{"id":16911,"date":"2022-09-22T09:09:09","date_gmt":"2022-09-22T07:09:09","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=16911"},"modified":"2022-09-22T09:09:09","modified_gmt":"2022-09-22T07:09:09","slug":"le-travail-mobile-pourquoi-les-hackers-laiment-tant","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/fr\/le-travail-mobile-pourquoi-les-hackers-laiment-tant\/","title":{"rendered":"Le travail mobile : Pourquoi les pirates informatiques l'aiment tant"},"content":{"rendered":"<figure id=\"attachment_16912\" aria-describedby=\"caption-attachment-16912\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16912\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\" alt=\"\" width=\"680\" height=\"383\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg 680w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ-18x10.jpg 18w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ-311x175.jpg 311w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ-621x350.jpg 621w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ-300x169.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-16912\" class=\"wp-caption-text\">Smartphone s\u00e9curis\u00e9 ? Le travail mobile fournit de nombreux points d'attaque aux pirates. (Image : Unsplash.com)<\/figcaption><\/figure>\n<p>La plupart du temps, ce sont les pirates informatiques qui donnent le rythme. Ils sont rapides, impitoyables et disposent souvent des outils les plus sophistiqu\u00e9s pour leurs attaques avanc\u00e9es. Pour les entreprises, le d\u00e9fi consiste non seulement \u00e0 opposer les technologies appropri\u00e9es aux menaces, mais aussi \u00e0 garder une longueur d'avance sur les cybercriminels eux-m\u00eames. Des facteurs tels que le travail \u00e0 domicile et le travail mobile, qui se sont r\u00e9cemment d\u00e9velopp\u00e9s de mani\u00e8re fulgurante, rendent cela plus difficile. En effet, la communication mobile en dehors du r\u00e9seau de l'entreprise cr\u00e9e de toutes nouvelles surfaces d'attaque. Pour garantir la protection des donn\u00e9es, la s\u00e9curit\u00e9 des terminaux mobiles et l'int\u00e9grit\u00e9 du transfert de donn\u00e9es, les entreprises doivent conna\u00eetre les risques les plus importants - et les limiter d\u00e8s le d\u00e9but. Le fournisseur de communication Materna Virtual Solution montre par quels chemins les donn\u00e9es de l'entreprise peuvent \u00eatre menac\u00e9es. L'entreprise d\u00e9veloppe et distribue les applications SecurePIM, SecureCOM et l'architecture de s\u00e9curit\u00e9 SERA pour iOS et Android.<\/p>\n<ul>\n<li><strong>Des applications douteuses.<\/strong> Selon Materna Virtual Solution, un grand danger guette toujours les magasins d'applications des grands fournisseurs. Les applications qui, une fois install\u00e9es, ouvrent la porte \u00e0 des logiciels malveillants ou lisent des donn\u00e9es confidentielles, comptent toujours parmi les principales causes de fuites de donn\u00e9es. Mais les applications quotidiennes de fabricants connus, comme les messageries courantes, peuvent \u00e9galement poser probl\u00e8me si les param\u00e8tres de protection des donn\u00e9es sont mal choisis. Elles sont alors en mesure d'acc\u00e9der \u00e0 des donn\u00e9es sensibles et \u00e9ventuellement de les transmettre.<\/li>\n<li><strong>Failles non corrig\u00e9es dans les syst\u00e8mes d'exploitation.<\/strong> Si les failles de s\u00e9curit\u00e9 des applications et des syst\u00e8mes d'exploitation ne sont pas corrig\u00e9es, par exemple parce qu'elles sont inconnues du fabricant, les cybercriminels ont beau jeu. Ces attaques dites \"zero-day\" profitent de la faille de s\u00e9curit\u00e9 non d\u00e9tect\u00e9e pour voler des donn\u00e9es ou introduire des logiciels malveillants.<\/li>\n<li><strong>Attaques de phishing.<\/strong> Outre les risques technologiques, les collaborateurs eux-m\u00eames sont une cible encore souvent choisie et lucrative par les pirates. Les invitations \u00e0 agir contenues dans les faux e-mails, les messages courts ou les pages web incitent \u00e0 divulguer des donn\u00e9es confidentielles, telles que les mots de passe. En raison \u00e9galement des m\u00e9thodes d'hame\u00e7onnage de plus en plus avanc\u00e9es, les collaborateurs devraient recevoir une formation r\u00e9guli\u00e8re sur ce type d'attaques.<\/li>\n<li><strong>R\u00e9seaux non prot\u00e9g\u00e9s.<\/strong> Travailler dans un caf\u00e9 ou \u00e0 l'h\u00f4tel fait depuis longtemps partie du quotidien, mais trop souvent les collaborateurs utilisent encore des r\u00e9seaux WLAN ouverts ou des hotspots. La communication non crypt\u00e9e leur permet d'intercepter des donn\u00e9es et de voler des informations sensibles.\u00a0<\/li>\n<\/ul>\n<p>\"Pour que le travail ultra-mobile fonctionne, les collaborateurs doivent avoir acc\u00e8s aux donn\u00e9es de partout et \u00e0 tout moment\", explique Christian Pohlenz, expert en s\u00e9curit\u00e9 chez Materna Virtual Solution. \"Et c'est justement l\u00e0 que le b\u00e2t blesse, car le trajet de A \u00e0 B rec\u00e8le de nombreuses vuln\u00e9rabilit\u00e9s. C'est pr\u00e9cis\u00e9ment la raison pour laquelle les pirates informatiques aiment tant les nouveaux mod\u00e8les de travail. La r\u00e9ponse \u00e0 cela est le cryptage de bout en bout. Les solutions de conteneurs se sont r\u00e9v\u00e9l\u00e9es \u00eatre la mesure de toute chose : Elles cr\u00e9ent une zone blind\u00e9e et prot\u00e9g\u00e9e contre l'acc\u00e8s sur les appareils mobiles qui garantit une s\u00e9curit\u00e9 maximale - et ont ainsi une grande longueur d'avance sur les astuces des pirates\".<\/p>\n<p><em>Source et informations compl\u00e9mentaires : <a href=\"http:\/\/www.materna-virtual-solution.com\">Solutions visuelles Materna<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>La plupart du temps, ce sont les pirates informatiques qui donnent le rythme. Ils sont rapides, impitoyables et disposent souvent des outils les plus sophistiqu\u00e9s pour leurs attaques avanc\u00e9es. Pour les entreprises, le d\u00e9fi consiste non seulement \u00e0 opposer les technologies appropri\u00e9es aux menaces, mais aussi \u00e0 garder une longueur d'avance sur les cybercriminels eux-m\u00eames. Des facteurs tels que le travail \u00e0 domicile et le travail mobile, qui ont r\u00e9cemment connu un d\u00e9veloppement rapide [...].<\/p>","protected":false},"author":10,"featured_media":16912,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[3355,3560,3501,3326],"class_list":["post-16911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-cyber-crime","tag-cybersicherheit","tag-it","tag-risikomanagement"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobiles Arbeiten: Warum Hacker es so lieben - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Mobiles Arbeiten ist die offene Flanke der IT: Sie macht eigentlich sichere Infrastrukturen verwundbar und Schwachstellen ausnutzbar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/fr\/le-travail-mobile-pourquoi-les-hackers-laiment-tant\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobiles Arbeiten: Warum Hacker es so lieben\" \/>\n<meta property=\"og:description\" content=\"Mobiles Arbeiten ist die offene Flanke der IT: Sie macht eigentlich sichere Infrastrukturen verwundbar und Schwachstellen ausnutzbar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/fr\/le-travail-mobile-pourquoi-les-hackers-laiment-tant\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-22T07:09:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Mobiles #Arbeiten: Warum #Hacker es so lieben\" \/>\n<meta name=\"twitter:description\" content=\"Mobiles #Arbeiten ist die offene Flanke der IT: Sie macht eigentlich sichere #Infrastrukturen verwundbar und #Schwachstellen ausnutzbar.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Berner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/\"},\"author\":{\"name\":\"Thomas Berner\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/a8711938b1cfb3f056dec70eaa0b42ab\"},\"headline\":\"Mobiles Arbeiten: Warum Hacker es so lieben\",\"datePublished\":\"2022-09-22T07:09:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\",\"keywords\":[\"Cyber-Crime\",\"Cybersicherheit\",\"IT\",\"Risikomanagement\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/\",\"url\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/\",\"name\":\"Mobiles Arbeiten: Warum Hacker es so lieben - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\",\"datePublished\":\"2022-09-22T07:09:09+00:00\",\"description\":\"Mobiles Arbeiten ist die offene Flanke der IT: Sie macht eigentlich sichere Infrastrukturen verwundbar und Schwachstellen ausnutzbar.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg\",\"width\":680,\"height\":383,\"caption\":\"Smartphone gesichert? Mobiles Arbeiten liefert Hackern viele Angriffspunkte. (Bild: Unsplash.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobiles Arbeiten: Warum Hacker es so lieben\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/a8711938b1cfb3f056dec70eaa0b42ab\",\"name\":\"Thomas Berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/faea7857408f70478f976d576da10f96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/faea7857408f70478f976d576da10f96?s=96&d=mm&r=g\",\"caption\":\"Thomas Berner\"},\"url\":\"https:\/\/www.m-q.ch\/fr\/author\/thomas-berner\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le travail mobile : Pourquoi les hackers l'aiment tant - MQ Management et Qualit\u00e9","description":"Le travail mobile est le flanc ouvert de l'informatique : il rend vuln\u00e9rables les infrastructures cens\u00e9es \u00eatre s\u00fbres et permet d'exploiter les points faibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/fr\/le-travail-mobile-pourquoi-les-hackers-laiment-tant\/","og_locale":"fr_FR","og_type":"article","og_title":"Mobiles Arbeiten: Warum Hacker es so lieben","og_description":"Mobiles Arbeiten ist die offene Flanke der IT: Sie macht eigentlich sichere Infrastrukturen verwundbar und Schwachstellen ausnutzbar.","og_url":"https:\/\/www.m-q.ch\/fr\/le-travail-mobile-pourquoi-les-hackers-laiment-tant\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2022-09-22T07:09:09+00:00","og_image":[{"width":680,"height":383,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg","type":"image\/jpeg"}],"author":"Thomas Berner","twitter_card":"summary_large_image","twitter_title":"Mobiles #Arbeiten: Warum #Hacker es so lieben","twitter_description":"Mobiles #Arbeiten ist die offene Flanke der IT: Sie macht eigentlich sichere #Infrastrukturen verwundbar und #Schwachstellen ausnutzbar.","twitter_image":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg","twitter_misc":{"\u00c9crit par":"Thomas Berner","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/"},"author":{"name":"Thomas Berner","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/a8711938b1cfb3f056dec70eaa0b42ab"},"headline":"Mobiles Arbeiten: Warum Hacker es so lieben","datePublished":"2022-09-22T07:09:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/"},"wordCount":501,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg","keywords":["Cyber-Crime","Cybersicherheit","IT","Risikomanagement"],"articleSection":["Risikomanagement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/","url":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/","name":"Le travail mobile : Pourquoi les hackers l'aiment tant - MQ Management et Qualit\u00e9","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg","datePublished":"2022-09-22T07:09:09+00:00","description":"Le travail mobile est le flanc ouvert de l'informatique : il rend vuln\u00e9rables les infrastructures cens\u00e9es \u00eatre s\u00fbres et permet d'exploiter les points faibles.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2022\/09\/Mobiles-Arbeiten-Warum-Hacker-es-so-lieben_MQ.jpg","width":680,"height":383,"caption":"Smartphone gesichert? Mobiles Arbeiten liefert Hackern viele Angriffspunkte. (Bild: Unsplash.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/mobiles-arbeiten-warum-hacker-es-so-lieben\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Mobiles Arbeiten: Warum Hacker es so lieben"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestion et qualit\u00e9 du QM","description":"Plate-forme pour les syst\u00e8mes de gestion int\u00e9gr\u00e9e.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/a8711938b1cfb3f056dec70eaa0b42ab","name":"Thomas Berner","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/faea7857408f70478f976d576da10f96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/faea7857408f70478f976d576da10f96?s=96&d=mm&r=g","caption":"Thomas Berner"},"url":"https:\/\/www.m-q.ch\/fr\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/16911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/comments?post=16911"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/16911\/revisions"}],"predecessor-version":[{"id":16913,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/16911\/revisions\/16913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media\/16912"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media?parent=16911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/categories?post=16911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/tags?post=16911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}