{"id":138661,"date":"2024-01-24T14:25:49","date_gmt":"2024-01-24T13:25:49","guid":{"rendered":"http:\/\/e3mag.com\/?p=138661"},"modified":"2024-01-24T14:25:50","modified_gmt":"2024-01-24T13:25:50","slug":"protection-contre-le-piratage","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/schutz-vor-hackerangriffen\/","title":{"rendered":"Protection contre les attaques de pirates"},"content":{"rendered":"<p>Les entreprises sans gestion professionnelle des donn\u00e9es ne disposent pas d'une protection efficace contre les crises et sont expos\u00e9es \u00e0 un risque accru de piratage. Pr\u00e8s de 70 pour cent des entreprises l'ont reconnu et augmenteront sensiblement leurs investissements dans la mise en place et le d\u00e9veloppement de la gestion des donn\u00e9es au cours des cinq prochaines ann\u00e9es. Mais jusqu'\u00e0 pr\u00e9sent, \u00e0 peine 20 pour cent ont enti\u00e8rement mis en \u0153uvre la gestion des donn\u00e9es, selon une nouvelle \u00e9tude de BearingPoint. Le cabinet de conseil en management et en technologie BearingPoint a interrog\u00e9 plus de 200 sp\u00e9cialistes et cadres des secteurs de l'industrie automobile, des fournisseurs et de la construction m\u00e9canique sur le th\u00e8me de la gestion des donn\u00e9es.<\/p>\n\n\n\n<p>Pour plus de 70 % des personnes interrog\u00e9es, la gestion des donn\u00e9es est en outre une condition pr\u00e9alable essentielle \u00e0 la cybers\u00e9curit\u00e9 et au renforcement de la r\u00e9silience de leur entreprise. Cependant, seules 20 % environ des entreprises interrog\u00e9es ont mis en place une gestion des donn\u00e9es compl\u00e8te dans toutes les dimensions.<\/p>\n\n\n\n<p>Dans l'ensemble, l'\u00e9tude conclut que les entreprises ont bien compris les avantages de la gestion des donn\u00e9es : 69 pour cent de toutes les entreprises interrog\u00e9es et plus de 70 pour cent des constructeurs automobiles et des fournisseurs veulent augmenter sensiblement leurs investissements dans la gestion des donn\u00e9es au cours des cinq prochaines ann\u00e9es.<\/p>\n\n\n\n<p>Parall\u00e8lement, selon les experts de BearingPoint, le manque de ressources et le manque de savoir-faire au sein de l'entreprise se sont notamment r\u00e9v\u00e9l\u00e9s \u00eatre les principaux obstacles \u00e0 la mise en \u0153uvre de la gestion des donn\u00e9es.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bearingpoint.com\/de-de\/\" target=\"_blank\" rel=\"noreferrer noopener\">bearingpoint.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>La gestion num\u00e9rique des donn\u00e9es est indispensable, mais seules 20 % des entreprises l'ont d\u00e9j\u00e0 mise en place. Toutes les autres entreprises risquent d'\u00eatre victimes d'un piratage.<\/p>","protected":false},"author":2368,"featured_media":138679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2],"tags":[26082],"coauthors":[39720],"class_list":["post-138661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","tag-cybersicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Digitales Datenmanagement ist unverzichtbar, aber nur 20 Prozent der Unternehmen haben es schon implementiert. Alle anderen Unternehmen sind in Gefahr, Opfer eines Hackerangriffs zu werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/fr\/author\/e3_magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/138661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=138661"}],"version-history":[{"count":2,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/138661\/revisions"}],"predecessor-version":[{"id":138699,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/138661\/revisions\/138699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/138679"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=138661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=138661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=138661"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=138661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}