{"id":28839,"date":"2023-03-08T16:05:54","date_gmt":"2023-03-08T16:05:54","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=28839"},"modified":"2024-03-27T14:49:33","modified_gmt":"2024-03-27T14:49:33","slug":"cyber-card-25-desk-propre","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/","title":{"rendered":"Cyber virtuelle #25 \u2013 Desk propre"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.20.2&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb min_height=\u00a0\u00bb1363.1px\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<!-- divi:columns --><\/p>\n<div class=\"wp-block-columns\">\n<p><!-- divi:column --><\/p>\n<div class=\"wp-block-column\">\n<p><!-- divi:paragraph -->Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer&#8230;<\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph -->\u00catre conscient de certaines bonnes pratiques comportementales peut nous aider \u00e0 r\u00e9duire le risque que nos donn\u00e9es sensibles ou celles de notre entreprise ne tombent entre les mains de personnes malveillantes.<\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph --><em><strong>Cette fiche vous donnera quelques conseils pratiques pour \u00e9viter que vous ne fournissiez des informations utiles aux pirates\u00a0!<\/strong><\/em><em><strong><\/strong><\/em><\/p>\n<p><em><strong><\/strong><\/em><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:image {\"id\":28925,\"width\":823,\"height\":1164,\"sizeSlug\":\"large\",\"linkDestination\":\"media\"} --><\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR.png\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p><!-- \/divi:image --><\/p>\n<\/div>\n<p><!-- \/divi:column --><\/p>\n<\/div>\n<p><!-- \/divi:columns -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer&#8230; \u00catre conscient de certaines bonnes pratiques comportementales peut nous aider \u00e0 r\u00e9duire le risque que nos donn\u00e9es sensibles ou celles de notre entreprise ne tombent entre les mains de personnes malveillantes. Cette fiche vous donnera [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":29646,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[609,756,626,604,502],"class_list":["post-28839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte","tag-carte-virtuelle","tag-cyber-security-awareness-fr","tag-fiche","tag-sensibilisation-a-la-cybersecurite-fr-4","tag-sensibilisation-a-la-cybersecurite-fr-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber virtuelle #25 \u2013 Desk propre<\/title>\n<meta name=\"description\" content=\"Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber virtuelle #25 \u2013 Desk propre\" \/>\n<meta property=\"og:description\" content=\"Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-08T16:05:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-27T14:49:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"v.orefice\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"v.orefice\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/\"},\"author\":{\"name\":\"v.orefice\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/cab21e2e908ff83a6249abef7122dab2\"},\"headline\":\"Cyber virtuelle #25 \u2013 Desk propre\",\"datePublished\":\"2023-03-08T16:05:54+00:00\",\"dateModified\":\"2024-03-27T14:49:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/\"},\"wordCount\":167,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25FR-1.png\",\"keywords\":[\"carte virtuelle\",\"Cyber Security Awareness\",\"fiche\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/\",\"name\":\"Cyber virtuelle #25 \u2013 Desk propre\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25FR-1.png\",\"datePublished\":\"2023-03-08T16:05:54+00:00\",\"dateModified\":\"2024-03-27T14:49:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/cab21e2e908ff83a6249abef7122dab2\"},\"description\":\"Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25FR-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25FR-1.png\",\"width\":1440,\"height\":810,\"caption\":\"Anteprima Cyber Card 25 francese\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/03\\\/08\\\/cyber-card-25-desk-propre\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber virtuelle #25 \u2013 Desk propre\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/cab21e2e908ff83a6249abef7122dab2\",\"name\":\"v.orefice\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g\",\"caption\":\"v.orefice\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/v-orefice\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber virtuelle #25 \u2013 Desk propre","description":"Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber virtuelle #25 \u2013 Desk propre","og_description":"Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer...","og_url":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2023-03-08T16:05:54+00:00","article_modified_time":"2024-03-27T14:49:33+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR-1.png","type":"image\/png"}],"author":"v.orefice","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"v.orefice","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/"},"author":{"name":"v.orefice","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/cab21e2e908ff83a6249abef7122dab2"},"headline":"Cyber virtuelle #25 \u2013 Desk propre","datePublished":"2023-03-08T16:05:54+00:00","dateModified":"2024-03-27T14:49:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/"},"wordCount":167,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR-1.png","keywords":["carte virtuelle","Cyber Security Awareness","fiche","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Carte"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/","url":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/","name":"Cyber virtuelle #25 \u2013 Desk propre","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR-1.png","datePublished":"2023-03-08T16:05:54+00:00","dateModified":"2024-03-27T14:49:33+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/cab21e2e908ff83a6249abef7122dab2"},"description":"Combien d\u2019informations sensibles sont disponibles dans un poste de travail classique\u00a0? En fait, beaucoup plus que vous ne pouvez l\u2019imaginer...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR-1.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25FR-1.png","width":1440,"height":810,"caption":"Anteprima Cyber Card 25 francese"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/03\/08\/cyber-card-25-desk-propre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Cyber virtuelle #25 \u2013 Desk propre"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/cab21e2e908ff83a6249abef7122dab2","name":"v.orefice","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g","caption":"v.orefice"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/v-orefice\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/28839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=28839"}],"version-history":[{"count":18,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/28839\/revisions"}],"predecessor-version":[{"id":36907,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/28839\/revisions\/36907"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/29646"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=28839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=28839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=28839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}