{"id":377824,"date":"2021-10-12T15:08:04","date_gmt":"2021-10-12T22:08:04","guid":{"rendered":"https:\/\/blog.webex.com\/uncategorized-fr\/les-hackers-accedent-aux-informations-sensibles-des-autorites-par-le-biais-de-leurs-sous-traitants-etes-vous-en-danger\/"},"modified":"2024-09-17T23:36:50","modified_gmt":"2024-09-18T06:36:50","slug":"les-hackers-accedent-aux-informations-sensibles-des-autorites-par-le-biais-de-leurs-sous-traitants-etes-vous-en-danger","status":"publish","type":"post","link":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-hackers-accedent-aux-informations-sensibles-des-autorites-par-le-biais-de-leurs-sous-traitants-etes-vous-en-danger\/","title":{"rendered":"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par ..."},"content":{"rendered":"<h2>S\u00e9curit\u00e9 des communications pour les sous-traitants du gouvernement<\/h2>\n<p>Bien que de nombreuses autorit\u00e9s gouvernementales soient prot\u00e9g\u00e9es des acc\u00e8s malveillants et des vols de donn\u00e9es, les sous-traitants et les fournisseurs avec lesquels elles \u00e9changent au quotidien sont tout aussi susceptibles d\u2019\u00eatre pirat\u00e9s.\u00a0De r\u00e9centes affaires impliquant des hackers infiltr\u00e9s via des sous-traitants d\u2019autorit\u00e9s gouvernementales ont mis au jour de nouvelles menaces visant la s\u00e9curit\u00e9 des informations de l\u2019\u00c9tat et la d\u00e9faillance de certaines plateformes de communication.<\/p>\n<p>Pour infiltrer les syst\u00e8mes, ces hackers ont recours \u00e0 de nombreux stratag\u00e8mes\u00a0:<\/p>\n<ul>\n<li>Ils se font passer pour un participant \u00e0 une r\u00e9union<\/li>\n<li>Ils enregistrent les conversations en traversant le r\u00e9seau<\/li>\n<li>Ils interceptent les fichiers stock\u00e9s ou en cours d\u2019envoi<\/li>\n<li>Ils enregistrent des messages et des vid\u00e9os depuis le r\u00e9seau<\/li>\n<\/ul>\n<h2><strong>S\u00e9curit\u00e9 des sous-traitants du gouvernement et de la d\u00e9fense<\/strong><\/h2>\n<p>Les gouvernements f\u00e9d\u00e9raux, d\u2019\u00e9tat et les municipalit\u00e9s mettent actuellement en place des programmes de conformit\u00e9 \u00e0 un ensemble de normes a minima pour prot\u00e9ger les informations qui circulent entre les sous-traitants et leurs agences.\u00a0Mais parfois, la conformit\u00e9 ne suffit pas. \u00c9tant donn\u00e9 la diversit\u00e9 des moyens de communication utilis\u00e9s pour les \u00e9changes professionnels, il est important de veiller \u00e0 ce que tous les appareils et toutes les sessions soient s\u00e9curis\u00e9s entre tous les participants.\u00a0R\u00e9unions audio, visioconf\u00e9rences, messagerie et partage de fichiers&#8230; tout doit \u00eatre prot\u00e9g\u00e9 par diverses m\u00e9thodes de s\u00e9curisation.<\/p>\n<p>Voici quelques conseils d\u2019am\u00e9lioration de la s\u00e9curit\u00e9 pour les sous-traitants des autorit\u00e9s gouvernementales\u00a0:<\/p>\n<ul>\n<li>Il est difficile de s\u00e9curiser les appels pass\u00e9s sur le r\u00e9seau t\u00e9l\u00e9phonique public. Cependant, la confidentialit\u00e9 des conversations sur des appareils s\u00e9curis\u00e9s via un service cloud peut \u00eatre assur\u00e9e avec des protocoles standards. Il est essentiel de s\u2019assurer non seulement que toutes les conversations audio et vid\u00e9o seront chiffr\u00e9es de mani\u00e8re classique, mais aussi qu\u2019une protection des identit\u00e9s et que la v\u00e9rification du public vis\u00e9 seront en vigueur.<\/li>\n<li>La messagerie et le partage de fichiers doivent \u00e9galement \u00eatre chiffr\u00e9s. Veillez \u00e0 appliquer un chiffrement de bout en bout pour les fichiers et les messages transf\u00e9r\u00e9s et au repos. Le stockage des donn\u00e9es doit non seulement inclure la protection des emplacements de stockage, mais aussi celle des contenus et des cl\u00e9s de chiffrement.\u00a0Le chiffrement de bout en bout est crucial pour la s\u00e9curisation des messages et des fichiers.<\/li>\n<li>Choisissez bien les produits qui permettront de respecter la conformit\u00e9 et d\u2019obtenir une s\u00e9curisation avanc\u00e9e.\u00a0Les produits de collaboration et de communication homologu\u00e9s par les autorit\u00e9s disposent de fonctionnalit\u00e9s de s\u00e9curisation des conversations avec les agences gouvernementales.\u00a0Les entreprises disposant de l\u2019autorisation FedRAMP pour leur produits cloud b\u00e9n\u00e9ficient de la conformit\u00e9 mat\u00e9rielle et logicielle qui permet aux sous-traitants d\u2019\u00eatre prot\u00e9g\u00e9s par les fonctionnalit\u00e9s homologu\u00e9es du gouvernement f\u00e9d\u00e9ral par le seul fait de s\u2019inscrire. Dans de nombreux cas, cette autorisation officielle ne suffit pas. Choisissez un service de collaboration avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 suppl\u00e9mentaires, telles qu\u2019un logiciel anti-malware, la v\u00e9rification des identit\u00e9s (IDP), la protection contre les pertes de donn\u00e9es (DLP) et l\u2019authentification multifacteurs (MFA). Pour en savoir plus sur toutes ces fonctionnalit\u00e9s, consultez le livre blanc sur la s\u00e9curit\u00e9, accessible via le lien fourni ci-dessous.<\/li>\n<li>Choisissez les bons partenaires. Le respect des normes et le d\u00e9veloppement de strat\u00e9gies de s\u00e9curit\u00e9 peuvent demander un travail colossal. Les consultants \u00e9tablissent parfois des proc\u00e9dures compliqu\u00e9es ou de vastes projets d\u2019impl\u00e9mentation. En devenant partenaire de Webex by Cisco, le leader de la collaboration s\u00e9curis\u00e9e et de la communication pour les autorit\u00e9s gouvernementales, vous b\u00e9n\u00e9ficiez des connaissances et de l\u2019assistance n\u00e9cessaires pour \u00e9changer efficacement avec vos clients des organismes publics. Webex for Government dispose de l\u2019autorisation FedRAMP Moderate et Webex for Defense de l\u2019autorisation IL5 (Impact level\u00a05) permettant de travailler activement avec le D\u00e9partement de la D\u00e9fense (DoD) des \u00c9tats-Unis. Cette plateforme communique avec le DoD via son r\u00e9seau NIPRNet.<\/li>\n<\/ul>\n<blockquote><p>\u00a0\u00a0Webex by Cisco propose de nombreuses ressources, quel que soit le stade de d\u00e9veloppement de vos mesures de s\u00e9curit\u00e9\u00a0:<\/p><\/blockquote>\n<ul>\n<li>\n<blockquote><p>Le livre blanc sur la s\u00e9curit\u00e9 des sous-traitants des autorit\u00e9s gouvernementales et de la d\u00e9fense fournit des informations concises sur les produits et les technologies qui respectent et d\u00e9passent des normes de conformit\u00e9 strictes, et prot\u00e8gent efficacement les communications avec les agences gouvernementales.\u00a0\u00a0<a href=\"https:\/\/www.webex.com\/content\/dam\/wbx\/us\/whitepaper\/security-for-government-contractors-cm-3115.pdf?utm_medium=Website&#038;utm_source=WDC&#038;utm_campaign=security_for_government_contractors_whitepaper&#038;team=DG\">Cliquez ici<\/a> pour savoir comment pr\u00e9venir les failles de s\u00e9curit\u00e9 lorsque vous collaborez avec le D\u00e9partement de la D\u00e9fense des \u00c9tats-Unis et d\u2019autres agences gouvernementales.<\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Pour obtenir d\u2019autres informations techniques sur les avantages de la s\u00e9curisation de Webex by Cisco, cliquez sur ce lien\u00a0: <a href=\"https:\/\/www.webex.com\/content\/dam\/wbx\/us\/documents\/pdf\/Security_Advantage_For_Webex_White_Paper.pdf\">pdf<\/a><\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Sur la page consacr\u00e9e \u00e0 Webex for Government, vous trouverez des informations d\u00e9taill\u00e9es sur les produits de r\u00e9unions, de messagerie et d\u2019appels conformes pour une utilisation avec des agences gouvernementales et qui fournissent une s\u00e9curisation avanc\u00e9e. <a href=\"https:\/\/www.webex.com\/industries\/government.html\">Collaboration s\u00e9curis\u00e9e | Webex for Government|<\/a><\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Appelez votre partenaire ou votre agence commerciale locale Cisco Government pour en savoir plus sur la mani\u00e8re dont Webex vous permettra d\u2019obtenir la conformit\u00e9 CMMC, un programme de cybers\u00e9curit\u00e9 d\u00e9velopp\u00e9 par le D\u00e9partement de la D\u00e9fense des \u00c9tats-Unis. 1-888-469-3239<\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Contactez Webex. <a href=\"http:\/\/webex.com\/contact-us-sales.html\">Cliquez ici<\/a> pour contacter Webex afin d\u2019obtenir des informations suppl\u00e9mentaires sur la s\u00e9curit\u00e9 pour les sous-traitants de agences gouvernementales et la gestion de vos communications.<\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p><strong>En savoir plu<\/strong><\/p>\n<p><a href=\"https:\/\/blog.webex.com\/fr\/visioconferences\/le-nouveau-webex-for-government-ameliore-les-performances-et-reduit-le-tco\/\">Le nouveau Webex for Government am\u00e9liore les performances et r\u00e9duit le TCO<\/a><\/p>\n<p><a href=\"https:\/\/blog.webex.com\/fr\/visioconferences\/extension-des-capacites-de-collaboration-dans-webex-for-government\/\">Extension des capacit\u00e9s de collaboration dans Webex for Government<\/a><\/p>\n<p><a href=\"https:\/\/blog.webex.com\/fr\/visioconferences\/webex-pour-le-gouvernement-recoit-lautorisation-du-programme-fedramp-federal-risk-and-authorization-management-program\/\">Webex for Government re\u00e7oit l\u2019autorisation FedRAMP<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>S\u00e9curit\u00e9 des communications pour les sous-traitants du gouvernement Bien que de nombreuses autorit\u00e9s gouvernementales soient prot\u00e9g\u00e9es des acc\u00e8s malveillants et [&hellip;]<\/p>\n","protected":false},"author":4280,"featured_media":373341,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5253,2770],"tags":[5606,4629,4088,14415,9925,5672,2393,5844],"class_list":["post-377824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-collaboration-fr","category-uncategorized-fr","tag-cisco-cloudlock-fr","tag-communications-cloud","tag-data-residency","tag-data-residency-fr","tag-fedramp-fr","tag-solutions-de-collaboration","tag-travail-hybride","tag-webex-appels"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par le biais de leurs sous-traitants. \u00cates-vous en danger\u00a0? | Webex Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par le biais de leurs sous-traitants. \u00cates-vous en danger\u00a0? | Webex Blog\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 des communications pour les sous-traitants du gouvernement Bien que de nombreuses autorit\u00e9s gouvernementales soient prot\u00e9g\u00e9es des acc\u00e8s malveillants et [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Webex Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-12T22:08:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T06:36:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png\" \/>\n\t<meta property=\"og:image:width\" content=\"975\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Niraj Gopal\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Niraj Gopal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\"},\"author\":{\"name\":\"Niraj Gopal\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/a48a34dc5f6ac5bf1f562e24ef716262\"},\"headline\":\"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par ...\",\"datePublished\":\"2021-10-12T22:08:04+00:00\",\"dateModified\":\"2024-09-18T06:36:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\"},\"wordCount\":1029,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png\",\"keywords\":[\"Cisco Cloudlock\",\"communications cloud\",\"Data Residency\",\"data residency\",\"FedRAMP\",\"Solutions de collaboration\",\"travail hybride\",\"Webex appels\"],\"articleSection\":[\"Collaboration\",\"Uncategorized @fr\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\",\"url\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\",\"name\":\"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par le biais de leurs sous-traitants. \u00cates-vous en danger\u00a0? | Webex Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png\",\"datePublished\":\"2021-10-12T22:08:04+00:00\",\"dateModified\":\"2024-09-18T06:36:50+00:00\",\"author\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/a48a34dc5f6ac5bf1f562e24ef716262\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage\",\"url\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png\",\"contentUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png\",\"width\":975,\"height\":554,\"caption\":\"two government officials standing outside a government building on a large flight of stairs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.webex.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par ...\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.webex.com\/es\/#website\",\"url\":\"https:\/\/blog.webex.com\/es\/\",\"name\":\"Webex Blog\",\"description\":\"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.webex.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/a48a34dc5f6ac5bf1f562e24ef716262\",\"name\":\"Niraj Gopal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8a86394fabda1b021ca7bdd5f44697756525b66671c95dc65b4ec7ce65fed4e3?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8a86394fabda1b021ca7bdd5f44697756525b66671c95dc65b4ec7ce65fed4e3?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Niraj Gopal\"},\"description\":\"Niraj is the Director of Product Management for Webex Enterprise Security and Compliance. Niraj owns the 360-degree approach to Webex security, spanning identity management, end-to-end encryption of customer content, Data Loss Prevention and DLP\/CASB partner ecosystem, mobile device security, 3rd party platform certifications and security policy controls in Control Hub.Niraj has more than 20 years of experience in enterprise software product management and has held leadership positions at leading technology companies. He has created several innovative products with a fanatic focus for solving customer problems and holds 7 patents.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/nirajgopal\/\"],\"url\":\"https:\/\/blog.webex.com\/fr\/contributors\/nirajgopal-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par le biais de leurs sous-traitants. \u00cates-vous en danger\u00a0? | Webex Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/","og_locale":"fr_FR","og_type":"article","og_title":"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par le biais de leurs sous-traitants. \u00cates-vous en danger\u00a0? | Webex Blog","og_description":"S\u00e9curit\u00e9 des communications pour les sous-traitants du gouvernement Bien que de nombreuses autorit\u00e9s gouvernementales soient prot\u00e9g\u00e9es des acc\u00e8s malveillants et [&hellip;]","og_url":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/","og_site_name":"Webex Blog","article_published_time":"2021-10-12T22:08:04+00:00","article_modified_time":"2024-09-18T06:36:50+00:00","og_image":[{"width":975,"height":554,"url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png","type":"image\/png"}],"author":"Niraj Gopal","twitter_misc":{"\u00c9crit par":"Niraj Gopal","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#article","isPartOf":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/"},"author":{"name":"Niraj Gopal","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/a48a34dc5f6ac5bf1f562e24ef716262"},"headline":"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par ...","datePublished":"2021-10-12T22:08:04+00:00","dateModified":"2024-09-18T06:36:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/"},"wordCount":1029,"commentCount":0,"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png","keywords":["Cisco Cloudlock","communications cloud","Data Residency","data residency","FedRAMP","Solutions de collaboration","travail hybride","Webex appels"],"articleSection":["Collaboration","Uncategorized @fr"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/","url":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/","name":"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par le biais de leurs sous-traitants. \u00cates-vous en danger\u00a0? | Webex Blog","isPartOf":{"@id":"https:\/\/blog.webex.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png","datePublished":"2021-10-12T22:08:04+00:00","dateModified":"2024-09-18T06:36:50+00:00","author":{"@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/a48a34dc5f6ac5bf1f562e24ef716262"},"breadcrumb":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#primaryimage","url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png","contentUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2021\/09\/Webex-for-Government.png","width":975,"height":554,"caption":"two government officials standing outside a government building on a large flight of stairs"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/hackers-are-using-government-contractors-to-access-sensitive-information-are-you-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.webex.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Les hackers acc\u00e8dent aux informations sensibles des autorit\u00e9s par ..."}]},{"@type":"WebSite","@id":"https:\/\/blog.webex.com\/es\/#website","url":"https:\/\/blog.webex.com\/es\/","name":"Webex Blog","description":"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.webex.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/a48a34dc5f6ac5bf1f562e24ef716262","name":"Niraj Gopal","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8a86394fabda1b021ca7bdd5f44697756525b66671c95dc65b4ec7ce65fed4e3?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a86394fabda1b021ca7bdd5f44697756525b66671c95dc65b4ec7ce65fed4e3?s=96&d=wp_user_avatar&r=g","caption":"Niraj Gopal"},"description":"Niraj is the Director of Product Management for Webex Enterprise Security and Compliance. Niraj owns the 360-degree approach to Webex security, spanning identity management, end-to-end encryption of customer content, Data Loss Prevention and DLP\/CASB partner ecosystem, mobile device security, 3rd party platform certifications and security policy controls in Control Hub.Niraj has more than 20 years of experience in enterprise software product management and has held leadership positions at leading technology companies. He has created several innovative products with a fanatic focus for solving customer problems and holds 7 patents.","sameAs":["https:\/\/www.linkedin.com\/in\/nirajgopal\/"],"url":"https:\/\/blog.webex.com\/fr\/contributors\/nirajgopal-2\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/posts\/377824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/users\/4280"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/comments?post=377824"}],"version-history":[{"count":0,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/posts\/377824\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/media\/373341"}],"wp:attachment":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/media?parent=377824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/categories?post=377824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/tags?post=377824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}