{"id":862,"date":"2024-09-18T15:09:16","date_gmt":"2024-09-18T13:09:16","guid":{"rendered":"https:\/\/ayrilys.com\/?p=862"},"modified":"2024-09-18T15:11:25","modified_gmt":"2024-09-18T13:11:25","slug":"les-applications-saas-ciblees-par-les-cyberattaques","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/","title":{"rendered":"Les applications SaaS cibl\u00e9es par les cyberattaques"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-plus-de-60-des-attaques-de-ransomware-reussies-proviennent-d-applications-saas\">Plus de 60 % des attaques de ransomware r\u00e9ussies proviennent d&rsquo;applications SaaS<\/h2>\n\n\n\n<p>&nbsp;lundi 26 ao\u00fbt 2024<\/p>\n\n\n\n<p><strong>Dans sa derni\u00e8re \u00e9tude, HYCU&nbsp;r\u00e9v\u00e8le un certain nombre de probl\u00e8mes pr\u00e9occupants li\u00e9s \u00e0 l&rsquo;augmentation de l&rsquo;utilisation des applications SaaS. Outre la mont\u00e9e en puissance des ransomwares, cette \u00e9tude met en \u00e9vidence le volume consid\u00e9rable d&rsquo;applications SaaS utilis\u00e9es dans les entreprises, la d\u00e9pendance \u00e0 l&rsquo;\u00e9gard des risques li\u00e9s aux tiers et le manque de sensibilisation au mod\u00e8le de responsabilit\u00e9 partag\u00e9e. En effet, les d\u00e9cideurs informatiques ne connaissent toujours pas le nombre exact d&rsquo;applications SaaS utilis\u00e9es dans leur entreprise. Autant de lacunes qui peuvent rapidement devenir des d\u00e9fis, voire des probl\u00e8mes. Explications.&nbsp;<\/strong><\/p>\n\n\n\n<p>Selon <a href=\"https:\/\/www.hycu.com\/events\/broadcast-state-of-saas-resilience\" target=\"_blank\" rel=\"noreferrer noopener\">cette \u00e9tude men\u00e9e par HYCU<\/a>, les chefs d&rsquo;entreprise sous-estiment souvent l&rsquo;\u00e9tendue de leur patrimoine de donn\u00e9es SaaS et ne savent pas combien d&rsquo;applications SaaS sont utilis\u00e9es dans leur entreprise. Plus emb\u00eatant encore,&nbsp;41 % des personnes interrog\u00e9es comptent sur le fournisseur de SaaS pour prot\u00e9ger et r\u00e9cup\u00e9rer leurs donn\u00e9es, alors que les fournisseurs de cloud, les fournisseurs de SaaS ou les \u00e9diteurs de logiciels ind\u00e9pendants placent g\u00e9n\u00e9ralement la responsabilit\u00e9 de la protection et de la r\u00e9cup\u00e9ration des donn\u00e9es sur le client, selon le \u00ab <a href=\"https:\/\/www.hycu.com\/blog\/unlocking-saas-data-security-with-shared-responsibility-in-the-cloud\" target=\"_blank\" rel=\"noreferrer noopener\">mod\u00e8le de responsabilit\u00e9 partag\u00e9e<\/a> \u00bb.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00ab L&rsquo;entreprise moyenne s&rsquo;appuie aujourd&rsquo;hui sur des centaines d&rsquo;applications SaaS pour diverses t\u00e2ches, y compris des workflows critiques pour l&rsquo;entreprise. Il est essentiel de comprendre \u00e0 quel point les donn\u00e9es SaaS sont vuln\u00e9rables aux cybermenaces croissantes \u00bb d\u00e9clare Subbiah Sundaram SVP, Product, HYCU, Inc. \u00ab Ce nouveau rapport de HYCU montre que les entreprises doivent am\u00e9liorer leur jeu dans le domaine de la protection des donn\u00e9es SaaS. \u00bb<\/p>\n<\/blockquote>\n\n\n\n<p>Il s&rsquo;av\u00e8re pourtant que les applications SaaS ont \u00e9t\u00e9 \u00e0 l&rsquo;origine de 61 % des attaques par ransomware signal\u00e9es par les personnes interrog\u00e9es dans le cadre de l&rsquo;enqu\u00eate. 71 % des personnes interrog\u00e9es pensent que le service informatique est responsable de la plus grande partie de l&rsquo;utilisation des SaaS, m\u00eame si ces technologies sont souvent achet\u00e9es et utilis\u00e9es par des d\u00e9partements ou des lignes d&rsquo;activit\u00e9.<\/p>\n\n\n\n<p>90 % des personnes interrog\u00e9es se disent par ailleurs incapables de r\u00e9cup\u00e9rer des donn\u00e9es SaaS chiffr\u00e9es en moins d&rsquo;une heure, ce qui risque d&rsquo;entra\u00eener une co\u00fbteuse interruption de l&rsquo;activit\u00e9. Et 43 % des personnes interrog\u00e9es d\u00e9clarent manquer de personnel poss\u00e9dant les comp\u00e9tences requises pour prot\u00e9ger les donn\u00e9es des applications SaaS. Les trois quarts des personnes interrog\u00e9es ont \u00e9galement avou\u00e9 que leurs activit\u00e9s seraient s\u00e9rieusement affect\u00e9es si leurs donn\u00e9es EntraID (anciennement Azure Active Directory), SSO et Identity Access Management (IAM) devenaient soudainement indisponibles \u00e0 la suite d&rsquo;une cyberattaque.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00ab En tant que leader dans ce domaine, HYCU est pr\u00eat \u00e0 aider les organisations \u00e0 combler les lacunes qui menacent leur r\u00e9silience, en fournissant des solutions de sauvegarde et de restauration d&rsquo;entreprise sp\u00e9cifiquement con\u00e7ues pour les environnements SaaS d&rsquo;aujourd&rsquo;hui,&nbsp;\u00bb conclut&nbsp;Subbiah Sundaram.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Plus de 60 % des attaques de ransomware r\u00e9ussies proviennent d&rsquo;applications SaaS &nbsp;lundi 26 ao\u00fbt 2024 Dans sa derni\u00e8re \u00e9tude, HYCU&nbsp;r\u00e9v\u00e8le un certain nombre de probl\u00e8mes pr\u00e9occupants li\u00e9s \u00e0 l&rsquo;augmentation de l&rsquo;utilisation des applications SaaS. Outre la mont\u00e9e en puissance des ransomwares, cette \u00e9tude met en \u00e9vidence le volume consid\u00e9rable d&rsquo;applications SaaS utilis\u00e9es dans les&#8230;<\/p>\n","protected":false},"author":1,"featured_media":844,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJpbWciOiJodHRwczpcL1wvYXlyaWx5cy5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjRcLzA5XC9QQy1MZW50LWNhdWNhc2lhbi1tYW4tZ2xhc3Nlcy11c2luZy1sYXB0b3AtY29tcHV0ZXJfNDg4MjIwLTQwMDk0LmpwZyIsInR4dCI6IkxlcyBhcHBsaWNhdGlvbnMgU2FhUyBjaWJsXHUwMGU5ZXMgcGFyIGxlcyBjeWJlcmF0dGFxdWVzIiwidGVtcGxhdGUiOiJoaWdod2F5IiwiYmxvZ19pZCI6MjM1MzM1MDIzfQ.7jSfISHTGHgiK7eEAMnGqPwaPYRManOiq7dNzRIwNfAMQ"},"version":2}},"categories":[20,22],"tags":[],"class_list":["post-862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accueil","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Augmentation de l&#039;utilisation des applications SaaS : Les enjeux de cybers\u00e9curit\u00e9 pour les PME - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez les probl\u00e8mes de cybers\u00e9curit\u00e9 auxquels sont confront\u00e9es les PME. Une \u00e9tude r\u00e9v\u00e8le les risques li\u00e9s aux applications SaaS et la sous-estimation de leur utilisation.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Les applications SaaS cibl\u00e9es par les cyberattaques\" \/>\r\n<meta property=\"og:description\" content=\"Les applications SaaS cibl\u00e9es par les cyberattaques Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-09-18T13:09:16+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-09-18T13:11:25+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"626\" \/>\r\n\t<meta property=\"og:image:height\" content=\"460\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Les applications SaaS cibl\u00e9es par les cyberattaques\",\"datePublished\":\"2024-09-18T13:09:16+00:00\",\"dateModified\":\"2024-09-18T13:11:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\"},\"wordCount\":545,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg\",\"articleSection\":[\"Accueil\",\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\",\"name\":\"Augmentation de l'utilisation des applications SaaS : Les enjeux de cybers\u00e9curit\u00e9 pour les PME - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg\",\"datePublished\":\"2024-09-18T13:09:16+00:00\",\"dateModified\":\"2024-09-18T13:11:25+00:00\",\"description\":\"D\u00e9couvrez les probl\u00e8mes de cybers\u00e9curit\u00e9 auxquels sont confront\u00e9es les PME. Une \u00e9tude r\u00e9v\u00e8le les risques li\u00e9s aux applications SaaS et la sous-estimation de leur utilisation.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg\",\"width\":626,\"height\":460,\"caption\":\"Cyberattaque\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les applications SaaS cibl\u00e9es par les cyberattaques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Augmentation de l'utilisation des applications SaaS : Les enjeux de cybers\u00e9curit\u00e9 pour les PME - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","description":"D\u00e9couvrez les probl\u00e8mes de cybers\u00e9curit\u00e9 auxquels sont confront\u00e9es les PME. Une \u00e9tude r\u00e9v\u00e8le les risques li\u00e9s aux applications SaaS et la sous-estimation de leur utilisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/","og_locale":"fr_FR","og_type":"article","og_title":"Les applications SaaS cibl\u00e9es par les cyberattaques","og_description":"Les applications SaaS cibl\u00e9es par les cyberattaques Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-09-18T13:09:16+00:00","article_modified_time":"2024-09-18T13:11:25+00:00","og_image":[{"width":626,"height":460,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Les applications SaaS cibl\u00e9es par les cyberattaques","datePublished":"2024-09-18T13:09:16+00:00","dateModified":"2024-09-18T13:11:25+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/"},"wordCount":545,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg","articleSection":["Accueil","S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/","url":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/","name":"Augmentation de l'utilisation des applications SaaS : Les enjeux de cybers\u00e9curit\u00e9 pour les PME - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg","datePublished":"2024-09-18T13:09:16+00:00","dateModified":"2024-09-18T13:11:25+00:00","description":"D\u00e9couvrez les probl\u00e8mes de cybers\u00e9curit\u00e9 auxquels sont confront\u00e9es les PME. Une \u00e9tude r\u00e9v\u00e8le les risques li\u00e9s aux applications SaaS et la sous-estimation de leur utilisation.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#primaryimage","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg","width":626,"height":460,"caption":"Cyberattaque"},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/les-applications-saas-ciblees-par-les-cyberattaques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Les applications SaaS cibl\u00e9es par les cyberattaques"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=862"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/862\/revisions"}],"predecessor-version":[{"id":863,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/862\/revisions\/863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media\/844"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}