

{"version":"1.0","provider_name":"Gestions hospitali\u00e8res","provider_url":"https:\/\/www.ricom-web8.com\/gestions","author_name":"Gestions hospitali\u00e8res","author_url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/","title":"Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GyldjRk4li\"><a href=\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\">Former \u00e0 la cybers\u00e9curit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/embed\/#?secret=GyldjRk4li\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Former \u00e0 la cybers\u00e9curit\u00e9\u00a0\u00bb &#8212; Gestions hospitali\u00e8res\" data-secret=\"GyldjRk4li\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"En 2021, le nombre d\u2019attaques cyber a doubl\u00e9 par rapport \u00e0 l\u2019ann\u00e9e pr\u00e9c\u00e9dente. Dans la plupart des cas, les centres hospitaliers font face \u00e0 des pirates informatiques qui r\u00e9ussissent \u00e0 s\u2019infiltrer dans leur syst\u00e8me informatique pour y voler des donn\u00e9es sensibles et en bloquer l\u2019acc\u00e8s. Une ran\u00e7on est exig\u00e9e en \u00e9change d\u2019un retour \u00e0 la normale. Les \u00e9tablissements attaqu\u00e9s se retrouvent alors souvent totalement paralys\u00e9s et les cons\u00e9quences peuvent \u00eatre&hellip;","thumbnail_url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg"}