{"id":144416,"date":"2024-08-23T07:00:00","date_gmt":"2024-08-23T05:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=144416"},"modified":"2024-08-12T11:26:22","modified_gmt":"2024-08-12T09:26:22","slug":"des-deficits-de-connaissances-aux-consequences-importantes","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/wissensdefizite-mit-weitreichenden-folgen\/","title":{"rendered":"Des d\u00e9ficits de connaissances aux cons\u00e9quences importantes"},"content":{"rendered":"<p>Une nouvelle enqu\u00eate publi\u00e9e par le fournisseur de cybers\u00e9curit\u00e9 Hornetsecurity r\u00e9v\u00e8le d'importantes lacunes dans la formation \u00e0 la s\u00e9curit\u00e9 informatique : 26% des entreprises ne proposent toujours pas de formation \u00e0 leurs utilisateurs finaux. Dans un paysage de la cybers\u00e9curit\u00e9 en \u00e9volution rapide, o\u00f9 les acteurs de la menace trouvent continuellement de nouveaux moyens d'infiltrer et de nuire aux entreprises, cela peut devenir un probl\u00e8me. <\/p>\n\n\n\n<p>Les employ\u00e9s devraient \u00eatre au c\u0153ur de la strat\u00e9gie de cybers\u00e9curit\u00e9 de chaque entreprise. Malheureusement, l'\u00e9tude a montr\u00e9 qu'il n'y a pas seulement des lacunes dans la formation des employ\u00e9s, mais aussi que les \u00e9ventuelles initiatives sont consid\u00e9r\u00e9es comme inefficaces. 39 % des personnes interrog\u00e9es ont d\u00e9clar\u00e9 que les formations ne traitaient pas suffisamment des cybermenaces actuelles ou bas\u00e9es sur l'IA. Dans un monde o\u00f9 l'IA acc\u00e9l\u00e8re et accro\u00eet l'ampleur et l'efficacit\u00e9 des attaques, cela peut devenir alarmant.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk.jpg\" alt=\"\" class=\"wp-image-144417\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-400x209.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-768x402.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-100x52.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-480x251.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-640x335.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-720x377.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-960x502.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-1168x611.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-18x9.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-600x314.jpg 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/hornetsecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">hornetsecurity.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Une nouvelle \u00e9tude de Hornetsecurity montre que 26% des entreprises n'utilisent pas de formation \u00e0 la s\u00e9curit\u00e9 informatique pour les utilisateurs finaux.<\/p>","protected":false},"author":2368,"featured_media":143197,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,43978],"tags":[],"coauthors":[39720],"class_list":["post-144416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-24-07-08","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Neue Studie von Hornetsecurity zeigt, dass 26 Prozent der Unternehmen keine IT-Sicherheitsschulungen f\u00fcr Endanwender nutzen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-24-07-08\/\" rel=\"category tag\">MAG 24-07 \/ 08<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/fr\/author\/e3_magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/144416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=144416"}],"version-history":[{"count":2,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/144416\/revisions"}],"predecessor-version":[{"id":144421,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/144416\/revisions\/144421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/143197"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=144416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=144416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=144416"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=144416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}