{"id":24807,"date":"2015-12-22T14:30:58","date_gmt":"2015-12-22T19:30:58","guid":{"rendered":"https:\/\/www.vircom.com\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/"},"modified":"2015-12-22T14:30:58","modified_gmt":"2015-12-22T19:30:58","slug":"mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite","status":"publish","type":"post","link":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/","title":{"rendered":"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9"},"content":{"rendered":"<p><a href=\"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-6417 aligncenter\" src=\"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg\" alt=\"S\u00e9curit\u00e9\" width=\"540\" height=\"360\" srcset=\"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg 640w, https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640-300x200.jpg 300w, https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640-600x400.jpg 600w\" sizes=\"(max-width: 540px) 100vw, 540px\"><\/a><\/p>\n<p>Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes et les appareils portables sont partout et le partage de connexion permet \u00e0 un utilisateur mobile d\u2019acc\u00e9der \u00e0 Internet de n\u2019importe o\u00f9, \u00e0 condition qu\u2019il ait un forfait de donn\u00e9es. La disponibilit\u00e9 du Web de n\u2019importe o\u00f9 est excellente pour les consommateurs, mais c\u2019est une pr\u00e9occupation croissante pour les experts en s\u00e9curit\u00e9 charg\u00e9s de prot\u00e9ger la vie priv\u00e9e des entreprises et des utilisateurs. Voici quelques fa\u00e7ons de prot\u00e9ger les donn\u00e9es de votre entreprise et de vos employ\u00e9s.   <\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Toujours chiffrer les donn\u00e9es pour les clients mobiles<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p>Vous pouvez avoir un acc\u00e8s ouvert pour vos clients et vous pouvez faciliter la connexion sans fil pour les employ\u00e9s. Ne faites jamais de compromis sur la s\u00e9curit\u00e9, et vous pouvez vous assurer que les espions ne peuvent pas espionner le trafic sans fil. N\u2019utilisez pas WEP non plus &#8211; WEP a \u00e9t\u00e9 pirat\u00e9 il y a des ann\u00e9es. Utilisez WPA2 et toute technologie de chiffrement future qui offre la meilleure <a href=\"https:\/\/www.vircom.com\/fr\/blog\/5-conseils-de-securite-pour-assurer-la-securite-de-votre-entreprise\/\">s\u00e9curit\u00e9<\/a>. Faites un effort pour passer du WEP si c\u2019est ce que vous utilisez actuellement.    <\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Configurer des services d\u2019essuyage \u00e0 distance<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p>Qu\u2019il s\u2019agisse d\u2019une application personnalis\u00e9e ou d\u2019une application fiable de l\u2019App Store, ayez toujours la possibilit\u00e9 d\u2019effacer les donn\u00e9es de l\u2019appareil \u00e0 distance. Cela signifie que si l\u2019appareil est perdu ou vol\u00e9, vous pouvez vous connecter \u00e0 un tableau de bord central dans le nuage o\u00f9 vous pouvez effacer \u00e0 distance les donn\u00e9es du t\u00e9l\u00e9phone. Il s\u00e9curise les donn\u00e9es priv\u00e9es des utilisateurs et tous les documents sensibles de l\u2019entreprise stock\u00e9s sur l\u2019appareil. Bien s\u00fbr, vous devriez combiner cela avec des sauvegardes s\u00e9curis\u00e9es afin que vos utilisateurs ne perdent pas tout leur travail \u00e0 cause de la perte ou du vol de leur t\u00e9l\u00e9phone intelligent ou de leur tablette.   <\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Maintenir une politique d\u2019application d\u2019entreprise<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p>Les pirates informatiques ciblent les appareils mobiles en raison de la mauvaise s\u00e9curit\u00e9. Les utilisateurs ajoutent rarement des applications anti-maliciels \u00e0 leur appareil, de sorte qu\u2019ils sont plus facilement expos\u00e9s \u00e0 des logiciels tiers destin\u00e9s \u00e0 voler des informations. La plupart des magasins d\u2019applications suppriment rapidement les applications qui volent des donn\u00e9es, mais pas avant que les cr\u00e9ateurs d\u2019applications n\u2019aient \u00e9t\u00e9 en mesure d\u2019inciter des centaines (parfois des milliers) d\u2019utilisateurs \u00e0 t\u00e9l\u00e9charger et \u00e0 ex\u00e9cuter le logiciel.  <\/p>\n<p>&nbsp;<\/p>\n<p>Avec une politique d\u2019application d\u2019entreprise, vous pouvez emp\u00eacher les utilisateurs de t\u00e9l\u00e9charger des applications malveillantes qui ne sont pas destin\u00e9es \u00e0 des t\u00e2ches li\u00e9es au travail. La politique mettra fin au vol de donn\u00e9es et prot\u00e9gera les donn\u00e9es priv\u00e9es stock\u00e9es sur l\u2019appareil. <\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Exiger des NIP de verrouillage<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p>Lorsqu\u2019un appareil est inactif, la configuration normale verrouille l\u2019\u00e9cran avec un code d\u2019acc\u00e8s. Cependant, les utilisateurs peuvent choisir de d\u00e9sactiver cette option dans les param\u00e8tres de leur appareil. La plupart des entreprises exigent que les utilisateurs verrouillent le bureau lorsqu\u2019ils quittent leur bureau et les m\u00eames r\u00e8gles devraient s\u2019appliquer \u00e0 un appareil mobile. Si l\u2019appareil est perdu ou vol\u00e9, un attaquant a facilement acc\u00e8s aux donn\u00e9es. Au moins avec un code d\u2019acc\u00e8s, cela met un obstacle devant quelqu\u2019un qui veut simplement voler des donn\u00e9es rapidement. Ce n\u2019est pas un blocage complet du vol de donn\u00e9es, mais c\u2019est un petit pas qui rend les choses plus difficiles.     <\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Gardez les applications mobiles \u00e0 jour<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p>Le personnel de s\u00e9curit\u00e9 doit toujours \u00eatre au courant des derni\u00e8res cybermenaces et avoir acc\u00e8s aux mises \u00e0 jour et aux scripts qui corrigent les vuln\u00e9rabilit\u00e9s. Installez les mises \u00e0 jour et informez les utilisateurs lorsque des mises \u00e0 jour sont disponibles. Avec les ordinateurs de bureau, vous pouvez envoyer des mises \u00e0 jour \u00e0 vos utilisateurs, mais vous n\u2019avez pas le m\u00eame contr\u00f4le avec un appareil mobile.  <\/p>\n<p>&nbsp;<\/p>\n<p>Vous ne pourrez pas s\u00e9curiser un appareil mobile comme vous le pouvez avec les ordinateurs de bureau et les ordinateurs portables, mais vous pouvez utiliser ces quelques t\u00e2ches pour am\u00e9liorer la s\u00e9curit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[779],"tags":[1166,1136,825],"class_list":["post-24807","post","type-post","status-publish","format-standard","hentry","category-cybersecurite-generale","tag-antipourriel","tag-antivirus-fr-2","tag-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9 - Vircom<\/title>\n<meta name=\"description\" content=\"Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"Vircom\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-22T19:30:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/06\/logo-vircom2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"228\" \/>\n\t<meta property=\"og:image:height\" content=\"253\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"George Stamatakos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Vircom_Inc\" \/>\n<meta name=\"twitter:site\" content=\"@Vircom_Inc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"George Stamatakos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/\"},\"author\":{\"name\":\"George Stamatakos\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#\\\/schema\\\/person\\\/141e227f692f606aaa7e76bdb1d0bbbc\"},\"headline\":\"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9\",\"datePublished\":\"2015-12-22T19:30:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/\"},\"wordCount\":764,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.vircom.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/smartphone-505851_640.jpg\",\"keywords\":[\"Antipourriel\",\"Antivirus\",\"S\u00e9curit\u00e9\"],\"articleSection\":[\"Cybers\u00e9curit\u00e9 g\u00e9n\u00e9rale\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/\",\"url\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/\",\"name\":\"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9 - Vircom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.vircom.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/smartphone-505851_640.jpg\",\"datePublished\":\"2015-12-22T19:30:58+00:00\",\"description\":\"Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.vircom.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/smartphone-505851_640.jpg\",\"contentUrl\":\"https:\\\/\\\/www.vircom.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/smartphone-505851_640.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/blog\\\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/\",\"name\":\"Vircom Email Security Solutions\",\"description\":\"Email Security Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#organization\"},\"alternateName\":\"Vircom Email Security Solutions For Cloud-Based and On Premise Protection\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#organization\",\"name\":\"Vircom Email Security Solutions\",\"alternateName\":\"Vircom Email Security Solutions For Cloud-Based and On Premise Protection\",\"url\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.vircom.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo-vircom2.png\",\"contentUrl\":\"https:\\\/\\\/www.vircom.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo-vircom2.png\",\"width\":228,\"height\":253,\"caption\":\"Vircom Email Security Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Vircom_Inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.vircom.com\\\/fr\\\/#\\\/schema\\\/person\\\/141e227f692f606aaa7e76bdb1d0bbbc\",\"name\":\"George Stamatakos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7182c320f1edf6ab4fbf017dd5e68425b02992548e776ef571d7fa7857a3e90?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7182c320f1edf6ab4fbf017dd5e68425b02992548e776ef571d7fa7857a3e90?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7182c320f1edf6ab4fbf017dd5e68425b02992548e776ef571d7fa7857a3e90?s=96&d=mm&r=g\",\"caption\":\"George Stamatakos\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9 - Vircom","description":"Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/","og_locale":"fr_CA","og_type":"article","og_title":"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9","og_description":"Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes","og_url":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/","og_site_name":"Vircom","article_published_time":"2015-12-22T19:30:58+00:00","og_image":[{"width":228,"height":253,"url":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/06\/logo-vircom2.png","type":"image\/png"}],"author":"George Stamatakos","twitter_card":"summary_large_image","twitter_creator":"@Vircom_Inc","twitter_site":"@Vircom_Inc","twitter_misc":{"Written by":"George Stamatakos","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#article","isPartOf":{"@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/"},"author":{"name":"George Stamatakos","@id":"https:\/\/www.vircom.com\/fr\/#\/schema\/person\/141e227f692f606aaa7e76bdb1d0bbbc"},"headline":"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9","datePublished":"2015-12-22T19:30:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/"},"wordCount":764,"commentCount":0,"publisher":{"@id":"https:\/\/www.vircom.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg","keywords":["Antipourriel","Antivirus","S\u00e9curit\u00e9"],"articleSection":["Cybers\u00e9curit\u00e9 g\u00e9n\u00e9rale"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/","url":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/","name":"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9 - Vircom","isPartOf":{"@id":"https:\/\/www.vircom.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#primaryimage"},"image":{"@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg","datePublished":"2015-12-22T19:30:58+00:00","description":"Les statistiques indiquent que les gens pr\u00e9f\u00e8rent les appareils mobiles aux ordinateurs de bureau pour acc\u00e9der \u00e0 Internet. Les t\u00e9l\u00e9phones, les tablettes","breadcrumb":{"@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#primaryimage","url":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg","contentUrl":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/11\/smartphone-505851_640.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.vircom.com\/fr\/blog\/mobilite-bonne-pour-les-consommateurs-mauvaise-pour-la-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.vircom.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Mobilit\u00e9 : bonne pour les consommateurs, mauvaise pour la s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.vircom.com\/fr\/#website","url":"https:\/\/www.vircom.com\/fr\/","name":"Vircom Email Security Solutions","description":"Email Security Solutions","publisher":{"@id":"https:\/\/www.vircom.com\/fr\/#organization"},"alternateName":"Vircom Email Security Solutions For Cloud-Based and On Premise Protection","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.vircom.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.vircom.com\/fr\/#organization","name":"Vircom Email Security Solutions","alternateName":"Vircom Email Security Solutions For Cloud-Based and On Premise Protection","url":"https:\/\/www.vircom.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.vircom.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/06\/logo-vircom2.png","contentUrl":"https:\/\/www.vircom.com\/wp-content\/uploads\/2024\/06\/logo-vircom2.png","width":228,"height":253,"caption":"Vircom Email Security Solutions"},"image":{"@id":"https:\/\/www.vircom.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Vircom_Inc"]},{"@type":"Person","@id":"https:\/\/www.vircom.com\/fr\/#\/schema\/person\/141e227f692f606aaa7e76bdb1d0bbbc","name":"George Stamatakos","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/d7182c320f1edf6ab4fbf017dd5e68425b02992548e776ef571d7fa7857a3e90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d7182c320f1edf6ab4fbf017dd5e68425b02992548e776ef571d7fa7857a3e90?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7182c320f1edf6ab4fbf017dd5e68425b02992548e776ef571d7fa7857a3e90?s=96&d=mm&r=g","caption":"George Stamatakos"}}]}},"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"George Stamatakos","author_link":"https:\/\/www.vircom.com\/fr\/blog\/author\/george-stamatakos\/"},"_links":{"self":[{"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/posts\/24807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/comments?post=24807"}],"version-history":[{"count":0,"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/posts\/24807\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/media?parent=24807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/categories?post=24807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vircom.com\/fr\/wp-json\/wp\/v2\/tags?post=24807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}