{"id":18060,"date":"2022-11-09T21:19:19","date_gmt":"2022-11-09T21:19:19","guid":{"rendered":"https:\/\/www.cyberguru.it\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/"},"modified":"2023-02-14T22:29:54","modified_gmt":"2023-02-14T22:29:54","slug":"les-gen-y-et-gen-z-desensibilisees-au-cyberrisque","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/","title":{"rendered":"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque"},"content":{"rendered":"\n<p>Il est facile de faire preuve de complaisance en mati\u00e8re de cybers\u00e9curit\u00e9. Apr\u00e8s tout, vous pouvez compter sur vos technologies de s\u00e9curit\u00e9 modernes et de pointe pour prot\u00e9ger le r\u00e9seau, le cloud et les terminaux contre les attaques avanc\u00e9es. Et vous faites confiance \u00e0 votre \u00e9quipe en charge des op\u00e9rations de s\u00e9curit\u00e9 pour surveiller, enqu\u00eater et r\u00e9soudre toutes les interactions et menaces num\u00e9riques.<\/p>\n\n\n\n<p>Mais il y a un probl\u00e8me. Il s&rsquo;agit de vos employ\u00e9s.  Selon une \u00e9tude r\u00e9cente men\u00e9e par EY Consulting, que nous examinons dans ce <a href=\"https:\/\/www.csoonline.com\/article\/3676579\/millennials-and-gen-z-less-likely-to-observe-cybersecurity-protocols-than-their-elders.html\">nouvel article de CSO<\/a>, l&rsquo;une des plus grandes menaces \u00e0 la cybers\u00e9curit\u00e9 s&rsquo;av\u00e8re la <strong>vuln\u00e9rabilit\u00e9 humaine<\/strong>.<\/p>\n\n\n\n<p>Selon les recherches men\u00e9es par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration&nbsp;Y et de la g\u00e9n\u00e9ration&nbsp;Z am\u00e9ricains sont beaucoup moins susceptibles de consid\u00e9rer comme une priorit\u00e9 les protocoles de cybers\u00e9curit\u00e9  ou d&rsquo;y adh\u00e9rer, compar\u00e9 \u00e0 leurs homologues plus \u00e2g\u00e9s de la g\u00e9n\u00e9ration&nbsp;X et du baby-boom.<\/p>\n\n\n\n<p>Bien qu&rsquo;ils comprennent le besoin de s\u00e9curit\u00e9, les jeunes travailleurs n\u00e9es \u00e0 l&rsquo;\u00e8re du num\u00e9rique sont \u00e9galement beaucoup plus susceptibles d&rsquo;ignorer les mises \u00e0 jour informatiques obligatoires dans la mesure du possible (58&nbsp;% pour la g\u00e9n\u00e9ration&nbsp;Z et 42&nbsp;% pour la g\u00e9n\u00e9ration&nbsp;Y contre 31&nbsp;% pour la g\u00e9n\u00e9ration&nbsp;X et 15&nbsp;% pour les baby-boomers).<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Principaux r\u00e9sultats de la recherche<\/h5>\n\n\n\n<p>Ils sont \u00e9galement plus susceptibles d&rsquo;utiliser le <strong>m\u00eame mot de passe<\/strong> pour les comptes professionnels et personnels (30&nbsp;% pour la g\u00e9n\u00e9ration&nbsp;Z et 31&nbsp;% pour la g\u00e9n\u00e9ration&nbsp;Y contre 22&nbsp;% pour la g\u00e9n\u00e9ration&nbsp;X et 15&nbsp;% pour les baby-boomers).<\/p>\n\n\n\n<p>L&rsquo;expression \u00ab&nbsp;plus susceptibles&nbsp;\u00bb dans le paragraphe ci-dessus est essentiel pour bien comprendre le ph\u00e9nom\u00e8ne. Utiliser le m\u00eame mot de passe dans la sph\u00e8re priv\u00e9e et professionnelle est un sc\u00e9nario classique parmi les utilisateurs du num\u00e9rique quels qu&rsquo;ils soient. Cette approche refl\u00e8te un degr\u00e9 de complaisance que les pirates informatiques seront prompts \u00e0 exploiter.<\/p>\n\n\n\n<p>L&rsquo;une des autres constatations qui a toute son importance dans cette \u00e9tude est la notion de <strong>perception<\/strong>&nbsp;: les employ\u00e9s ne se consid\u00e8rent pas comme le maillon faible de la s\u00e9curit\u00e9 de leur entreprise. Cette \u00e9tude r\u00e9v\u00e8le, par exemple, que les trois quarts (76&nbsp;%) des employ\u00e9s, toutes g\u00e9n\u00e9rations confondues, se consid\u00e8rent bien inform\u00e9s sur le sujet de la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Le simple fait de suivre une formation annuelle sur la conformit\u00e9 n&rsquo;est pas suffisant dans l&rsquo;environnement commercial en constante \u00e9volution de nos jours. Les utilisateurs disposent d&rsquo;un temps et d&rsquo;une attention limit\u00e9s pour \u00eatre sensibilis\u00e9s \u00e0 la s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Alors, comment les entreprises peuvent-elles contrecarrer la confiance des jeunes g\u00e9n\u00e9rations qui n\u00e9gligent et sous-estiment ouvertement les risques d&rsquo;hame\u00e7onnage, de ran\u00e7ongiciel, de fraude par e-mail et d&rsquo;autres cyberincidents&nbsp;?<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Les employ\u00e9s constituent votre premi\u00e8re ligne de d\u00e9fense<\/strong><\/h5>\n\n\n\n<p>Chez Cyber Guru, notre objectif est d&rsquo;acc\u00e9l\u00e9rer votre transformation num\u00e9rique s\u00e9curis\u00e9e avec des m\u00e9thodes d&rsquo;apprentissage modernes. Nous voulons que les employ\u00e9s agissent en toute s\u00e9curit\u00e9 et deviennent la premi\u00e8re ligne de d\u00e9fense au sein de leur entreprise, en r\u00e9duisant le facteur de vuln\u00e9rabilit\u00e9 humaine dans la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Notre plateforme de formation continue et adaptative de sensibilisation \u00e0 la s\u00e9curit\u00e9 guide et forme les employ\u00e9s pour qu&rsquo;ils deviennent la premi\u00e8re ligne de d\u00e9fense contre les cybermenaces, tout en minimisant l&rsquo;impact sur la productivit\u00e9 de l&rsquo;entreprise. La sensibilisation \u00e0 la s\u00e9curit\u00e9 ne se limite pas au sujet de l&rsquo;hame\u00e7onnage et \u00e0 la formation&nbsp;; elle n\u00e9cessite une \u00e9valuation du personnel et doit \u00eatre mesur\u00e9e. Les utilisateurs de l&rsquo;\u00e8re moderne exigent un contenu plus court et plus pertinent relatif \u00e0 leurs comportements et aux risques \u00e9mergents. Et c&rsquo;est justement ce que propose Cyber Guru.<\/p>\n\n\n\n<p>Il convient de mettre l&rsquo;accent \u00e0 360&nbsp;degr\u00e9s sur l&rsquo;anspect humain, impliquer chaque employ\u00e9, et int\u00e9grer des contr\u00f4les de s\u00e9curit\u00e9 ainsi que des protocoles qui rendent les risques tangibles dans leur vie professionnelle et personnelle.<\/p>\n\n\n\n<p>Les experts d&rsquo;EY Consulting confirment la valeur d&rsquo;une telle formation \u00e0 la s\u00e9curit\u00e9 pour les employ\u00e9s. Elle doit \u00eatre bas\u00e9e sur les r\u00f4les qu&rsquo;ils exercent et sur le risque qu&rsquo;ils encourent dans leur fonction. Selon l&rsquo;\u00e9tude, \u00ab&nbsp;les r\u00e9pondants ayant re\u00e7u une formation en cybers\u00e9curit\u00e9 pertinente pour le r\u00f4le qu&rsquo;ils assument au sine de leur entreprise au cours de l&rsquo;ann\u00e9e \u00e9coul\u00e9e \u00e9taient nettement plus susceptibles de mettre en \u0153uvre des pratiques de cybers\u00e9curit\u00e9 sur leur lieu de travail que ceux qui n&rsquo;avaient suivi aucune formation depuis plus d&rsquo;un an.&nbsp;\u00bb <\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Cyber Guru peut aider votre entreprise<\/h5>\n\n\n\n<p>Pour savoir comment Cyber Guru peut vous apporter son aide afin de modifier en profondeur le comportement de vos utilisateurs et transformer votre maillon faible en une premi\u00e8re ligne de d\u00e9fense, contactez nos experts pour discuter des formations \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyberguru.it\/en\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">R\u00e9servez un cr\u00e9neau pour un rendez-vous&nbsp;!<\/a><\/p>\n\n\n\n<div class=\"wp-block-group has-very-light-gray-background-color has-background is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-center\"><strong>En savoir plus sur les cours de formation de Cyber Guru<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"602\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new.png\" alt=\"\" class=\"wp-image-5779\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new.png 785w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/cyber-guru-phishing\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"602\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new.png\" alt=\"\" class=\"wp-image-5780\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new.png 785w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"602\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new.png\" alt=\"\" class=\"wp-image-6471\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new.png 785w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il est facile de faire preuve de complaisance en mati\u00e8re de cybers\u00e9curit\u00e9. Apr\u00e8s tout, vous pouvez compter sur vos technologies de s\u00e9curit\u00e9 modernes et de pointe pour prot\u00e9ger le r\u00e9seau, le cloud et les terminaux contre les attaques avanc\u00e9es. Et vous faites confiance \u00e0 votre \u00e9quipe en charge des op\u00e9rations de s\u00e9curit\u00e9 pour surveiller, enqu\u00eater [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[116],"tags":[555,498,556,502],"class_list":["post-18060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","tag-cyberrisque-fr","tag-cybersecurite-2","tag-generation-y-fr","tag-sensibilisation-a-la-cybersecurite-fr-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Guru<\/title>\n<meta name=\"description\" content=\"Selon l&#039;\u00e9tude men\u00e9e par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration\u00a0Y et de la g\u00e9n\u00e9ration\u00a0Z sont beaucoup moins enclins \u00e0 adh\u00e9rer aux protocoles de cybers\u00e9curit\u00e9 qui\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque\" \/>\n<meta property=\"og:description\" content=\"Selon l&#039;\u00e9tude men\u00e9e par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration\u00a0Y et de la g\u00e9n\u00e9ration\u00a0Z sont beaucoup moins enclins \u00e0 adh\u00e9rer aux protocoles de cybers\u00e9curit\u00e9 qui\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-09T21:19:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-14T22:29:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Millennials-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque\",\"datePublished\":\"2022-11-09T21:19:19+00:00\",\"dateModified\":\"2023-02-14T22:29:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/\"},\"wordCount\":905,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Millennials-1.webp\",\"keywords\":[\"Cyberrisque\",\"Cybers\u00e9curit\u00e9\",\"G\u00e9n\u00e9ration&nbsp;Y\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Millennials-1.webp\",\"datePublished\":\"2022-11-09T21:19:19+00:00\",\"dateModified\":\"2023-02-14T22:29:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Selon l'\u00e9tude men\u00e9e par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration\u00a0Y et de la g\u00e9n\u00e9ration\u00a0Z sont beaucoup moins enclins \u00e0 adh\u00e9rer aux protocoles de cybers\u00e9curit\u00e9 qui\u2026\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Millennials-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Millennials-1.webp\",\"width\":500,\"height\":290,\"caption\":\"Millennials\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/11\\\/09\\\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Guru","description":"Selon l'\u00e9tude men\u00e9e par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration\u00a0Y et de la g\u00e9n\u00e9ration\u00a0Z sont beaucoup moins enclins \u00e0 adh\u00e9rer aux protocoles de cybers\u00e9curit\u00e9 qui\u2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/","og_locale":"fr_FR","og_type":"article","og_title":"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque","og_description":"Selon l'\u00e9tude men\u00e9e par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration\u00a0Y et de la g\u00e9n\u00e9ration\u00a0Z sont beaucoup moins enclins \u00e0 adh\u00e9rer aux protocoles de cybers\u00e9curit\u00e9 qui\u2026","og_url":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-11-09T21:19:19+00:00","article_modified_time":"2023-02-14T22:29:54+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Millennials-1.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque","datePublished":"2022-11-09T21:19:19+00:00","dateModified":"2023-02-14T22:29:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/"},"wordCount":905,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Millennials-1.webp","keywords":["Cyberrisque","Cybers\u00e9curit\u00e9","G\u00e9n\u00e9ration&nbsp;Y","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Security Awareness"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/","url":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/","name":"","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Millennials-1.webp","datePublished":"2022-11-09T21:19:19+00:00","dateModified":"2023-02-14T22:29:54+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Selon l'\u00e9tude men\u00e9e par EY Consulting, les employ\u00e9s de la g\u00e9n\u00e9ration\u00a0Y et de la g\u00e9n\u00e9ration\u00a0Z sont beaucoup moins enclins \u00e0 adh\u00e9rer aux protocoles de cybers\u00e9curit\u00e9 qui\u2026","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Millennials-1.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Millennials-1.webp","width":500,"height":290,"caption":"Millennials"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/11\/09\/les-gen-y-et-gen-z-desensibilisees-au-cyberrisque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Les G\u00e9n&nbsp;Y et G\u00e9n Z \u00ab&nbsp;d\u00e9sensibilis\u00e9es&nbsp;\u00bb au cyberrisque"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/18060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=18060"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/18060\/revisions"}],"predecessor-version":[{"id":25598,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/18060\/revisions\/25598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/18032"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=18060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=18060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=18060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}