{"id":26449,"date":"2020-05-25T12:30:07","date_gmt":"2020-05-25T12:30:07","guid":{"rendered":"http:\/\/35.157.126.229\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/"},"modified":"2023-03-06T15:05:00","modified_gmt":"2023-03-06T15:05:00","slug":"carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/","title":{"rendered":"Carte virtuelle #11 &#8211; Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbsection\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb30px|30px|30px|30px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbligne\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbText\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis: 100%;\">\n<div class=\"wp-block-group\">\n<p>Profitant de l\u2019urgence li\u00e9e \u00e0 la pand\u00e9mie de covid, les cybercriminels ont multipli\u00e9 leurs attaques par hame\u00e7onnage en utilisant tous les canaux \u00e0 leur disposition. Les attaques sont non seulement plus nombreuses, mais aussi plus dangereuses. Pour se d\u00e9fendre, la premi\u00e8re chose n\u00e9cessaire est d\u2019\u00eatre capable de les identifier d\u2019un \u00ab\u00a0coup d\u2019\u0153il\u00a0\u00bb.<\/p>\n<p>Pour cette raison, dans cette carte, nous avons voulu pr\u00e9senter les <span class=\"JsGRdQ\">3 types les plus courants d\u2019attaque par hame\u00e7onnage et les <\/span>conseils pratiques pour les identifier\u00a0:<\/p>\n<ol>\n<li>le hame\u00e7onnage qui utilise les courriels<\/li>\n<li>le hame\u00e7onnage utilisant les diff\u00e9rents syst\u00e8mes de messagerie (hame\u00e7onnage par sms)<\/li>\n<li>le hame\u00e7onnage utilisant le t\u00e9l\u00e9phone (vishing)<\/li>\n<\/ol>\n<p>Pour ne pas devenir une victime \u00ab\u00a0malgr\u00e9 vous\u00a0\u00bb des cybercriminels&#8230;<\/p>\n<p style=\"text-align: center;\"><em><strong>&#8230;continuez \u00e0 suivre nos cartes virtuelles\u00a0!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/11FR-1-724x1024.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/11FR-1-724x1024.png\" alt=\"11\" class=\"wp-image-19007\" width=\"820\" height=\"1160\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Profitant de l\u2019urgence li\u00e9e \u00e0 la pand\u00e9mie de covid, les cybercriminels ont multipli\u00e9 leurs attaques par hame\u00e7onnage en utilisant tous les canaux \u00e0 leur disposition. Les attaques sont non seulement plus nombreuses, mais aussi plus dangereuses. Pour se d\u00e9fendre, la premi\u00e8re chose n\u00e9cessaire est d\u2019\u00eatre capable de les identifier d\u2019un \u00ab\u00a0coup d\u2019\u0153il\u00a0\u00bb. Pour cette raison, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[609,756,54,606,604,607],"class_list":["post-26449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte","tag-carte-virtuelle","tag-cyber-security-awareness-fr","tag-cyber-security-awareness","tag-hameconnage-fr-2","tag-sensibilisation-a-la-cybersecurite-fr-4","tag-sensibilisation-a-la-cybersecurite-fr-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Carte virtuelle #11 - Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage<\/title>\n<meta name=\"description\" content=\"Cette carte virtuelle pr\u00e9sente les 3 types les plus courants d\u2019attaque par hame\u00e7onnage et les conseils pratiques pour les identifier...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Carte virtuelle #11 - Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage\" \/>\n<meta property=\"og:description\" content=\"Cette carte virtuelle pr\u00e9sente les 3 types les plus courants d\u2019attaque par hame\u00e7onnage et les conseils pratiques pour les identifier...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T12:30:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T15:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11FR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Carte virtuelle #11 &#8211; Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage\",\"datePublished\":\"2020-05-25T12:30:07+00:00\",\"dateModified\":\"2023-03-06T15:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/\"},\"wordCount\":260,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11FR.png\",\"keywords\":[\"carte virtuelle\",\"Cyber Security Awareness\",\"Cyber Security Awareness\",\"Hame\u00e7onnage\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/\",\"name\":\"Carte virtuelle #11 - Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11FR.png\",\"datePublished\":\"2020-05-25T12:30:07+00:00\",\"dateModified\":\"2023-03-06T15:05:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Cette carte virtuelle pr\u00e9sente les 3 types les plus courants d\u2019attaque par hame\u00e7onnage et les conseils pratiques pour les identifier...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11FR.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11FR.png\",\"width\":1920,\"height\":1080,\"caption\":\"cyber-card-11-IT-attacco-phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2020\\\/05\\\/25\\\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Carte virtuelle #11 &#8211; Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Carte virtuelle #11 - Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage","description":"Cette carte virtuelle pr\u00e9sente les 3 types les plus courants d\u2019attaque par hame\u00e7onnage et les conseils pratiques pour les identifier...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/","og_locale":"fr_FR","og_type":"article","og_title":"Carte virtuelle #11 - Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage","og_description":"Cette carte virtuelle pr\u00e9sente les 3 types les plus courants d\u2019attaque par hame\u00e7onnage et les conseils pratiques pour les identifier...","og_url":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2020-05-25T12:30:07+00:00","article_modified_time":"2023-03-06T15:05:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11FR.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Carte virtuelle #11 &#8211; Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage","datePublished":"2020-05-25T12:30:07+00:00","dateModified":"2023-03-06T15:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/"},"wordCount":260,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11FR.png","keywords":["carte virtuelle","Cyber Security Awareness","Cyber Security Awareness","Hame\u00e7onnage","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Carte"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/","url":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/","name":"Carte virtuelle #11 - Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11FR.png","datePublished":"2020-05-25T12:30:07+00:00","dateModified":"2023-03-06T15:05:00+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Cette carte virtuelle pr\u00e9sente les 3 types les plus courants d\u2019attaque par hame\u00e7onnage et les conseils pratiques pour les identifier...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11FR.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11FR.png","width":1920,"height":1080,"caption":"cyber-card-11-IT-attacco-phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2020\/05\/25\/carte-virtuelle-11-les-3-types-les-plus-courants-dattaques-par-hameconnage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Carte virtuelle #11 &#8211; Les 3 types les plus courants d\u2019attaques par hame\u00e7onnage"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=26449"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26449\/revisions"}],"predecessor-version":[{"id":28531,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26449\/revisions\/28531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/25064"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=26449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=26449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=26449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}