{"version":"1.0","provider_name":"Vaultinum","provider_url":"https:\/\/vaultinum.com\/fr","author_name":"alexis","author_url":"https:\/\/vaultinum.com\/blog\/author\/alexis","title":"Checklist des bonnes pratiques de cybers\u00e9curit\u00e9","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xZL4B401ps\"><a href=\"https:\/\/vaultinum.com\/fr\/blog\/checklist-des-bonnes-pratiques-de-cybersecurite\">Checklist des bonnes pratiques de cybers\u00e9curit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/vaultinum.com\/fr\/blog\/checklist-des-bonnes-pratiques-de-cybersecurite\/embed#?secret=xZL4B401ps\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Checklist des bonnes pratiques de cybers\u00e9curit\u00e9\u00a0\u00bb &#8212; Vaultinum\" data-secret=\"xZL4B401ps\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/vaultinum.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/06\/Blog-image-38.webp","thumbnail_width":1200,"thumbnail_height":600,"description":"Une checklist des bonnes pratiques de cybers\u00e9curit\u00e9, \u00e9labor\u00e9e par notre \u00e9quipe d'experts. Pour vous aider \u00e0 identifier les \u00e9tapes \u00e0 mettre en place pour renforcer la s\u00e9curit\u00e9 de votre syst\u00e8me informatique et adopter durablement les bonnes pratiques en mati\u00e8re de cybers\u00e9curit\u00e9 dans votre organisation."}