{"id":4651,"date":"2021-06-23T09:16:41","date_gmt":"2021-06-23T07:16:41","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=4651"},"modified":"2023-11-20T14:12:29","modified_gmt":"2023-11-20T13:12:29","slug":"protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/","title":{"rendered":"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne dans l&#8217;entreprise"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Banner article DOT Protection des donn\u00e9es\" title=\"Banner article DOT Protection des donn\u00e9es\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" class=\"lazyload img-responsive wp-image-6239\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p><em>Au fur et \u00e0 mesure que les ann\u00e9es avancent, les entreprises construisent des ensembles de donn\u00e9es de plus en plus importants. Le d\u00e9veloppement de l\u2019Internet des Objets et l\u2019arriv\u00e9e de nouvelles technologies telles que la 5G d\u00e9multiplient les sources de donn\u00e9es et la quantit\u00e9 d\u2019information stock\u00e9e et de plus en plus importante chaque jour. Pour stocker toutes ces informations, les entreprises font appel \u00e0 des solutions externes, ce qui entra\u00eene des phases de migration et d\u2019\u00e9changes des informations, augmentant ainsi les risques de fuites de donn\u00e9es.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Stockage et \u00e9changes des informations depuis le cloud\u00a0: attention danger<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>Du c\u00f4t\u00e9 des entreprises, la plupart des donn\u00e9es sont stock\u00e9es dans des cloud. Pour des raisons d\u2019optimisation des co\u00fbts, de centralisation ou de facilit\u00e9 d\u2019utilisation, il s\u2019agit aujourd\u2019hui de la m\u00e9thode de stockage pr\u00e9f\u00e9r\u00e9e des entreprises. De fait, si les donn\u00e9es sont stock\u00e9es \u00e0 distance, cela signifie que pour pouvoir utiliser ces informations, il faut obligatoirement qu\u2019il y ait des \u00e9changes entre la plateforme de stockage et les bureaux de l\u2019entreprise. Une multiplication des \u00e9changes qui vient alors augmenter les risques de fuite et de piratage. Pourtant, \u00e0 en croire les derniers chiffres publi\u00e9s par IBM en 2018, plus d\u2019une faille sur deux \u00e9tait li\u00e9e \u00e0 une erreur humaine ou \u00e0 un probl\u00e8me li\u00e9 au syst\u00e8me. \u00c0 l\u2019inverse seulement 48% des fuites d\u2019informations seraient li\u00e9es \u00e0 des attaques\u2026 Autrement dit, cela signifie que plus d\u2019une fuite sur deux pourrait \u00eatre \u00e9vit\u00e9e parce que directement li\u00e9e au fonctionnement de l\u2019entreprise et \u00e0 des failles internes.<\/p>\n<p>De plus, il faut ajouter qu\u2019aucun secteur n\u2019est \u00e0 l\u2019abri. Toujours selon une \u00e9tude d\u2019IBM, les atteintes \u00e0 la protection des donn\u00e9es touchent tous les secteurs. Si certains comme les secteurs de la finance (16%) et le secteur des services (15%) sont plus touch\u00e9s, d\u2019autres comme le commerce (7%) et le public (7%) sont eux aussi expos\u00e9s.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>[Guide] Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">T\u00e9l\u00e9charger le guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>Pour limiter les probl\u00e8mes et les fuites de donn\u00e9es au sein de l\u2019entreprise, il est important de cr\u00e9er un \u00e9cosyst\u00e8me s\u00e9curis\u00e9, o\u00f9 tous les acteurs utilisant de pr\u00e8s ou de loin les informations sont connus et conscients des risques li\u00e9s \u00e0 leur usage des informations. \u00c0 cet \u00e9cosyst\u00e8me s\u00e9curis\u00e9 doit s\u2019ajouter la mise en place d\u2019une cartographie des chemins de l\u2019information o\u00f9 tous lieux d\u2019\u00e9change de donn\u00e9es sont connus, d\u00e9finis et encadr\u00e9s de mani\u00e8re claire et pr\u00e9cise. Cela permet de savoir o\u00f9 et quand il est important de prot\u00e9ger ses informations et d\u2019anonymiser ses informations afin d\u2019\u00e9viter les fuites.<\/p>\n<p>Enfin, afin d\u2019\u00e9viter les erreurs li\u00e9es au syst\u00e8me, il est \u00e9galement important de s\u2019assurer que tout son \u00e9cosyst\u00e8me de travail et ses outils sont compatibles, \u00e0 jour et qu\u2019ils n\u2019existent pas de failles connues de ses infrastructures informatiques.<\/p>\n<p>En mettant en place toutes ces solutions, allant de l\u2019anonymisation des donn\u00e9es \u00e0 la cr\u00e9ation d\u2019un environnement de travail s\u00e9curis\u00e9, les entreprises se donnent les moyens de se pr\u00e9munir d\u2019au moins une fuite sur deux au c\u0153ur de leur syst\u00e8me. Un investissement important, mais positif sur le long terme pour les soci\u00e9t\u00e9s, d\u2019autant plus lorsque l\u2019on sait que l\u2019\u00e9tude d\u2019IBM avait conclu que le cout moyen d\u2019un seul enregistrement compris \u00e9tait de presque 150$.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"jzZ3r5gY9Nw\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.<\/p>\n","protected":false},"author":4,"featured_media":6239,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71],"tags":[],"class_list":["post-4651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne<\/title>\n<meta name=\"description\" content=\"Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne\" \/>\n<meta property=\"og:description\" content=\"Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-23T07:16:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-20T13:12:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dot-anonymizer.fr\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pauline Magne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pauline Magne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\"},\"author\":{\"name\":\"Pauline Magne\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/d09f26ccc6c36f338406ebcb52e5aa8d\"},\"headline\":\"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne dans l&#8217;entreprise\",\"datePublished\":\"2021-06-23T07:16:41+00:00\",\"dateModified\":\"2023-11-20T13:12:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\"},\"wordCount\":2673,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"articleSection\":[\"Articles de blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\",\"name\":\"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"datePublished\":\"2021-06-23T07:16:41+00:00\",\"dateModified\":\"2023-11-20T13:12:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/d09f26ccc6c36f338406ebcb52e5aa8d\"},\"description\":\"Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"width\":940,\"height\":350,\"caption\":\"Banner article DOT Protection des donn\u00e9es\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/d09f26ccc6c36f338406ebcb52e5aa8d\",\"name\":\"Pauline Magne\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne","description":"Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/","og_locale":"en_US","og_type":"article","og_title":"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne","og_description":"Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2021-06-23T07:16:41+00:00","article_modified_time":"2023-11-20T13:12:29+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.dot-anonymizer.fr\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","type":"image\/png"}],"author":"Pauline Magne","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pauline Magne","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/"},"author":{"name":"Pauline Magne","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/d09f26ccc6c36f338406ebcb52e5aa8d"},"headline":"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne dans l&#8217;entreprise","datePublished":"2021-06-23T07:16:41+00:00","dateModified":"2023-11-20T13:12:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/"},"wordCount":2673,"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","articleSection":["Articles de blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/","name":"Protection des donn\u00e9es : une fuite sur deux est li\u00e9e \u00e0 un probl\u00e8me interne","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","datePublished":"2021-06-23T07:16:41+00:00","dateModified":"2023-11-20T13:12:29+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/d09f26ccc6c36f338406ebcb52e5aa8d"},"description":"Anonymiser les donn\u00e9es et cr\u00e9er un \u00e9cosyst\u00e8me sain au c\u0153ur de son entreprise pour limiter les probl\u00e8mes et les fuites de donn\u00e9es.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/protection-des-donnees-une-fuite-sur-deux-est-liee-a-un-probleme-interne-dans-lentreprise\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","width":940,"height":350,"caption":"Banner article DOT Protection des donn\u00e9es"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/d09f26ccc6c36f338406ebcb52e5aa8d","name":"Pauline Magne"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=4651"}],"version-history":[{"count":6,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4651\/revisions"}],"predecessor-version":[{"id":8462,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4651\/revisions\/8462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media\/6239"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=4651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=4651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=4651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}