{"id":1382,"date":"2022-08-30T10:52:03","date_gmt":"2022-08-30T08:52:03","guid":{"rendered":"https:\/\/oaklandgrp.com\/?p=1382"},"modified":"2024-04-22T11:25:25","modified_gmt":"2024-04-22T09:25:25","slug":"cyberattaques-lenseignement-superieur-dans-le-viseur","status":"publish","type":"post","link":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/","title":{"rendered":"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur"},"content":{"rendered":"\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<p><em>Eva le Floch \u2013 OAKland Group<\/em> et J<em>acques Izart &#8211; Assurwest<\/em><\/p>\n<\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong>Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s.<\/strong> <strong>Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\" style=\"font-size:16px\"><strong>Une journ\u00e9e pas comme les autres\u2026<\/strong><\/p>\n\n\n\n<p>Jeudi 24 d\u00e9cembre 2020, pendant que la majorit\u00e9 des fran\u00e7ais s\u2019appr\u00eate \u00e0 r\u00e9veillonner, alors que tout est pr\u00eat pour assurer les partiels des \u00e9tudiants les semaines suivantes, un responsable d\u2019une grande \u00e9cole commerce se connecte au portail de l\u2019\u00e9tablissement pour une derni\u00e8re v\u00e9rification. Petit probl\u00e8me technique\u2026 Impossible de se connecter\u2026 Pas d\u2019inqui\u00e9tude, il contacte son DSI en plein pr\u00e9paratifs des f\u00eates de fin d\u2019ann\u00e9e. Ce dernier, jetant un dernier regard \u00e0 la cuisson de sa dinde, tente parall\u00e8lement de r\u00e9soudre le probl\u00e8me, et l\u00e0 c\u2019est la panique&nbsp;: l\u2019\u00e9cole est victime d\u2019une cyberattaque&nbsp;! Les serveurs sont bloqu\u00e9s, inutilisables. Plus de donn\u00e9es \u00e9tudiantes, plus de planning, plus de supports de formation, etc.<\/p>\n\n\n\n<p>Que faire&nbsp;? Comment r\u00e9tablir les serveurs&nbsp;? Comment acc\u00e9der aux donn\u00e9es&nbsp;? Quels moyens humains d\u00e9ployer, alors que la quasi-totalit\u00e9 de l\u2019\u00e9quipe informatique est en cong\u00e9s&nbsp;? Avons-nous un process interne \u00e0 appliquer dans ce type de situation&nbsp;? Doit-on communiquer aupr\u00e8s de nos \u00e9tudiants, de nos intervenants, de nos collaborateurs, qui communique&nbsp;et comment ?<\/p>\n\n\n\n<p>Voil\u00e0 tant de questions qui viennent \u00e0 l\u2019esprit mais qu\u2019il est finalement trop tard de se poser, car il est imp\u00e9ratif de pouvoir r\u00e9agir rapidement.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\" style=\"font-size:16px\"><strong>Un cas isol\u00e9&nbsp;?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>En novembre 2021, un groupe d\u2019\u00e9tablissements d\u2019enseignement sup\u00e9rieur a fait l\u2019objet d\u2019une cyberattaque avec ransomware (demande de ran\u00e7on), le groupe a d\u00fb couper l\u2019acc\u00e8s internet de tous ses sites, le temps de g\u00e9rer l\u2019incident. Certains sites web sont rest\u00e9s indisponibles pendant plusieurs jours g\u00e9n\u00e9rant m\u00e9contentements et demandes de remboursement des frais de scolarit\u00e9.<\/p>\n\n\n\n<p>En f\u00e9vrier 2022, une \u00e9cole d\u2019ing\u00e9nieur a \u00e9galement subi une cyberattaque de grande ampleur, affectant les activit\u00e9s informatiques de l\u2019\u00e9tablissement pendant plusieurs heures.<\/p>\n\n\n\n<p>Une plateforme d\u2019enseignement \u00e0 distance a \u00e9galement subi une cyberattaque d\u2019une dur\u00e9e de 3 jours rendant impossible l\u2019acc\u00e8s aux cours en ligne pour des millions d\u2019\u00e9l\u00e8ves.<\/p>\n\n\n\n<p>Dans les exemples cit\u00e9s ci-dessus, on retient essentiellement les interruptions de l\u2019activit\u00e9 plus ou moins longue engendr\u00e9es par les cyberattaques. Mais il est important d\u2019avoir en-t\u00eate qu\u2019une cyberattaque peut co\u00fbter tr\u00e8s cher \u00e0 l\u2019\u00e9tablissement. Outre les co\u00fbts directs n\u00e9cessaire au nettoyage et au r\u00e9tablissement des syst\u00e8mes informatiques, il faut ajouter tous les co\u00fbts indirects, tels que&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Les frais de notifications et amendes impos\u00e9es par la CNIL&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Les frais de reconstitution des donn\u00e9es (quand il est possible de les r\u00e9cup\u00e9rer&nbsp;!)<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Les pertes d\u2019exploitation&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Les frais juridiques de poursuites&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Les frais de communication&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>La perte de valeur de la marque&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>La perte de la propri\u00e9t\u00e9 intellectuelle (recherche acad\u00e9mique)&nbsp;;<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Le PONEMON Institute estime que le co\u00fbt moyen d\u2019un sinistre cyber en France est de 150\u20ac &nbsp;par dossier compromis (co\u00fbts directs + indirects).<\/strong><\/p>\n\n\n\n<p><strong>Pour un \u00e9tablissement de 3000 \u00e9tudiants, on vous laisse faire le calcul&nbsp;?<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-background is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\" style=\"background-color:#e1e9f3\">\n<blockquote class=\"wp-block-quote is-style-default has-black-color has-text-color is-layout-flow wp-block-quote-is-layout-flow\" style=\"font-style:normal;font-weight:400\"><p><strong>Le contexte <\/strong><\/p><p>Les \u00e9tablissements d\u2019enseignement sup\u00e9rieur repr\u00e9sentent des cibles tr\u00e8s int\u00e9ressantes. Ils disposent en effet, de nombreuses donn\u00e9es personnelles, comme les adresses, les num\u00e9ros de t\u00e9l\u00e9phone, les r\u00e9sultats scolaires, ou encore les informations financi\u00e8res des \u00e9tudiants, ou de leurs r\u00e9pondants financiers. Leurs serveurs sont \u00e9galement largement convoit\u00e9s pour la partie ing\u00e9nierie p\u00e9dagogique ou la recherche acad\u00e9mique de haut niveau.<\/p><p>A cet \u00e9tat de fait, est venu s\u2019ajouter la crise sanitaire de la Covid-19 qui a donn\u00e9 lieu \u00e0 une transformation forc\u00e9e et acc\u00e9l\u00e9r\u00e9e des modes d\u2019enseignement, passant ainsi la formation en pr\u00e9sentiel en mod\u00e8le, parfois 100% distanciel, parfois hybride, impliquant in\u00e9vitablement une vuln\u00e9rabilit\u00e9 accrue des syst\u00e8mes informatiques.<\/p><p>Malgr\u00e9 la menace r\u00e9elle qui p\u00e8se sur les \u00e9tablissements d\u2019enseignement sup\u00e9rieur, tr\u00e8s peu d\u2019entre eux semblent prendre la mesure du risque encouru et des impacts qu\u2019une cyberattaque pourrait avoir sur leur organisation.<\/p><\/blockquote>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\" style=\"font-size:16px\"><strong>Comment limiter les risques&nbsp;?<\/strong><\/p>\n\n\n\n<p>S\u2019il n\u2019existe pas de solution miracle permettant d\u2019\u00e9radiquer tout risque de cyberattaque, il est pourtant tr\u00e8s important de s\u2019y pr\u00e9parer afin d\u2019en minimiser les impacts et les co\u00fbts.<\/p>\n\n\n\n<p>Voici donc quelques pr\u00e9conisations&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Pr\u00e9voir des actions de sensibilisation et de formation des salari\u00e9s aux cyberattaques&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>R\u00e9aliser un audit du niveau de s\u00e9curit\u00e9 du syst\u00e8me d\u2019information (comprenant les tests de sauvegarde)&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>D\u00e9finir un plan strat\u00e9gique IT robuste&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>D\u00e9finir des proc\u00e9dures internes claires pour g\u00e9rer ce type d\u2019incident (PCA\/PRA)&nbsp;;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Mettre en place une cellule de gestion de crise, afin de savoir pr\u00e9cis\u00e9ment en cas d\u2019incident qui contacter et ainsi gagner un temps pr\u00e9cieux ;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Souscrire une cyber assurance<\/li><\/ul>\n\n\n\n<p>Et, pour vous rassurer, notre DSI des premi\u00e8res lignes a pu profiter de sa dinde car son \u00e9tablissement \u00e9tait particuli\u00e8rement bien pr\u00e9par\u00e9 \u00e0 r\u00e9agir \u00e0 une cyberattaque. Pour aller plus loin&nbsp;: <a href=\"https:\/\/oaklandgrp.com\/cyberassurance\/\">www.oaklandgrp.com\/cyberassurance\/<\/a><\/p>\n\n\n\n<p>En partenariat avec :<\/p>\n\n\n\n<figure class=\"wp-block-image size-medium is-resized\"><a href=\"https:\/\/assurwest.fr\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Logo-Assurwest-300x59.gif\" alt=\"\" class=\"wp-image-1401\" width=\"145\" height=\"29\"\/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><em>Courtier en assurances d\u2019entreprises, sp\u00e9cialiste de la protection des personnes, des biens et des responsabilit\u00e9s, Assurwest propose une offre s\u00e9curisante et des solutions sur mesure pour vous accompagner durablement. Assurwest r\u00e9alise pour vous les appels d\u2019offres aupr\u00e8s des diff\u00e9rents organismes d\u2019assurances.<\/em><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong><em>Cyber attacks: Higher education in the firing line<\/em><\/strong><\/p>\n\n\n\n<p><em>Eva le Floch &#8211; OAKland Group<\/em> and <em>Jacques Izart &#8211; Assurwest<\/em><\/p>\n\n\n\n<p><strong><em>In the last few months, hackers have kept up their attacks on public and private higher education establishments.This business sector is not chosen at random. The large volumes of personal data that are stored, plus the many user accounts and physical sites, make it a prime target for hackers.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>A day unlike any other\u2026<\/em><\/strong><\/p>\n\n\n\n<p><em>Thursday, 24 December 2020. As most people in France are getting ready to celebrate Christmas Eve, and with the preparations already made for the students&rsquo; midterm exams over the following weeks, a manager at a large business school goes to log on to the school&rsquo;s portal for one final check. Only there\u2019s a small technical problem. He&rsquo;s unable to connect. Still, no cause for alarm. He contacts his IT director, who\u2019s right in the middle of preparing for the holiday season. The IT director tries to solve the problem, while checking on his turkey in the oven one last time. And then\u2026 panic stations! The school is under a cyber attack!\u00a0 The servers are inaccessible. Unusable.\u00a0 No more student data, no more planning, no more training materials, etc.<\/em><\/p>\n\n\n\n<p><em>What do we do? How do we get the servers back up? How do we access the data? What human resources do we need to deploy, at a time when practically the whole IT team is on leave? Do we have an internal process that we can apply in this type of situation? Do we need to communicate with our students, our maintenance people or our members of staff? Who handles communication, and how?<\/em><\/p>\n\n\n\n<p><em>These are all questions which come to mind. But it\u2019s too late to be asking them now, since we need to be able to react fast.<\/em><\/p>\n\n\n\n<p><strong><em>An isolated case?<\/em><\/strong><\/p>\n\n\n\n<p><em>In November 2021, a group of higher education establishments was the target of a cyber attack involving ransomware (i.e. a ransom demand). The group had to shut down Internet access to all its sites while the incident was being dealt with. Some websites were unavailable for several days, causing dissatisfaction and resulting in requests for reimbursement of tuition fees.<\/em><\/p>\n\n\n\n<p><em>In February 2022, an engineering school was also subjected to a major cyber attack, affecting the school&rsquo;s IT operations for a period of several hours.<\/em><\/p>\n\n\n\n<p><em>A distance learning platform was also the target of a three-day cyber attack which prevented millions of students from accessing its online courses.<\/em><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><em>What strikes us in those examples is that the cyber attacks caused business interruptions of varying durations. But it is important to bear in mind that a cyber attack can be very costly for the establishment. As well as the direct costs of cleaning up and recovering the IT systems, there are also indirect costs, such as:<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><em>costs of notifications and fines imposed by the CNIL;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>data reconstruction costs (when the data can be recovered!)<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>operating losses;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>costs of legal action;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>communication costs;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>loss of value for the brand;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>loss of intellectual property (academic research);<\/em><\/li><\/ul>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong><em>PONEMON Institute estimates the average cost (comprising both direct and indirect costs) of a cyber incident in France at \u20ac150 per compromised file.<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong><em>Shall we leave you to work out the cost for an establishment with 3,000 students ?<\/em><\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-default has-black-color has-text-color has-background is-layout-flow wp-block-quote-is-layout-flow\" style=\"background-color:#e1e9f3;font-style:normal;font-weight:400\"><p><em><strong>The context <\/strong><\/em><\/p><p><em>Higher education establishments make very appealing targets. They hold a lot of personal data, such as addresses, phone numbers, academic results, or financial information concerning students or fee payers. Their servers are also much in demand for their pedagogical engineering or high-level academic research content.<\/em><\/p><p><em>Additionally, the COVID-19 health crisis has led to a forced and accelerated transformation in teaching methods, moving away from classroom training towards a hybrid or even a 100% remote model. This inevitably results in increased vulnerability of IT systems.<\/em><\/p><p><em>Despite the real threat to higher education establishments, very few seem to appreciate the full extent of the risk involved and the impact that a cyber attack could have on their organisation.<\/em><\/p><\/blockquote>\n\n\n\n<p><strong><em>What can be done to limit the risks?<\/em><\/strong><\/p>\n\n\n\n<p><em>Although there is no miracle solution that eradicates the risk of cyber attacks altogether, it is very important to prepare for them, in order to keep their impact and the resulting costs to a minimum.<\/em><\/p>\n\n\n\n<p><em>Here are some recommendations:<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Arranging staff awareness and training sessions on the subject of cyber attacks;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Performing an audit of the IT system&rsquo;s security level (including backup tests);<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Defining a robust IT strategic plan;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Defining clear internal procedures for managing this type of incident (BCP\/DRP<a id=\"_ednref1\" href=\"#_edn1\">[i]<\/a>);<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Forming a crisis management unit, so that you know exactly who to contact in the event of an incident, thus saving precious time;<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Taking out a cyber insurance policy<\/em><\/li><\/ul>\n\n\n\n<p><em>To return to the story of our front-line IT director, we\u2019d like to reassure you that his establishment was particularly well prepared to respond to a cyber attack, and he managed to enjoy his turkey after all.<\/em><\/p>\n\n\n\n<p><em>For more information, please visit: <a href=\"https:\/\/oaklandgrp.com\/cyberassurance\/\">www.oaklandgrp.com\/cyberassurance\/<\/a><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><a id=\"_edn1\" href=\"#_ednref1\">[i]<\/a> Business continuity plan, Disaster recovery plan (N.d.T)<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1399,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[56],"tags":[],"class_list":["post-1382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur - Oakland Group<\/title>\n<meta name=\"description\" content=\"Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur - Oakland Group\" \/>\n<meta property=\"og:description\" content=\"Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/\" \/>\n<meta property=\"og:site_name\" content=\"Oakland Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-30T08:52:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T09:25:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Oakland-Cyber-asssurance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2164\" \/>\n\t<meta property=\"og:image:height\" content=\"1420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/\"},\"author\":{\"name\":\"Amine\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#\\\/schema\\\/person\\\/b5133de68a0f5f19e2847d728f2d6d67\"},\"headline\":\"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur\",\"datePublished\":\"2022-08-30T08:52:03+00:00\",\"dateModified\":\"2024-04-22T09:25:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/\"},\"wordCount\":1849,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/oaklandgrp.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Oakland-Cyber-asssurance.jpg\",\"articleSection\":[\"Non classifi\u00e9(e)\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/\",\"url\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/\",\"name\":\"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur - Oakland Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/oaklandgrp.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Oakland-Cyber-asssurance.jpg\",\"datePublished\":\"2022-08-30T08:52:03+00:00\",\"dateModified\":\"2024-04-22T09:25:25+00:00\",\"description\":\"Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#primaryimage\",\"url\":\"https:\\\/\\\/oaklandgrp.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Oakland-Cyber-asssurance.jpg\",\"contentUrl\":\"https:\\\/\\\/oaklandgrp.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Oakland-Cyber-asssurance.jpg\",\"width\":2164,\"height\":1420},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/2022\\\/08\\\/30\\\/cyberattaques-lenseignement-superieur-dans-le-viseur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#website\",\"url\":\"https:\\\/\\\/oaklandgrp.com\\\/\",\"name\":\"Oakland Group\",\"description\":\"Asset Your Business Data\",\"publisher\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/oaklandgrp.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#organization\",\"name\":\"Oakland Group\",\"url\":\"https:\\\/\\\/oaklandgrp.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Oakland Group\"},\"image\":{\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/oaklandgrp.com\\\/#\\\/schema\\\/person\\\/b5133de68a0f5f19e2847d728f2d6d67\",\"name\":\"Amine\",\"url\":\"https:\\\/\\\/oaklandgrp.com\\\/fr\\\/author\\\/anna-mika\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur - Oakland Group","description":"Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur - Oakland Group","og_description":"Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.","og_url":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/","og_site_name":"Oakland Group","article_published_time":"2022-08-30T08:52:03+00:00","article_modified_time":"2024-04-22T09:25:25+00:00","og_image":[{"width":2164,"height":1420,"url":"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Oakland-Cyber-asssurance.jpg","type":"image\/jpeg"}],"author":"Amine","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Amine","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#article","isPartOf":{"@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/"},"author":{"name":"Amine","@id":"https:\/\/oaklandgrp.com\/#\/schema\/person\/b5133de68a0f5f19e2847d728f2d6d67"},"headline":"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur","datePublished":"2022-08-30T08:52:03+00:00","dateModified":"2024-04-22T09:25:25+00:00","mainEntityOfPage":{"@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/"},"wordCount":1849,"commentCount":0,"publisher":{"@id":"https:\/\/oaklandgrp.com\/#organization"},"image":{"@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#primaryimage"},"thumbnailUrl":"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Oakland-Cyber-asssurance.jpg","articleSection":["Non classifi\u00e9(e)"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/","url":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/","name":"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur - Oakland Group","isPartOf":{"@id":"https:\/\/oaklandgrp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#primaryimage"},"image":{"@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#primaryimage"},"thumbnailUrl":"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Oakland-Cyber-asssurance.jpg","datePublished":"2022-08-30T08:52:03+00:00","dateModified":"2024-04-22T09:25:25+00:00","description":"Ces derniers mois, les hackers n\u2019ont cess\u00e9 d\u2019attaquer des \u00e9tablissements d\u2019enseignement sup\u00e9rieur publics ou priv\u00e9s. Ce secteur d\u2019activit\u00e9 n\u2019est pas choisi au hasard, la multitude de donn\u00e9es personnelles stock\u00e9es, de comptes utilisateurs cr\u00e9\u00e9s, ou encore de sites physiques, font de lui, une cible de choix pour les pirates informatiques.","breadcrumb":{"@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#primaryimage","url":"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Oakland-Cyber-asssurance.jpg","contentUrl":"https:\/\/oaklandgrp.com\/wp-content\/uploads\/2022\/08\/Oakland-Cyber-asssurance.jpg","width":2164,"height":1420},{"@type":"BreadcrumbList","@id":"https:\/\/oaklandgrp.com\/fr\/2022\/08\/30\/cyberattaques-lenseignement-superieur-dans-le-viseur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oaklandgrp.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cyberattaques : l\u2019enseignement sup\u00e9rieur dans le viseur"}]},{"@type":"WebSite","@id":"https:\/\/oaklandgrp.com\/#website","url":"https:\/\/oaklandgrp.com\/","name":"Oakland Group","description":"Asset Your Business Data","publisher":{"@id":"https:\/\/oaklandgrp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oaklandgrp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/oaklandgrp.com\/#organization","name":"Oakland Group","url":"https:\/\/oaklandgrp.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/oaklandgrp.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Oakland Group"},"image":{"@id":"https:\/\/oaklandgrp.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oaklandgrp.com\/#\/schema\/person\/b5133de68a0f5f19e2847d728f2d6d67","name":"Amine","url":"https:\/\/oaklandgrp.com\/fr\/author\/anna-mika\/"}]}},"_links":{"self":[{"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/posts\/1382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/comments?post=1382"}],"version-history":[{"count":1,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/posts\/1382\/revisions"}],"predecessor-version":[{"id":2158,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/posts\/1382\/revisions\/2158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/media\/1399"}],"wp:attachment":[{"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/media?parent=1382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/categories?post=1382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oaklandgrp.com\/fr\/wp-json\/wp\/v2\/tags?post=1382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}