{"id":59246,"date":"2018-10-30T12:40:30","date_gmt":"2018-10-30T16:40:30","guid":{"rendered":"https:\/\/isarta.com\/infos\/?p=59246"},"modified":"2018-10-30T15:38:51","modified_gmt":"2018-10-30T19:38:51","slug":"hameconnage-limportance-deffectuer-des-simulations-internes-aupres-de-ses-employes","status":"publish","type":"post","link":"https:\/\/isarta.com\/infos\/hameconnage-limportance-deffectuer-des-simulations-internes-aupres-de-ses-employes\/","title":{"rendered":"Hame\u00e7onnage\u00a0: l\u2019importance d\u2019effectuer des simulations internes aupr\u00e8s de ses employ\u00e9s"},"content":{"rendered":"<p><span style=\"font-size: 12px; color: #999999;\"><img loading=\"lazy\" class=\" wp-image-60079 aligncenter\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/freestocks-org-540554-unsplash-300x200.jpg\" alt=\"\" width=\"792\" height=\"528\" srcset=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/freestocks-org-540554-unsplash-300x200.jpg 300w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/freestocks-org-540554-unsplash-768x512.jpg 768w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/freestocks-org-540554-unsplash-1024x683.jpg 1024w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/>29 octobre 2018<\/span><\/p>\n<p><span class=\"s2\" style=\"font-size: 20px; color: #000080;\"><span class=\"s1\"><a href=\"http:\/\/www.ars-solutions.ca\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\">Notre expert Simon Fontaine<\/span><\/a>\u00a0s&rsquo;int\u00e9resse aujourd&rsquo;hui aux mani\u00e8res de se prot\u00e9ger contre une attaque informatique par hame\u00e7onnage, gr\u00e2ce \u00e0 la formation des employ\u00e9s.<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s3\">Les attaques par hame\u00e7onnage ou <i>phishing<\/i> ont connu une <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/cofense.com\/wp-content\/uploads\/2017\/11\/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf\" target=\"_blank\" rel=\"noopener\">hausse de 65 % au cours de la derni\u00e8re ann\u00e9e<\/a>.\u00a0<\/span><\/span><span class=\"s2\">Sachant que 80 % des utilisateurs ne d\u00e9tectent pas un courriel malveillant et<\/span><span class=\"s3\">\u00a0que le co\u00fbt moyen d\u2019une attaque pour une entreprise moyenne est de 1,6 million $ (<i>PhishMe<\/i>), il y a de quoi s\u2019inqui\u00e9ter&#8230; <\/span><\/p>\n<p class=\"p2\"><span class=\"s3\">Bien qu\u2019elles soient parfois difficiles \u00e0 d\u00e9tecter, il n\u2019en demeure pas moins qu\u2019avec la bonne formation, vos employ\u00e9s deviendront de bons alli\u00e9s. Effectuer des tests d\u2019hame\u00e7onnage dans votre entreprise vous permettra en effet de vous prot\u00e9ger et d\u2019\u00e9valuer votre degr\u00e9 de vuln\u00e9rabilit\u00e9.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/span><\/p>\n<p class=\"p4\"><span class=\"s3\">Personne ne peut \u00e9chapper \u00e0 cette menace qui ne cesse de prendre de l\u2019ampleur et de se sophistiquer. Il n\u2019est plus question de savoir qui sera le prochain, mais plut\u00f4t quand cela arrivera-t-il?<\/span><\/p>\n<p class=\"p7\"><span class=\"s3\">Voici les avantages d\u2019effectuer des simulations de <i>phishing <\/i>sur vos employ\u00e9s.\u00a0<\/span><\/p>\n<h2 class=\"p9\"><span class=\"s3\" style=\"color: #000080; font-size: 24px;\">Comment reconna\u00eetre l\u2019hame\u00e7onnage?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s3\">Une attaque engendre presque toujours des dommages financiers, que ce soit en temps ou via des transferts mon\u00e9taires. Le FBI estime que les arnaques par courriel ont co\u00fbt\u00e9 plus de 2,3 milliards de dollars aux organisations au cours des trois derni\u00e8res ann\u00e9es. Mais ce ne sont pas que des courriels&#8230; <\/span><\/p>\n<p class=\"p4\"><span class=\"s3\">Les escroqueries par phishing peuvent \u00eatre assez vari\u00e9es, allant des appels t\u00e9l\u00e9phoniques directs aux campagnes cibl\u00e9es sur les m\u00e9dias sociaux. Elles proviennent souvent d&rsquo;un courriel envoy\u00e9 par des personnes pr\u00e9tendument de la haute direction.<\/span><\/p>\n<blockquote>\n<p class=\"p12\"><span style=\"font-size: 16px;\"><span class=\"s3\"><i>76\u00a0% des entreprises ont \u00e9t\u00e9 victimes d\u2019une attaque d\u2019hame\u00e7onnage en 2017 \u00bb<\/i><\/span><span class=\"s7\"><i>&#8211;<\/i><\/span><span class=\"s9\">Wombat security<\/span><\/span><\/p>\n<\/blockquote>\n<p>Voici \u00e0 quoi ressemble un courriel frauduleux :<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter  wp-image-60078\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/pishing-300x112.png\" alt=\"\" width=\"831\" height=\"310\" srcset=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/pishing-300x112.png 300w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/pishing.png 756w\" sizes=\"(max-width: 831px) 100vw, 831px\" \/><\/p>\n<h2 class=\"p9\"><span class=\"s3\" style=\"font-size: 24px;\"><span style=\"color: #000080;\">Des tests d\u2019hame\u00e7onnage comme outil de sensibilisation<\/span> <\/span><\/h2>\n<p class=\"p10\"><span class=\"s3\">Les attaques par hame\u00e7onnage sont difficiles \u00e0 combattre, mais elles <\/span><span class=\"s11\">suivent des<i> <\/i>tendances <\/span><span class=\"s3\">qui peuvent \u00eatre d\u00e9tect\u00e9es avec la bonne formation. Chaque organisation devrait donc effectuer des simulations r\u00e9guli\u00e8res aupr\u00e8s de ses employ\u00e9s et maintenir une formation \u00e0 jour.<\/span><\/p>\n<p class=\"p10\"><span class=\"s3\">Des campagnes d&rsquo;hame\u00e7onnage internes permettent aux entreprises d&rsquo;\u00e9duquer leurs employ\u00e9s en toute s\u00e9curit\u00e9 sans risquer de perdre des informations et donn\u00e9es pr\u00e9cieuses. En \u00e9tant bien form\u00e9s, vos employ\u00e9s seront plus alertes et sauront comment r\u00e9agir \u00e0 une menace.<\/span><\/p>\n<h2 class=\"p18\"><span class=\"s3\" style=\"font-size: 24px;\"><span style=\"color: #000080;\">Comment \u00e7a marche?<\/span> <\/span><\/h2>\n<p class=\"p10\"><span class=\"s3\">Votre entreprise doit faire face \u00e0 une s\u00e9rie d&rsquo;incidents de s\u00e9curit\u00e9 simul\u00e9s portant sur divers th\u00e8mes\u00a0: le faux courriel d\u2019un dirigeant, <\/span><span class=\"s13\">un site Web clon\u00e9 (d&rsquo;apparence cr\u00e9dible) demandant aux employ\u00e9s de se connecter, etc.<\/span><\/p>\n<p class=\"p10\"><span class=\"s3\">Supposons que certains employ\u00e9s cliquent sur un lien d\u2019hame\u00e7onnage, une pi\u00e8ce jointe ou partagent des informations sensibles par le biais d&rsquo;un courriel malicieux. D\u00e8s que l\u2019\u00e9v\u00e9nement est d\u00e9tect\u00e9, l\u2019entreprise peut fournir \u00e0 ses employ\u00e9s une formation suppl\u00e9mentaire sur la fa\u00e7on de d\u00e9tecter et de signaler la fraude. <\/span><\/p>\n<p class=\"p19\"><span class=\"s3\">Ces tests permettent de conna\u00eetre votre degr\u00e9 de vuln\u00e9rabilit\u00e9 et d\u2019agir avant que vous ne soyez la prochaine victime.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.ars-solutions.ca\/2018\/09\/27\/hameconnage-il-est-temps-de-sensibiliser-serieusement-vos-employes\/\">SOURCE ORIGINALE<\/a><\/span><\/p>\n<div class=\"brdr2\"><\/div>\n<p><em>Vous avez aim\u00e9 cette publication?\u00a0<span style=\"color: #3366ff;\"><strong><a style=\"color: #3366ff;\" href=\"http:\/\/www.ars-solutions.ca\/blogue\/\" target=\"_blank\" rel=\"noopener\">Cliquez ici pour d\u2019autres articles de Simon Fontaine<\/a><\/strong><\/span><\/em><\/p>\n<div class=\"brdr2\"><\/div>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_59246\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/hameconnage-limportance-deffectuer-des-simulations-internes-aupres-de-ses-employes\/\"  data-item_title=\"Hame\u00e7onnage\u00a0: l\u2019importance d\u2019effectuer des simulations internes aupr\u00e8s de ses employ\u00e9s\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/freestocks-org-540554-unsplash-1024x683.jpg\"  data-item_date=\"2018-10-30T12:40:30-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><\/p>\n<hr size=\"3\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Notre expert Simon Fontaine\u00a0s&rsquo;int\u00e9resse aujourd&rsquo;hui aux mani\u00e8res de se prot\u00e9ger contre une attaque informatique par hame\u00e7onnage, gr\u00e2ce \u00e0 la formation des employ\u00e9s.<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_59246\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/hameconnage-limportance-deffectuer-des-simulations-internes-aupres-de-ses-employes\/\"  data-item_title=\"Hame\u00e7onnage\u00a0: l\u2019importance d\u2019effectuer des simulations internes aupr\u00e8s de ses employ\u00e9s\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/10\/freestocks-org-540554-unsplash-1024x683.jpg\"  data-item_date=\"2018-10-30T12:40:30-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><hr size=\"3\"><\/div>","protected":false},"author":62,"featured_media":60079,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[175,137,3],"tags":[],"_links":{"self":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/59246"}],"collection":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/comments?post=59246"}],"version-history":[{"count":4,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/59246\/revisions"}],"predecessor-version":[{"id":60080,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/59246\/revisions\/60080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media\/60079"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media?parent=59246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/categories?post=59246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/tags?post=59246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}