{"version":"1.0","provider_name":"internetVista Blog","provider_url":"https:\/\/blog.internetvista.com\/fr\/","author_name":"Cedric","author_url":"https:\/\/blog.internetvista.com\/fr\/author\/cedric\/","title":"Comment des cyberattaques pourraient tuer votre business\u00a0? - internetVista Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8vzsF840v7\"><a href=\"https:\/\/blog.internetvista.com\/fr\/comment-des-cyberattaques-pourraient-tuer-votre-business\/\">Comment des cyberattaques pourraient tuer votre business\u00a0?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.internetvista.com\/fr\/comment-des-cyberattaques-pourraient-tuer-votre-business\/embed\/#?secret=8vzsF840v7\" width=\"600\" height=\"338\" title=\"&#8220;Comment des cyberattaques pourraient tuer votre business\u00a0?&#8221; &#8212; internetVista Blog\" data-secret=\"8vzsF840v7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.internetvista.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.internetvista.com\/wp-content\/uploads\/2019\/06\/cyber-attack-and-monitoring.png","thumbnail_width":1024,"thumbnail_height":529,"description":"N\u00e9gliger la cybers\u00e9curit\u00e9 de votre soci\u00e9t\u00e9 peut nuire gravement \u00e0 votre business. Si vous comptez sur le financement provenant d&#8217;investisseurs, sachez que la plupart d\u2019entre eux se d\u00e9sint\u00e9ressent naturellement des soci\u00e9t\u00e9s vuln\u00e9rables, pirat\u00e9es ou victimes de cyberattaques. Le scandale li\u00e9 \u00e0 deux violations importantes de donn\u00e9es chez Yahoo\u00ae, touchant un milliard d\u2019utilisateurs, a failli faire [&hellip;]"}