{"id":14401,"date":"2021-08-25T00:52:11","date_gmt":"2021-08-25T04:52:11","guid":{"rendered":"https:\/\/quantumlifecycle.com\/staging\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/"},"modified":"2021-08-25T00:52:11","modified_gmt":"2021-08-25T04:52:11","slug":"les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir","status":"publish","type":"post","link":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/","title":{"rendered":"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir"},"content":{"rendered":"<p>L&rsquo;\u00e8re num\u00e9rique a acc\u00e9l\u00e9r\u00e9 les affaires dans tous les secteurs. Pourtant, les avanc\u00e9es num\u00e9riques s&rsquo;accompagnent de nouveaux risques, notamment l&rsquo;impact potentiellement d\u00e9vastateur d&rsquo;une violation de donn\u00e9es. Ces cyber-\u00e9v\u00e9nements peuvent toucher n&rsquo;importe quelle entreprise, mais il existe plusieurs tactiques que les organisations peuvent d\u00e9ployer pour r\u00e9duire leur vuln\u00e9rabilit\u00e9. Voici ce qu&rsquo;il faut savoir sur les implications potentielles d&rsquo;une violation de donn\u00e9es et sur la mani\u00e8re de contr\u00f4ler votre risque.<\/p>\n<h2><strong>L&rsquo;impact consid\u00e9rable des violations de donn\u00e9es<\/strong><\/h2>\n<p>Les violations de donn\u00e9es peuvent affecter une entreprise de plusieurs fa\u00e7ons. Tout d&rsquo;abord, elle peut subir un pr\u00e9judice permanent en termes de r\u00e9putation. Les clients existants et potentiels perdent confiance dans une entreprise lorsque des donn\u00e9es personnelles sont expos\u00e9es. Cette atteinte peut \u00eatre co\u00fbteuse et r\u00e9duire consid\u00e9rablement les b\u00e9n\u00e9fices d&rsquo;une entreprise, la perte de client\u00e8le repr\u00e9sentant en moyenne <a href=\"https:\/\/www.csoonline.com\/article\/3434601\/what-is-the-cost-of-a-data-breach.html\">40 %<\/a> du co\u00fbt total d&rsquo;une violation de donn\u00e9es.<\/p>\n<p>Les autres co\u00fbts associ\u00e9s aux violations de donn\u00e9es peuvent \u00e9galement accabler les entreprises. Les violations de la r\u00e9glementation peuvent s&rsquo;accumuler : La <a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/\">LPRPDE<\/a>, la loi f\u00e9d\u00e9rale canadienne qui r\u00e9git la collecte et l&rsquo;utilisation des donn\u00e9es personnelles, pr\u00e9voit des amendes <a href=\"https:\/\/www.privacypolicies.com\/blog\/costs-non-compliance-privacy-laws\/\">pouvant atteindre 100 000 $ par infraction<\/a>. Les compagnies d&rsquo;assurance imposent \u00e9galement leurs propres sanctions. Les primes d&rsquo;assurance commerciale peuvent augmenter jusqu&rsquo;\u00e0 <a href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/finance\/articles\/cfo-insights-seven-hidden-costs-cyberattack.html\">200 %<\/a> pour la m\u00eame couverture apr\u00e8s une fuite de donn\u00e9es personnelles. Si l&rsquo;on tient compte de la perte de propri\u00e9t\u00e9 intellectuelle, de l&rsquo;avantage concurrentiel et des interruptions de fonctionnement, le co\u00fbt total d&rsquo;une violation de donn\u00e9es peut augmenter de fa\u00e7on exponentielle.<\/p>\n<p>Bien qu&rsquo;il puisse varier en fonction du secteur et de la taille de l&rsquo;entreprise, le co\u00fbt total moyen d&rsquo;une violation de donn\u00e9es est de <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">3,86 millions de dollars<\/a>. Pour les soins de sant\u00e9, le secteur dans lequel les violations de donn\u00e9es sont les plus co\u00fbteuses, le co\u00fbt est presque le double, soit <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">7,13 millions de dollars<\/a>. Ces pertes sont importantes pour les grandes entreprises, mais elles pourraient mettre en faillite une organisation plus petite.<\/p>\n<h2><strong>La nouvelle vague de violations de donn\u00e9es : Les attaques par ransomware<\/strong><\/h2>\n<p>Les technologies \u00e9voluent, tout comme les cybercriminels. Les ran\u00e7ongiciels sont une tactique de plus en plus populaire, consistant en un type sp\u00e9cifique de logiciel malveillant qui chiffre les donn\u00e9es et les rend inutilisables pour les entreprises. En \u00e9change du d\u00e9cryptage et de l&rsquo;acc\u00e8s aux donn\u00e9es, les pirates demandent une ran\u00e7on d&rsquo;un montant sp\u00e9cifique.<\/p>\n<p>Les attaques par ransomware prennent de l&rsquo;ampleur et se produisent \u00e0 un rythme croissant. Cette cybercriminalit\u00e9 est en passe de devenir l&rsquo;un des probl\u00e8mes de s\u00e9curit\u00e9 des donn\u00e9es les plus urgents au monde, et l&rsquo;ann\u00e9e 2021 a d\u00e9j\u00e0 \u00e9t\u00e9 marqu\u00e9e par un certain nombre d&rsquo;attaques :<\/p>\n<ul>\n<li>En mars, le fabricant d&rsquo;ordinateurs Acer a \u00e9t\u00e9 pris pour cible par le c\u00e9l\u00e8bre groupe de pirates informatiques REvil, qui a exig\u00e9 la plus importante ran\u00e7on connue en mati\u00e8re de cybercriminalit\u00e9, soit 50 millions de dollars. Acer avait initialement propos\u00e9 de payer <a href=\"https:\/\/www.secureworld.io\/industry-news\/acer-hit-with-highest-ransomware-demand-ever\">10 millions de dollars<\/a>, mais REvil semble avoir disparu depuis et <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/07\/13\/revil-ransomware-hackers-disappear\/?sh=b71a8937c636\">on ignore si un paiement a \u00e9t\u00e9 effectu\u00e9<\/a>.<\/li>\n<li>En mai, le plus grand conditionneur de viande au monde, JBS, a d\u00fb interrompre ses activit\u00e9s en Am\u00e9rique du Nord et en Australie apr\u00e8s qu&rsquo;une attaque a touch\u00e9 ses syst\u00e8mes informatiques. L&rsquo;entreprise a pay\u00e9 <a href=\"https:\/\/www.wsj.com\/articles\/jbs-paid-11-million-to-resolve-ransomware-attack-11623280781\">11 millions de dollars<\/a> pour reprendre le contr\u00f4le de ses donn\u00e9es et r\u00e9tablir ses activit\u00e9s.<\/li>\n<li>Le Colonial Pipeline des \u00c9tats-Unis a \u00e9galement \u00e9t\u00e9 attaqu\u00e9 en mai \u00e0 la suite d&rsquo;un mot de passe compromis. Le PDG du projet a pay\u00e9 une ran\u00e7on de <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password\">4,4 millions de dollars<\/a> \u00e0 un groupe cybercriminel russe pour reprendre ses activit\u00e9s.<\/li>\n<li>Le d\u00e9partement de police de Washington D.C. a \u00e9t\u00e9 une autre victime \u00e0 la fin du printemps. Une bande de ransomware a saisi <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/05\/13\/ransomware-hackers-claim-to-leak-250gb-of-washington-dc-police-data-after-cops-dont-pay-4-million-ransom\/?sh=13da2d2958d0\">250 Go<\/a> de fichiers et a menac\u00e9 de les lib\u00e9rer si une ran\u00e7on de 4 millions de dollars n&rsquo;\u00e9tait pas pay\u00e9e. Finalement, les fichiers ont \u00e9t\u00e9 lib\u00e9r\u00e9s, et le volume et la sensibilit\u00e9 des donn\u00e9es semblent avoir \u00e9t\u00e9 exag\u00e9r\u00e9s.<\/li>\n<\/ul>\n<h2><strong>Une vuln\u00e9rabilit\u00e9 commune : De mauvaises politiques de destruction des donn\u00e9es<\/strong><\/h2>\n<p>Toutes les entreprises devraient disposer d&rsquo;un solide programme de s\u00e9curit\u00e9 des donn\u00e9es comprenant la formation des employ\u00e9s, des sauvegardes r\u00e9guli\u00e8res et une solide infrastructure informatique. En outre, il existe une menace tr\u00e8s simple qui est souvent n\u00e9glig\u00e9e : ce qu&rsquo;il advient des appareils une fois que les entreprises en ont fini avec eux.<\/p>\n<p>Les cybercriminels recherchent les organisations qui n&rsquo;ont pas de politique de destruction des donn\u00e9es. Les donn\u00e9es stock\u00e9es dans un entrep\u00f4t peu s\u00e9curis\u00e9 ou en transit sans protocoles appropri\u00e9s sont vuln\u00e9rables \u00e0 la cybercriminalit\u00e9. La s\u00e9curit\u00e9 et la destruction des donn\u00e9es ne peuvent donc pas \u00eatre consid\u00e9r\u00e9es comme des questions distinctes. Elles sont inextricablement li\u00e9es, et toutes les entreprises devraient avoir des politiques de s\u00e9curit\u00e9 des donn\u00e9es qui garantissent la destruction rapide et efficace des donn\u00e9es des appareils qui ne sont plus utilis\u00e9s par une entreprise ITAD certifi\u00e9e et exp\u00e9riment\u00e9e.<\/p>\n<p>Quelle que soit la taille ou le secteur d&rsquo;activit\u00e9 de votre entreprise, Quantum propose des options de destruction de donn\u00e9es pour vos actifs informatiques inutiles. Que vous choisissiez de faire remettre \u00e0 neuf ou recycler votre \u00e9quipement, de le traiter sur place ou de le r\u00e9cup\u00e9rer, notre \u00e9quipe peut \u00e9liminer en toute s\u00e9curit\u00e9 toute trace de donn\u00e9es de vos appareils.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;\u00e8re num\u00e9rique a acc\u00e9l\u00e9r\u00e9 les affaires dans tous les secteurs. Pourtant, les avanc\u00e9es num\u00e9riques s&rsquo;accompagnent de nouveaux risques, notamment l&rsquo;impact potentiellement d\u00e9vastateur&#8230;<\/p>\n","protected":false},"author":3,"featured_media":14402,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[47],"tags":[],"class_list":{"0":"post-14401","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blogue","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir - Quantum | ITAD &amp; E-Waste Recycling<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir - Quantum | ITAD &amp; E-Waste Recycling\" \/>\n<meta property=\"og:description\" content=\"L&rsquo;\u00e8re num\u00e9rique a acc\u00e9l\u00e9r\u00e9 les affaires dans tous les secteurs. Pourtant, les avanc\u00e9es num\u00e9riques s&rsquo;accompagnent de nouveaux risques, notamment l&rsquo;impact potentiellement d\u00e9vastateur...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/\" \/>\n<meta property=\"og:site_name\" content=\"Quantum | ITAD &amp; E-Waste Recycling\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T04:52:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Quantum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Quantum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/\"},\"author\":{\"name\":\"Quantum\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#\\\/schema\\\/person\\\/0d31d3a02b64f5418ee4090adb8ebfda\"},\"headline\":\"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir\",\"datePublished\":\"2021-08-25T04:52:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/\"},\"wordCount\":1005,\"publisher\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/\",\"name\":\"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir - Quantum | ITAD &amp; E-Waste Recycling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"datePublished\":\"2021-08-25T04:52:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"contentUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/blogue\\\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#website\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/\",\"name\":\"Quantum | ITAD & E-Waste Recycling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#organization\",\"name\":\"Quantum Lifecycle Partners LP\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/logo.svg\",\"width\":2700,\"height\":848,\"caption\":\"Quantum Lifecycle Partners LP\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/fr_CA\\\/#\\\/schema\\\/person\\\/0d31d3a02b64f5418ee4090adb8ebfda\",\"name\":\"Quantum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"caption\":\"Quantum\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir - Quantum | ITAD &amp; E-Waste Recycling","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/","og_locale":"fr_CA","og_type":"article","og_title":"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir - Quantum | ITAD &amp; E-Waste Recycling","og_description":"L&rsquo;\u00e8re num\u00e9rique a acc\u00e9l\u00e9r\u00e9 les affaires dans tous les secteurs. Pourtant, les avanc\u00e9es num\u00e9riques s&rsquo;accompagnent de nouveaux risques, notamment l&rsquo;impact potentiellement d\u00e9vastateur...","og_url":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/","og_site_name":"Quantum | ITAD &amp; E-Waste Recycling","article_published_time":"2021-08-25T04:52:11+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","type":"image\/png"}],"author":"Quantum","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Quantum","Estimation du temps de lecture":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#article","isPartOf":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/"},"author":{"name":"Quantum","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#\/schema\/person\/0d31d3a02b64f5418ee4090adb8ebfda"},"headline":"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir","datePublished":"2021-08-25T04:52:11+00:00","mainEntityOfPage":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/"},"wordCount":1005,"publisher":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#organization"},"image":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#primaryimage"},"thumbnailUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","articleSection":["Blog"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/","url":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/","name":"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir - Quantum | ITAD &amp; E-Waste Recycling","isPartOf":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#primaryimage"},"image":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#primaryimage"},"thumbnailUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","datePublished":"2021-08-25T04:52:11+00:00","breadcrumb":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#primaryimage","url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","contentUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/blogue\/les-couts-stupefiants-des-violations-de-donnees-et-comment-les-prevenir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quantumlifecycle.com\/fr_CA\/"},{"@type":"ListItem","position":2,"name":"Les co\u00fbts stup\u00e9fiants des violations de donn\u00e9es et comment les pr\u00e9venir"}]},{"@type":"WebSite","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#website","url":"https:\/\/quantumlifecycle.com\/fr_CA\/","name":"Quantum | ITAD & E-Waste Recycling","description":"","publisher":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quantumlifecycle.com\/fr_CA\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#organization","name":"Quantum Lifecycle Partners LP","url":"https:\/\/quantumlifecycle.com\/fr_CA\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#\/schema\/logo\/image\/","url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2020\/01\/logo.svg","contentUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2020\/01\/logo.svg","width":2700,"height":848,"caption":"Quantum Lifecycle Partners LP"},"image":{"@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/quantumlifecycle.com\/fr_CA\/#\/schema\/person\/0d31d3a02b64f5418ee4090adb8ebfda","name":"Quantum","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","caption":"Quantum"}}]}},"_links":{"self":[{"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/posts\/14401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/comments?post=14401"}],"version-history":[{"count":0,"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/posts\/14401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/media\/14402"}],"wp:attachment":[{"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/media?parent=14401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/categories?post=14401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quantumlifecycle.com\/fr_CA\/wp-json\/wp\/v2\/tags?post=14401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}