

{"version":"1.0","provider_name":"Gestions hospitali\u00e8res","provider_url":"https:\/\/www.ricom-web8.com\/gestions","author_name":"Gestions hospitali\u00e8res","author_url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/","title":"Cybers\u00e9curit\u00e9 en milieu sensible - Gestions hospitali\u00e8res","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3hjkrKctWh\"><a href=\"https:\/\/www.ricom-web8.com\/gestions\/actualites\/cybersecurite-en-milieu-sensible\/\">Cybers\u00e9curit\u00e9 en milieu sensible<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ricom-web8.com\/gestions\/actualites\/cybersecurite-en-milieu-sensible\/embed\/#?secret=3hjkrKctWh\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybers\u00e9curit\u00e9 en milieu sensible\u00a0\u00bb &#8212; Gestions hospitali\u00e8res\" data-secret=\"3hjkrKctWh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Face \u00e0 l\u2019importance vitale du milieu m\u00e9dical, les cybercriminels n\u2019h\u00e9sitent pas \u00e0 tirer profit des fragilit\u00e9s creus\u00e9es par la crise sanitaire ou des failles cr\u00e9\u00e9es par la transformation num\u00e9rique du secteur. En France comme \u00e0 l\u2019international, les \u00e9tablissements hospitaliers, les pharmacies, les laboratoires et autres structures de soin font face \u00e0 des vagues incessantes de cyberattaques sur fond de grande vuln\u00e9rabilit\u00e9 informatique. Les donn\u00e9es sensibles qui transitent dans le milieu&hellip;"}