{"id":1144,"date":"2023-09-28T16:53:56","date_gmt":"2023-09-28T14:53:56","guid":{"rendered":"https:\/\/www.sparkngo.fr\/?page_id=1144"},"modified":"2024-06-12T08:13:49","modified_gmt":"2024-06-12T06:13:49","slug":"cybersecurite","status":"publish","type":"page","link":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p style=\"font-size:36px\"><strong>Sensibilisation collaborateur : 100% vigilance 0% contrainte<\/strong><\/p>\n\n\n\n<p>Une des premi\u00e8res<strong> failles exploit\u00e9es <\/strong>par les hackers est l&rsquo;<strong>insouciance des collaborateurs<\/strong> de votre entreprise, au travers de m\u00e9canismes d&rsquo;<strong>ing\u00e9nierie sociale<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1024x1024.jpeg\" alt=\"\" class=\"wp-image-882\" srcset=\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1024x1024.jpeg 1024w, https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-300x300.jpeg 300w, https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-150x150.jpeg 150w, https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-768x768.jpeg 768w, https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1536x1536.jpeg 1536w, https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-2048x2048.jpeg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>La cybers\u00e9curit\u00e9 impose des contraintes pouvant <strong>d\u00e9grader l&rsquo;exp\u00e9rience collaborateur<\/strong>.<\/p>\n\n\n\n<p>Il est donc fondamental de gagner en <strong>vigilance sans contraindre<\/strong> pour <strong>maximiser l&rsquo;appropriation<\/strong>.<\/p>\n\n\n\n<p>spark&amp;go vous propose des m\u00e9thodes de sensibilisation de vos collaborateurs adapt\u00e9es pour accro\u00eetre la <strong>vigilance<\/strong> et mettre en place les <strong>bons r\u00e9flexes <\/strong>dans le domaine professionnel et personnel sans y associer de la contrainte<\/p>\n\n\n\n<p><strong>Th\u00e8mes abord\u00e9s :<\/strong><br>&#8211; Comprendre les m\u00e9canismes des pi\u00e8ges pour mieux s\u2019y pr\u00e9parer<br>&#8211; Partager l\u2019actualit\u00e9 des attaques r\u00e9centes et leurs impacts dans le domaine de l&rsquo;entreprise<br>&#8211; Mettre en exergue les points de vigilance et les r\u00e9actions appropri\u00e9es adapt\u00e9s \u00e0 votre contexte<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sensibilisation collaborateur : 100% vigilance 0% contrainte Une des premi\u00e8res failles exploit\u00e9es par les hackers est l&rsquo;insouciance des collaborateurs de votre entreprise, au travers de m\u00e9canismes d&rsquo;ing\u00e9nierie sociale. La cybers\u00e9curit\u00e9 impose des contraintes pouvant d\u00e9grader l&rsquo;exp\u00e9rience collaborateur. Il est donc fondamental de gagner en vigilance sans contraindre pour maximiser l&rsquo;appropriation. spark&amp;go vous propose des m\u00e9thodes&hellip;&nbsp;<a href=\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/\" class=\"\" rel=\"bookmark\">Lire la suite &raquo;<span class=\"screen-reader-text\">Cybers\u00e9curit\u00e9<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"contained","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"on","footnotes":""},"class_list":["post-1144","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 - spark&amp;go<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 - spark&amp;go\" \/>\n<meta property=\"og:description\" content=\"Sensibilisation collaborateur : 100% vigilance 0% contrainte Une des premi\u00e8res failles exploit\u00e9es par les hackers est l&rsquo;insouciance des collaborateurs de votre entreprise, au travers de m\u00e9canismes d&rsquo;ing\u00e9nierie sociale. La cybers\u00e9curit\u00e9 impose des contraintes pouvant d\u00e9grader l&rsquo;exp\u00e9rience collaborateur. Il est donc fondamental de gagner en vigilance sans contraindre pour maximiser l&rsquo;appropriation. spark&amp;go vous propose des m\u00e9thodes&hellip;&nbsp;Lire la suite &raquo;Cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"spark&amp;go\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-12T06:13:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1024x1024.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/\",\"url\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/\",\"name\":\"Cybers\u00e9curit\u00e9 - spark&amp;go\",\"isPartOf\":{\"@id\":\"https:\/\/www.sparkngo.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1024x1024.jpeg\",\"datePublished\":\"2023-09-28T14:53:56+00:00\",\"dateModified\":\"2024-06-12T06:13:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-scaled.jpeg\",\"width\":2560,\"height\":2560,\"caption\":\"Composite image of spy in black hoodie\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.sparkngo.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sparkngo.fr\/#website\",\"url\":\"https:\/\/www.sparkngo.fr\/\",\"name\":\"spark&amp;go\",\"description\":\"Ensemble relevons vos d\u00e9fis !\",\"publisher\":{\"@id\":\"https:\/\/www.sparkngo.fr\/#organization\"},\"alternateName\":\"sparkngo\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sparkngo.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sparkngo.fr\/#organization\",\"name\":\"spark&amp;go\",\"url\":\"https:\/\/www.sparkngo.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.sparkngo.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/07\/logo-transparent-bk.png\",\"contentUrl\":\"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/07\/logo-transparent-bk.png\",\"width\":674,\"height\":158,\"caption\":\"spark&amp;go\"},\"image\":{\"@id\":\"https:\/\/www.sparkngo.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/sparkngo\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 - spark&amp;go","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 - spark&amp;go","og_description":"Sensibilisation collaborateur : 100% vigilance 0% contrainte Une des premi\u00e8res failles exploit\u00e9es par les hackers est l&rsquo;insouciance des collaborateurs de votre entreprise, au travers de m\u00e9canismes d&rsquo;ing\u00e9nierie sociale. La cybers\u00e9curit\u00e9 impose des contraintes pouvant d\u00e9grader l&rsquo;exp\u00e9rience collaborateur. Il est donc fondamental de gagner en vigilance sans contraindre pour maximiser l&rsquo;appropriation. spark&amp;go vous propose des m\u00e9thodes&hellip;&nbsp;Lire la suite &raquo;Cybers\u00e9curit\u00e9","og_url":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/","og_site_name":"spark&amp;go","article_modified_time":"2024-06-12T06:13:49+00:00","og_image":[{"url":"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1024x1024.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/","url":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/","name":"Cybers\u00e9curit\u00e9 - spark&amp;go","isPartOf":{"@id":"https:\/\/www.sparkngo.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-1024x1024.jpeg","datePublished":"2023-09-28T14:53:56+00:00","dateModified":"2024-06-12T06:13:49+00:00","breadcrumb":{"@id":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#primaryimage","url":"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-scaled.jpeg","contentUrl":"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/08\/AdobeStock_153083387-square-scaled.jpeg","width":2560,"height":2560,"caption":"Composite image of spy in black hoodie"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sparkngo.fr\/index.php\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.sparkngo.fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.sparkngo.fr\/#website","url":"https:\/\/www.sparkngo.fr\/","name":"spark&amp;go","description":"Ensemble relevons vos d\u00e9fis !","publisher":{"@id":"https:\/\/www.sparkngo.fr\/#organization"},"alternateName":"sparkngo","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sparkngo.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.sparkngo.fr\/#organization","name":"spark&amp;go","url":"https:\/\/www.sparkngo.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.sparkngo.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/07\/logo-transparent-bk.png","contentUrl":"https:\/\/www.sparkngo.fr\/wp-content\/uploads\/2023\/07\/logo-transparent-bk.png","width":674,"height":158,"caption":"spark&amp;go"},"image":{"@id":"https:\/\/www.sparkngo.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sparkngo\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/pages\/1144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/comments?post=1144"}],"version-history":[{"count":12,"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/pages\/1144\/revisions"}],"predecessor-version":[{"id":1550,"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/pages\/1144\/revisions\/1550"}],"wp:attachment":[{"href":"https:\/\/www.sparkngo.fr\/index.php\/wp-json\/wp\/v2\/media?parent=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}