{"id":602,"date":"2022-03-28T10:44:29","date_gmt":"2022-03-28T08:44:29","guid":{"rendered":"https:\/\/www.antivirusedition.com\/blog\/?p=602"},"modified":"2022-03-28T10:44:35","modified_gmt":"2022-03-28T08:44:35","slug":"comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur","status":"publish","type":"post","link":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html","title":{"rendered":"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&rsquo;utilisateur"},"content":{"rendered":"\n<p>Il est temps pour les entreprises de s&rsquo;\u00e9loigner des mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg\" alt=\"\" class=\"wp-image-603\"\/><\/figure><\/div>\n\n\n\n<p>Dans cet article, nous allons nous pencher sur les nouvelles tendances et pr\u00e9visions pour 2021, examiner pourquoi les PME doivent remplacer leurs mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes \u00e0 la lumi\u00e8re de ces tendances, et discuter de la fa\u00e7on dont la tendance vers des services de cloud convergents donne aux MSSP de nouvelles opportunit\u00e9s pour b\u00e9n\u00e9ficier de revenus continus provenant de solutions bas\u00e9es sur le cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tendances et pr\u00e9dictions pour 2021 et au-del\u00e0<\/h2>\n\n\n\n<p>2021 est le moment pour les PME de se redresser, de s&rsquo;adapter et d&rsquo;\u00e9voluer. Elles sortiront du mode r\u00e9actif pour se concentrer sur l&rsquo;autonomisation et l&rsquo;op\u00e9rationnalisation de leur personnel \u00e0 distance. La cybers\u00e9curit\u00e9 doit \u00eatre plus rapide, plus intelligente et plus fiable que jamais pour donner aux PME les moyens de relever les nouveaux d\u00e9fis auxquels elles seront confront\u00e9es en 2021 et au-del\u00e0 :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>1. La main-d'\u0153uvre \u00e0 distance est l\u00e0 pour rester<\/strong><\/code><\/pre>\n\n\n\n<p>Avec des millions de personnes travaillant \u00e0 distance, les statistiques montrent que les employ\u00e9s et les PME sont pr\u00eats \u00e0 ce que la \u00ab\u00a0nouvelle normalit\u00e9\u00a0\u00bb devienne la \u00ab\u00a0normale\u00a0\u00bb. L&rsquo;autonomisation et la s\u00e9curisation de cette main-d&rsquo;\u0153uvre \u00e0 distance grandissante seront une priorit\u00e9 absolue pour les PME.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>2. Les entreprises vont continuer \u00e0 acc\u00e9l\u00e9rer la transformation num\u00e9rique<\/strong><\/code><\/pre>\n\n\n\n<p>Les PME s&rsquo;attacheront \u00e0 doter la main-d&rsquo;\u0153uvre \u00e0 distance de nouveaux outils et de nouvelles exp\u00e9riences pour soutenir les r\u00e9sultats commerciaux et am\u00e9liorer la collaboration, la productivit\u00e9 et l&rsquo;exp\u00e9rience utilisateur. Alors que les PME continuent d&rsquo;acc\u00e9l\u00e9rer leur adoption du mobile, du BYOD, de l&rsquo;IoT, et plus encore, elles auront besoin de mod\u00e8les de s\u00e9curit\u00e9 agiles, flexibles et \u00e9volutifs, capables de soutenir cette croissance et ces changements continus.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>3. La s\u00e9curit\u00e9 est la priorit\u00e9 de l'agenda 2021<\/strong><\/code><\/pre>\n\n\n\n<p>Dans ce nouveau paysage num\u00e9rique, les PME sont plus vuln\u00e9rables, puisque 43 % de toutes les attaques de cybers\u00e9curit\u00e9 visent d\u00e9sormais les petites entreprises. La s\u00e9curit\u00e9 est une priorit\u00e9 absolue en 2021, les PME \u00e9tant pr\u00eates \u00e0 faire les investissements n\u00e9cessaires pour exploiter en toute s\u00e9curit\u00e9 une entreprise num\u00e9rique.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&rsquo;utilisateur<\/h2>\n\n\n\n<p>La s\u00e9curit\u00e9 du r\u00e9seau des PME doit aller bien au-del\u00e0 des quatre murs du bureau pour englober chaque utilisateur, chaque appareil, \u00e0 tout moment et en tout lieu. La n\u00e9cessit\u00e9 de disposer de m\u00e9thodes de s\u00e9curit\u00e9 efficaces, abordables et r\u00e9actives oriente les solutions vers des services cloud convergents.<\/p>\n\n\n\n<p>En 2021, les MSSP ont l&rsquo;opportunit\u00e9 de se d\u00e9velopper et d&rsquo;\u00e9tablir de nouvelles solutions de s\u00e9curit\u00e9 pour les PME qui combinent des composants bas\u00e9s sur le cloud, tels que des passerelles web s\u00e9curis\u00e9es et <a href=\"https:\/\/www.antivirusedition.com\/avast_business_antivirus.php\">une s\u00e9curit\u00e9 avanc\u00e9e des terminaux.<\/a> Les MSSP peuvent aider les entreprises en leur fournissant des recommandations sur les derni\u00e8res technologies de s\u00e9curit\u00e9, comme la s\u00e9curit\u00e9 bas\u00e9e sur le cloud, et en g\u00e9rant l&rsquo;ensemble de leur infrastructure, g\u00e9n\u00e9rant des revenus continus gr\u00e2ce aux solutions bas\u00e9es sur le cloud tout en permettant aux PME de se concentrer sur ce qui compte le plus : leur activit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"qua-blog-post-description\">Il est temps pour les entreprises de s&rsquo;\u00e9loigner des mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes. Dans cet article, nous allons nous pencher sur les nouvelles tendances et pr\u00e9visions pour 2021, examiner pourquoi les PME doivent remplacer leurs mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes \u00e0 la lumi\u00e8re de ces tendances, et discuter de la fa\u00e7on dont la tendance vers des [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-602","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&#039;utilisateur - Blog Avast Antivirus<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&#039;utilisateur - Blog Avast Antivirus\" \/>\n<meta property=\"og:description\" content=\"Il est temps pour les entreprises de s&rsquo;\u00e9loigner des mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes. Dans cet article, nous allons nous pencher sur les nouvelles tendances et pr\u00e9visions pour 2021, examiner pourquoi les PME doivent remplacer leurs mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes \u00e0 la lumi\u00e8re de ces tendances, et discuter de la fa\u00e7on dont la tendance vers des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\" \/>\n<meta property=\"og:site_name\" content=\"Blog Avast Antivirus\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-28T08:44:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-28T08:44:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg\" \/>\n<meta name=\"author\" content=\"La r\u00e9daction\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"La r\u00e9daction\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\"},\"author\":{\"name\":\"La r\u00e9daction\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#\\\/schema\\\/person\\\/a54a4f38b10ec1a05165b83d04497ced\"},\"headline\":\"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&rsquo;utilisateur\",\"datePublished\":\"2022-03-28T08:44:29+00:00\",\"dateModified\":\"2022-03-28T08:44:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\"},\"wordCount\":535,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.antivirusedition.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\",\"url\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\",\"name\":\"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l'utilisateur - Blog Avast Antivirus\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.antivirusedition.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg\",\"datePublished\":\"2022-03-28T08:44:29+00:00\",\"dateModified\":\"2022-03-28T08:44:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#\\\/schema\\\/person\\\/a54a4f38b10ec1a05165b83d04497ced\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage\",\"url\":\"https:\\\/\\\/www.antivirusedition.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg\",\"contentUrl\":\"https:\\\/\\\/www.antivirusedition.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&rsquo;utilisateur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/\",\"name\":\"Blog Avast Antivirus\",\"description\":\"Un site utilisant WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#\\\/schema\\\/person\\\/a54a4f38b10ec1a05165b83d04497ced\",\"name\":\"La r\u00e9daction\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g\",\"caption\":\"La r\u00e9daction\"},\"url\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/author\\\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l'utilisateur - Blog Avast Antivirus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html","og_locale":"fr_FR","og_type":"article","og_title":"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l'utilisateur - Blog Avast Antivirus","og_description":"Il est temps pour les entreprises de s&rsquo;\u00e9loigner des mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes. Dans cet article, nous allons nous pencher sur les nouvelles tendances et pr\u00e9visions pour 2021, examiner pourquoi les PME doivent remplacer leurs mod\u00e8les de s\u00e9curit\u00e9 obsol\u00e8tes \u00e0 la lumi\u00e8re de ces tendances, et discuter de la fa\u00e7on dont la tendance vers des [&hellip;]","og_url":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html","og_site_name":"Blog Avast Antivirus","article_published_time":"2022-03-28T08:44:29+00:00","article_modified_time":"2022-03-28T08:44:35+00:00","og_image":[{"url":"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg","type":"","width":"","height":""}],"author":"La r\u00e9daction","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"La r\u00e9daction","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#article","isPartOf":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html"},"author":{"name":"La r\u00e9daction","@id":"https:\/\/preprod.antivirusedition.com\/blog\/#\/schema\/person\/a54a4f38b10ec1a05165b83d04497ced"},"headline":"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&rsquo;utilisateur","datePublished":"2022-03-28T08:44:29+00:00","dateModified":"2022-03-28T08:44:35+00:00","mainEntityOfPage":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html"},"wordCount":535,"commentCount":0,"image":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage"},"thumbnailUrl":"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg","inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html","url":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html","name":"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l'utilisateur - Blog Avast Antivirus","isPartOf":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage"},"image":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage"},"thumbnailUrl":"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg","datePublished":"2022-03-28T08:44:29+00:00","dateModified":"2022-03-28T08:44:35+00:00","author":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/#\/schema\/person\/a54a4f38b10ec1a05165b83d04497ced"},"breadcrumb":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#primaryimage","url":"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg","contentUrl":"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2021\/05\/EXTERN_IT_Culture_cybersecurite_entreprise.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/preprod.antivirusedition.com\/blog\/comment-basculer-vers-un-modele-de-securite-centre-sur-lutilisateur-602.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/preprod.antivirusedition.com\/blog"},{"@type":"ListItem","position":2,"name":"Comment basculer vers un mod\u00e8le de s\u00e9curit\u00e9 centr\u00e9 sur l&rsquo;utilisateur"}]},{"@type":"WebSite","@id":"https:\/\/preprod.antivirusedition.com\/blog\/#website","url":"https:\/\/preprod.antivirusedition.com\/blog\/","name":"Blog Avast Antivirus","description":"Un site utilisant WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/preprod.antivirusedition.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/preprod.antivirusedition.com\/blog\/#\/schema\/person\/a54a4f38b10ec1a05165b83d04497ced","name":"La r\u00e9daction","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g","caption":"La r\u00e9daction"},"url":"https:\/\/preprod.antivirusedition.com\/blog\/author\/admin"}]}},"_links":{"self":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts\/602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/comments?post=602"}],"version-history":[{"count":1,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts\/602\/revisions"}],"predecessor-version":[{"id":604,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts\/602\/revisions\/604"}],"wp:attachment":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/media?parent=602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/categories?post=602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/tags?post=602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}