyse le comportement des utilisateurs lors de cyber-attaques"},"content":{"rendered":"<figure id=\"attachment_1532\" aria-describedby=\"caption-attachment-1532\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1532\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\" alt=\"\" width=\"640\" height=\"383\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png 640w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-16x10.png 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-292x175.png 292w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-585x350.png 585w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-300x180.png 300w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-624x373.png 624w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-1532\" class=\"wp-caption-text\">L'\u00e9tude le prouve : Quelque 42 % des attaques se produisent aujourd'hui via des appareils mobiles. (Image : Depositphtos)<\/figcaption><\/figure>\n<p>La principale conclusion de l'\u00e9tude \"The Human Factor\" est que les cybercriminels se concentrent de plus en plus sur l'erreur humaine plut\u00f4t que sur les erreurs techniques pour obtenir de l'argent, des donn\u00e9es personnelles ou de la propri\u00e9t\u00e9 intellectuelle. L'objectif de Proofpoint est de sensibiliser le public \u00e0 cette question afin d'am\u00e9liorer la s\u00e9curit\u00e9.<\/p>\n<p>Par exemple, Proopoint constate une part croissante des attaques de compromission de courrier \u00e9lectronique d'entreprise (BEC) contre les d\u00e9cideurs. Ces attaques repr\u00e9sentent le segment des cybercriminels qui conna\u00eet la croissance la plus rapide, avec des dommages estim\u00e9s \u00e0 environ cinq milliards de dollars am\u00e9ricains. Les fraudeurs envoient des courriels sans logiciel malveillant pour inciter les destinataires \u00e0 transf\u00e9rer de l'argent ou \u00e0 r\u00e9v\u00e9ler des informations personnelles.<\/p>\n<p><em>Proofpoint arrive \u00e0 des conclusions assez int\u00e9ressantes et surprenantes :<\/em><\/p>\n<ul>\n<li><em>Forte augmentation de la part des attaques de compromission des courriels d'affaires (BEC, alias fraude des PDG), de 1 % en 2015 \u00e0 42 % l'ann\u00e9e derni\u00e8re (mesur\u00e9e avec l'\u00e9mergence des courriels contenant des chevaux de Troie bancaires).<\/em><\/li>\n<li><em>Quelqu'un clique toujours - et rapidement. Pr\u00e8s de 90 % de tous les clics se produisent dans les 24 heures suivant la r\u00e9ception du courrier. Un quart d'entre elles se produisent dans les dix premi\u00e8res minutes et la moiti\u00e9 au bout d'une heure environ. Il n'est gu\u00e8re surprenant que le d\u00e9lai moyen entre l'arriv\u00e9e du courrier et le clic sur le lien frauduleux soit le plus court pendant les heures de bureau, entre 8 heures du matin et 15 heures de l'apr\u00e8s-midi. - \u00c0 cet \u00e9gard, les habitudes locales des utilisateurs dans les diff\u00e9rentes r\u00e9gions ne diff\u00e8rent pas.<\/em><\/li>\n<li><em>Plus de 90 % des courriels frauduleux ont \u00e9t\u00e9 con\u00e7us pour inciter les utilisateurs \u00e0 saisir leurs informations d'identification sur des sites de phishing frauduleux. \u00c0 noter en particulier : aujourd'hui, presque toutes les attaques (99 %) qui ciblent la fraude n\u00e9cessitent une interaction humaine pour installer un logiciel malveillant. Ainsi, rares sont ceux qui exploitent les vuln\u00e9rabilit\u00e9s des logiciels. Parmi les e-mails de phishing, ceux visant \u00e0 voler les identifiants Apple \u00e9taient les plus courants, tandis que ceux demandant des donn\u00e9es Google Drive \u00e9taient les plus cliqu\u00e9s.<\/em><\/li>\n<li><em>La moiti\u00e9 des clics sur des URL frauduleuses proviennent de dispositifs qui ne sont pas soumis \u00e0 la gestion des syst\u00e8mes d'entreprise. Environ 42 % d'entre eux proviennent maintenant d'un appareil mobile. Ce taux a plus que doubl\u00e9 par rapport au chiffre comparable \u00e0 long terme de 20 %. Huit pour cent de tous les clics proviennent encore de versions potentiellement non prot\u00e9g\u00e9es de Windows pour lesquelles il n'existe plus de patchs de s\u00e9curit\u00e9 en raison de leur \u00e2ge.<\/em><\/li>\n<li><em>Le pseudo-soutien frauduleux pour r\u00e9colter des donn\u00e9es personnelles via les m\u00e9dias sociaux a augment\u00e9 de 150 % en 2016. Dans cette approche, les criminels cr\u00e9ent un compte de m\u00e9dia social pour les demandes de soutien qui est presque indiscernable de celui d'une entreprise l\u00e9gitime. Si un utilisateur demande de l'aide \u00e0 cette m\u00eame entreprise et qu'il tweete sa demande, par exemple, ces escrocs tentent de rediriger la demande vers son compte. Ils demandent g\u00e9n\u00e9ralement ensuite \u00e0 la personne qui demande de l'aide d'entrer ses donn\u00e9es de connexion.<\/em><\/li>\n<li><em>Attention le jeudi : ce jour de la semaine, le volume des courriers contenant des logiciels malveillants augmente de 38 % par rapport au volume moyen des jours de la semaine. Le mardi, le mercredi et le jeudi sont particuli\u00e8rement populaires aupr\u00e8s des exp\u00e9diteurs de ran\u00e7on. Les chevaux de Troie bancaires atteignent un pic mercredi. Les campagnes d'attaque des points de vente ont tendance \u00e0 se d\u00e9rouler le jeudi ou le vendredi. Les keyloggers et les attaques par des moyens d\u00e9tourn\u00e9s pr\u00e9f\u00e8rent le lundi.<\/em><\/li>\n<\/ul>\n<p><strong>Autres pays, autres douanes de courrier \u00e9lectronique<\/strong><\/p>\n<p>Les attaquants connaissent maintenant les habitudes des utilisateurs de courrier et envoient leurs attaques de courrier environ quatre \u00e0 cinq heures apr\u00e8s le d\u00e9but de la journ\u00e9e de travail normale, la plupart du temps \u00e0 l'heure du d\u00e9jeuner. Cependant, il existe des diff\u00e9rences significatives dans la r\u00e9ponse \u00e0 ces courriers dans le monde entier : Alors qu'aux \u00c9tats-Unis, au Canada et en Australie, les gens r\u00e9agissent souvent aux courriers exactement dans ces quatre ou cinq heures, les Fran\u00e7ais aiment cliquer \u00e0 midi vers 13 heures. Les utilisateurs allemands et suisses, en revanche, ont tendance \u00e0 \u00eatre impatients et \u00e0 cliquer d\u00e8s les premi\u00e8res heures de la journ\u00e9e de travail. La situation est compl\u00e8tement diff\u00e9rente en Grande-Bretagne : Ici, les clics sont r\u00e9partis uniform\u00e9ment sur la dur\u00e9e jusqu'\u00e0 environ 14 heures, apr\u00e8s quoi ils diminuent consid\u00e9rablement.<\/p>\n<p>Le rapport \"The Human Factor\" de Proofpoint est bas\u00e9 sur des recherches portant sur d'innombrables tentatives d'attaques sur plus de 5 000 entreprises clientes de Proofpoint en 2016.<\/p>\n<p><em><a href=\"https:\/\/www.proofpoint.com\/de\/resources\/white-papers\/human-factor-report\">Ici<\/a> pour t\u00e9l\u00e9charger le rapport complet<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Das wichtigste Ergebnis aus der Studie &#8222;The Human Factor&#8220;: Cyberkriminelle fokussieren sich immer st\u00e4rker auf menschliches Fehlverhalten anstatt auf technische Fehler, um an Geld, pers\u00f6nliche Daten oder geistiges Eigentum zu gelangen. Das Ziel von Proofpoint ist, die Aufmerksamkeit und Sensibilit\u00e4t in der \u00d6ffentlichkeit f\u00fcr diesen Themenkomplex zu steigern und auf diese Weise die Sicherheit zu [&hellip;]<\/p>","protected":false},"author":35,"featured_media":1532,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[3355,3362],"class_list":["post-1531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-unkategorisiert","tag-cyber-crime","tag-studie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, &quot;menschelnde&quot; Fakten vogestellt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/fr\/1531-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, &quot;menschelnde&quot; Fakten vogestellt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/fr\/1531-2\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-12T13:27:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-13T13:57:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen\",\"datePublished\":\"2017-06-12T13:27:04+00:00\",\"dateModified\":\"2017-06-13T13:57:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\"},\"wordCount\":713,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"keywords\":[\"Cyber-Crime\",\"Studie\"],\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\",\"url\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\",\"name\":\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"datePublished\":\"2017-06-12T13:27:04+00:00\",\"dateModified\":\"2017-06-13T13:57:04+00:00\",\"description\":\"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, \\\"menschelnde\\\" Fakten vogestellt.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/en\/1531-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"width\":640,\"height\":383,\"caption\":\"Die Studie belegt: Rund 42 Prozent der Angriffe erfolgen mittlerweile \u00fcber mobile Ger\u00e4te. (Bild: Depositphtos)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unkategorisiert\",\"item\":\"https:\/\/www.m-q.ch\/it\/categoria\/senza-categoria\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le facteur humain : une \u00e9tude analyse le comportement des utilisateurs lors de cyberattaques - MQ Management und Qualit\u00e4t","description":"Dans son \u00e9tude, \"The Human Factor\", Proofpoint, Inc, l'une des principales soci\u00e9t\u00e9s de cybers\u00e9curit\u00e9 de nouvelle g\u00e9n\u00e9ration, a pr\u00e9sent\u00e9 des faits \"humains\".","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/fr\/1531-2\/","og_locale":"fr_FR","og_type":"article","og_title":"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t","og_description":"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, \"menschelnde\" Fakten vogestellt.","og_url":"https:\/\/www.m-q.ch\/fr\/1531-2\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2017-06-12T13:27:04+00:00","article_modified_time":"2017-06-13T13:57:04+00:00","og_image":[{"width":640,"height":383,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","type":"image\/png"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen","datePublished":"2017-06-12T13:27:04+00:00","dateModified":"2017-06-13T13:57:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/"},"wordCount":713,"commentCount":0,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","keywords":["Cyber-Crime","Studie"],"articleSection":["Unkategorisiert"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/","url":"https:\/\/www.m-q.ch\/en\/1531-2\/","name":"Le facteur humain : une \u00e9tude analyse le comportement des utilisateurs lors de cyberattaques - MQ Management und Qualit\u00e4t","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","datePublished":"2017-06-12T13:27:04+00:00","dateModified":"2017-06-13T13:57:04+00:00","description":"Dans son \u00e9tude, \"The Human Factor\", Proofpoint, Inc, l'une des principales soci\u00e9t\u00e9s de cybers\u00e9curit\u00e9 de nouvelle g\u00e9n\u00e9ration, a pr\u00e9sent\u00e9 des faits \"humains\".","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/en\/1531-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","width":640,"height":383,"caption":"Die Studie belegt: Rund 42 Prozent der Angriffe erfolgen mittlerweile \u00fcber mobile Ger\u00e4te. (Bild: Depositphtos)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unkategorisiert","item":"https:\/\/www.m-q.ch\/it\/categoria\/senza-categoria\/"},{"@type":"ListItem","position":2,"name":"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestion et qualit\u00e9 du QM","description":"Plate-forme pour les syst\u00e8mes de gestion int\u00e9gr\u00e9e.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/1531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/comments?post=1531"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/1531\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/1531\/revisions\/1533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media\/1532"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media?parent=1531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/categories?post=1531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/tags?post=1531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}