{"id":26403,"date":"2020-07-24T12:43:36","date_gmt":"2020-07-24T12:43:36","guid":{"rendered":"http:\/\/35.157.126.229\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/"},"modified":"2023-03-06T14:56:37","modified_gmt":"2023-03-06T14:56:37","slug":"carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/","title":{"rendered":"Carte virtuelle #12 &#8211; 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbsection\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb30px|30px|30px|30px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbligne\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbText\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p>Les cybercriminels continuent de saisir toutes les occasions pour cr\u00e9er de nouvelles campagnes de hame\u00e7onnage par courriel. Les identifier d\u2019un \u00ab\u00a0coup d\u2019\u0153il\u00a0\u00bb peut devenir difficile, d\u2019autant plus que le niveau de sophistication a \u00e9norm\u00e9ment augment\u00e9 par rapport aux premi\u00e8res campagnes avec des courriels truff\u00e9s de fautes d\u2019orthographe.<\/p>\n<p>Que peut-on faire pour ne pas en \u00eatre victime\u00a0?<\/p>\n<p><span class=\"JsGRdQ\">Un comportement conscient et les 5 bonnes r\u00e8gles de notre carte virtuelle peuvent vous aider \u00e0 pr\u00e9venir une attaque par hame\u00e7onnage et ses effets n\u00e9fastes<\/span>:<\/p>\n<ol>\n<li>\u00e9viter les clics impulsifs<\/li>\n<li>se m\u00e9fier des liens<\/li>\n<li>se prot\u00e9ger soi-m\u00eame<\/li>\n<li>ne pas c\u00e9der \u00e0 l\u2019urgence<\/li>\n<li>douter de l\u2019authenticit\u00e9 d\u2019un courriel impromptu<\/li>\n<\/ol>\n<p>Pour ne pas devenir une victime \u00ab\u00a0malgr\u00e9 vous\u00a0\u00bb des cybercriminels&#8230;<\/p>\n<p style=\"text-align: center;\"><em><strong>&#8230;continuez \u00e0 suivre nos cartes virtuelles\u00a0!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/12FR-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/12FR-1-724x1024.png\" alt=\"\" class=\"wp-image-25257\" width=\"822\" height=\"1163\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cybercriminels continuent de saisir toutes les occasions pour cr\u00e9er de nouvelles campagnes de hame\u00e7onnage par courriel. Les identifier d\u2019un \u00ab\u00a0coup d\u2019\u0153il\u00a0\u00bb peut devenir difficile, d\u2019autant plus que le niveau de sophistication a \u00e9norm\u00e9ment augment\u00e9 par rapport aux premi\u00e8res campagnes avec des courriels truff\u00e9s de fautes d\u2019orthographe. Que peut-on faire pour ne pas en \u00eatre [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25060,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[609,756,606,604,607],"class_list":["post-26403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte","tag-carte-virtuelle","tag-cyber-security-awareness-fr","tag-hameconnage-fr-2","tag-sensibilisation-a-la-cybersecurite-fr-4","tag-sensibilisation-a-la-cybersecurite-fr-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Carte virtuelle #12 - 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage<\/title>\n<meta name=\"description\" content=\"Cette carte virtuelle donne 5 r\u00e8gles \u00e0 suivre pour pr\u00e9venir les attaques de hame\u00e7onnage par courriel et ne pas en \u00eatre victime...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Carte virtuelle #12 - 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage\" \/>\n<meta property=\"og:description\" content=\"Cette carte virtuelle donne 5 r\u00e8gles \u00e0 suivre pour pr\u00e9venir les attaques de hame\u00e7onnage par courriel et ne pas en \u00eatre victime...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-24T12:43:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T14:56:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12FR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Carte virtuelle #12 &#8211; 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage\",\"datePublished\":\"2020-07-24T12:43:36+00:00\",\"dateModified\":\"2023-03-06T14:56:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/\"},\"wordCount\":261,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12FR.png\",\"keywords\":[\"carte virtuelle\",\"Cyber Security Awareness\",\"Hame\u00e7onnage\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/\",\"name\":\"Carte virtuelle #12 - 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12FR.png\",\"datePublished\":\"2020-07-24T12:43:36+00:00\",\"dateModified\":\"2023-03-06T14:56:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Cette carte virtuelle donne 5 r\u00e8gles \u00e0 suivre pour pr\u00e9venir les attaques de hame\u00e7onnage par courriel et ne pas en \u00eatre victime...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12FR.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12FR.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/07\\\/24\\\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Carte virtuelle #12 &#8211; 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Carte virtuelle #12 - 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage","description":"Cette carte virtuelle donne 5 r\u00e8gles \u00e0 suivre pour pr\u00e9venir les attaques de hame\u00e7onnage par courriel et ne pas en \u00eatre victime...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/","og_locale":"fr_FR","og_type":"article","og_title":"Carte virtuelle #12 - 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage","og_description":"Cette carte virtuelle donne 5 r\u00e8gles \u00e0 suivre pour pr\u00e9venir les attaques de hame\u00e7onnage par courriel et ne pas en \u00eatre victime...","og_url":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2020-07-24T12:43:36+00:00","article_modified_time":"2023-03-06T14:56:37+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12FR.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Carte virtuelle #12 &#8211; 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage","datePublished":"2020-07-24T12:43:36+00:00","dateModified":"2023-03-06T14:56:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/"},"wordCount":261,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12FR.png","keywords":["carte virtuelle","Cyber Security Awareness","Hame\u00e7onnage","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Carte"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/","url":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/","name":"Carte virtuelle #12 - 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12FR.png","datePublished":"2020-07-24T12:43:36+00:00","dateModified":"2023-03-06T14:56:37+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Cette carte virtuelle donne 5 r\u00e8gles \u00e0 suivre pour pr\u00e9venir les attaques de hame\u00e7onnage par courriel et ne pas en \u00eatre victime...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12FR.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12FR.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/07\/24\/carte-virtuelle-12-5-regles-pour-prevenir-une-attaque-par-hameconnage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Carte virtuelle #12 &#8211; 5 r\u00e8gles pour pr\u00e9venir une attaque par hame\u00e7onnage"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=26403"}],"version-history":[{"count":10,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26403\/revisions"}],"predecessor-version":[{"id":28527,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26403\/revisions\/28527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/25060"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=26403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=26403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=26403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}