{"id":7934,"date":"2021-04-21T08:15:38","date_gmt":"2021-04-21T06:15:38","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=7934"},"modified":"2021-04-21T08:15:38","modified_gmt":"2021-04-21T06:15:38","slug":"cyberkriminalitaet-das-sind-die-gefahrenquellen","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/fr\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","title":{"rendered":"Cybercriminalit\u00e9 : voici les sources de danger"},"content":{"rendered":"<figure id=\"attachment_7935\" aria-describedby=\"caption-attachment-7935\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7935\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\" alt=\"\" width=\"680\" height=\"389\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-16x9.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-306x175.jpg 306w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-612x350.jpg 612w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-300x172.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7935\" class=\"wp-caption-text\">Travailler tranquillement sur son PC : Les apparences sont trompeuses. Car la cybercriminalit\u00e9 devient de plus en plus sophistiqu\u00e9e. (Image : Swisscom \/ Cyber Security Threat Radar 2020\/2021)<\/figcaption><\/figure>\n<p>Le flot de cybermenaces est toujours aussi important. <a href=\"https:\/\/www.organisator.ch\/cyber-vorfaelle-tipps-zur-richtigen-reaktion\/\">Les grandes entreprises et les PME sont toujours dans la ligne de mire des pirates informatiques<\/a>. Le passage de nombreux employ\u00e9s au bureau \u00e0 domicile en raison de la pand\u00e9mie a offert une plus grande surface d'attaque bienvenue \u00e0 la cybercriminalit\u00e9. Ils ont donc adapt\u00e9 leurs m\u00e9thodes d'attaque \u00e0 la nouvelle situation.<\/p>\n<h2>Cybercriminalit\u00e9 : nombre \u00e9lev\u00e9 d'attaques<\/h2>\n<p>Le dernier Cyber Security Threat Radar le montre : Le nombre d'attaques se maintient \u00e0 un niveau \u00e9lev\u00e9 et constant. Alors que certaines \u2500 m\u00e9thodes d'attaque plut\u00f4t classiques \u2500 sont en recul, des proc\u00e9dures intelligentes et souvent pilot\u00e9es par l'IA sont de plus en plus utilis\u00e9es. Les entreprises et les organisations sont ainsi mises au d\u00e9fi de garder une vue d'ensemble - les m\u00e9thodes des attaquants \u00e9voluent constamment.<\/p>\n<h2><strong>Nouvelles conditions, nouvelles m\u00e9thodes d'attaque <\/strong><\/h2>\n<p>Par exemple, l'h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9 du lieu de travail est devenue l'un des plus grands d\u00e9fis en mati\u00e8re de s\u00e9curit\u00e9 informatique. Le d\u00e9tachement imm\u00e9diat au bureau \u00e0 domicile a \u00e9t\u00e9 l'un des plus grands d\u00e9fis que les services informatiques et de s\u00e9curit\u00e9 ont d\u00fb relever dans un pass\u00e9 r\u00e9cent. Le home office ainsi que les mod\u00e8les de travail mobiles et agiles, comme par exemple \"Bring your own device\", offrent de grandes opportunit\u00e9s \u2500 mais ils ouvrent \u00e9galement de nouvelles surfaces d'attaque. Et les pirates exploitent habilement cette \u00e9volution \u00e0 leur avantage.<\/p>\n<h2>Les attaques bas\u00e9es sur l'IA gagnent du terrain<\/h2>\n<p>Les attaques utilisant l'intelligence artificielle, appel\u00e9es AI-based attacks, sont de plus en plus fr\u00e9quentes et sont consid\u00e9r\u00e9es comme une menace croissante dans le Cyber Security Threat Radar. Elles interviennent par exemple dans le cadre d'une d\u00e9sinformation cibl\u00e9e, telle qu'on la conna\u00eet par exemple avec les deepfakes. Ainsi, la cha\u00eene Tiktok \"Deeptomcruise\" a r\u00e9cemment fait sensation. Sur des vid\u00e9os, Tom Cruise montrait des tours de magie et jouait au golf. Mais le v\u00e9ritable tour de magie \u00e9tait la vid\u00e9o elle-m\u00eame : Car pour une fois, la star hollywoodienne n'a pas \u00e9t\u00e9 devant la cam\u00e9ra pour cela, il n'\u00e9tait m\u00eame pas au courant. Il s'agit d'une contrefa\u00e7on presque parfaite, cr\u00e9\u00e9e gr\u00e2ce \u00e0 l'intelligence artificielle. Gr\u00e2ce \u00e0 elle, les cybercriminels sont en mesure de cr\u00e9er automatiquement, \u00e0 partir des informations les plus diverses, un profil artificiel qu'il est tr\u00e8s difficile de reconna\u00eetre comme faux. Le rapport explique quelles contre-mesures les entreprises peuvent prendre pour faire face \u00e0 ces d\u00e9fis et \u00e0 d'autres.<\/p>\n<h2><strong>Boussole dans le cybermonde <\/strong><\/h2>\n<p>Avec le Cyber Security Threat Radar, les sp\u00e9cialistes de Swisscom ont d\u00e9termin\u00e9 la situation actuelle des menaces en Suisse. Le rapport explique les motivations des cybercriminels et d\u00e9voile leur mode op\u00e9ratoire. Il examine et observe les tendances et les d\u00e9fis, les \u00e9value et, gr\u00e2ce \u00e0 la mise en commun des connaissances des experts, fournit un aper\u00e7u de la situation des menaces et de leur \u00e9volution en Suisse.Il montre en outre quelles sont les contre-mesures particuli\u00e8rement efficaces pour d\u00e9tecter au mieux et \u00e0 temps les attaques.<\/p>\n<p><em>Source : Cyber Security Threat Radad 2020\/21 de <a href=\"http:\/\/www.swisscom.ch\">Swisscom<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die Flut an Cyberbedrohungen ist ungebrochen hoch. Grosse Firmen und KMU stehen nach wie vor im Visier von Hackern. Der pandemiebedingte Wechsel vieler Angestellten ins Homeoffice bot der Cyberkriminalit\u00e4t eine willkommene gr\u00f6ssere Angriffsfl\u00e4che. Entsprechend haben sie ihre Angriffsmethoden den neuen Gegebenheiten angepasst. Cyberkriminalit\u00e4t: Hohe Zahl an Angriffen Der neuste Cyber Security Threat Radar zeigt: Die [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7935,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cyberkriminalit\u00e4t","_yoast_wpseo_metadesc":"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.","articlekey":"","footnotes":""},"categories":[27],"tags":[142,260,286],"class_list":["post-7934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-cyber-crime","tag-ict-sicherheit","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen - Organisator<\/title>\n<meta name=\"description\" content=\"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen\" \/>\n<meta property=\"og:description\" content=\"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-21T06:15:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"#Cyberkriminalit\u00e4t: Das sind die #Gefahrenquellen\" \/>\n<meta name=\"twitter:description\" content=\"#Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie #Cyberkriminelle ihre Angriffsmethoden angepasst haben.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen\",\"datePublished\":\"2021-04-21T06:15:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\"},\"wordCount\":458,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\",\"name\":\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"datePublished\":\"2021-04-21T06:15:38+00:00\",\"description\":\"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"width\":680,\"height\":389,\"caption\":\"In Ruhe am PC arbeiten: Der Schein tr\u00fcgt. Denn die Cyberkriminalit\u00e4t wird immer ausgefeilter. (Bild: Swisscom \\\/ Cyber Security Threat Radar 2020\\\/2021)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/fr\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminalit\u00e9 : voici les sources de danger - Organisateur","description":"La cybercriminalit\u00e9 reste un sujet d'actualit\u00e9 : le Cyber Security Threat Radar de Swisscom montre comment les cybercriminels ont adapt\u00e9 leurs m\u00e9thodes d'attaque.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen","og_description":"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.","og_url":"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2021-04-21T06:15:38+00:00","og_image":[{"width":680,"height":389,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"#Cyberkriminalit\u00e4t: Das sind die #Gefahrenquellen","twitter_description":"#Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie #Cyberkriminelle ihre Angriffsmethoden angepasst haben.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen","datePublished":"2021-04-21T06:15:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/"},"wordCount":458,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT"],"articleSection":["IT"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","url":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","name":"Cybercriminalit\u00e9 : voici les sources de danger - Organisateur","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","datePublished":"2021-04-21T06:15:38+00:00","description":"La cybercriminalit\u00e9 reste un sujet d'actualit\u00e9 : le Cyber Security Threat Radar de Swisscom montre comment les cybercriminels ont adapt\u00e9 leurs m\u00e9thodes d'attaque.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","width":680,"height":389,"caption":"In Ruhe am PC arbeiten: Der Schein tr\u00fcgt. Denn die Cyberkriminalit\u00e4t wird immer ausgefeilter. (Bild: Swisscom \/ Cyber Security Threat Radar 2020\/2021)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organisateur","description":"Comp\u00e9tence et comp\u00e9tence. Proches de la pratique. L'ORGANISATEUR pr\u00e9pare 10 num\u00e9ros par an sur les th\u00e8mes essentiels pour les dirigeants de PME.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organisateur","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"thomas.berner","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/fr\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/7934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/comments?post=7934"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/7934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media\/7935"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media?parent=7934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/categories?post=7934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/tags?post=7934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}