

{"version":"1.0","provider_name":"Gestions hospitali\u00e8res","provider_url":"https:\/\/www.ricom-web8.com\/gestions","author_name":"Gestions hospitali\u00e8res","author_url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/","title":"Cybers\u00e9curit\u00e9\u2009: entre enjeux strat\u00e9giques et sujet technique - Gestions hospitali\u00e8res","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0NUVthWwYg\"><a href=\"https:\/\/www.ricom-web8.com\/gestions\/cybersecurite-entre-enjeux-strategiques-et-sujet-technique\/\">Cybers\u00e9curit\u00e9\u2009: entre enjeux strat\u00e9giques et sujet technique<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ricom-web8.com\/gestions\/cybersecurite-entre-enjeux-strategiques-et-sujet-technique\/embed\/#?secret=0NUVthWwYg\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybers\u00e9curit\u00e9\u2009: entre enjeux strat\u00e9giques et sujet technique\u00a0\u00bb &#8212; Gestions hospitali\u00e8res\" data-secret=\"0NUVthWwYg\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Tour d\u2019horizon des cyberattaques Les attaques informatiques des syst\u00e8mes d\u2019information des \u00e9tablissements, de sant\u00e9 ou non, publics ou priv\u00e9s, rev\u00eatent diff\u00e9rentes formes\u2009: le ran\u00e7ongiciel, ou ransomware, est un logiciel malveillant con\u00e7u pour chiffrer les donn\u00e9es d\u2019un syst\u00e8me informatique, les rendant inaccessibles aux utilisateurs l\u00e9gitimes. Une ran\u00e7on est alors demand\u00e9e contre la cl\u00e9 de d\u00e9chiffrement. En 2022, l\u2019h\u00f4pital Sud-Francilien de Corbeil-Essonnes (CHSF) a \u00e9t\u00e9 paralys\u00e9 trois mois par une telle attaque,&hellip;"}