{"id":15885,"date":"2024-08-26T17:25:11","date_gmt":"2024-08-26T14:25:11","guid":{"rendered":"https:\/\/masterbase.com\/es\/es\/es\/?p=15885"},"modified":"2024-09-13T13:35:56","modified_gmt":"2024-09-13T10:35:56","slug":"demasquer-lingenierie-sociale-cas-reels-et-strategies-de-defense","status":"publish","type":"post","link":"https:\/\/masterbase.com\/fr\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/","title":{"rendered":"D\u00e9masquer l'ing\u00e9nierie sociale : cas r\u00e9els et strat\u00e9gies de d\u00e9fense"},"content":{"rendered":"<h1>Alors que beaucoup s'inqui\u00e8tent des virus, des logiciels malveillants et des pirates informatiques, on oublie souvent que la plus grande vuln\u00e9rabilit\u00e9 se trouve en nous-m\u00eames : les \u00eatres humains.<\/h1>\n<p>L'ing\u00e9nierie sociale est bas\u00e9e sur la manipulation psychologique pour vous amener \u00e0 r\u00e9v\u00e9ler des informations confidentielles ou \u00e0 prendre des mesures qui compromettent la s\u00e9curit\u00e9 de votre entreprise.<\/p>\n<h2><strong>Qu'est-ce que l'ing\u00e9nierie sociale et comment la reconna\u00eetre ?<\/strong><\/h2>\n<p>L'ing\u00e9nierie sociale n'est pas nouvelle, mais elle a \u00e9volu\u00e9 avec la technologie.<\/p>\n<p>Imaginez un pirate informatique qui n'a pas besoin de casser des codes ou de pirater des syst\u00e8mes. Au lieu de cela, il manipule les employ\u00e9s d'une entreprise pour acc\u00e9der \u00e0 des informations sensibles.<\/p>\n<p>Cette approche exploite la confiance, la curiosit\u00e9 ou m\u00eame la peur.<\/p>\n<p>Vous pouvez reconna\u00eetre une tentative d'ing\u00e9nierie sociale lorsque quelqu'un vous demande des informations sensibles ou vous invite \u00e0 cliquer sur un lien suspect sous de faux pr\u00e9textes.<\/p>\n<p>Les courriels de phishing, les appels t\u00e9l\u00e9phoniques frauduleux et les messages sur les m\u00e9dias sociaux sont des m\u00e9thodes courantes.<\/p>\n<p>Pour se prot\u00e9ger et prot\u00e9ger son entreprise, il est essentiel d'\u00eatre toujours vigilant, de toujours v\u00e9rifier les demandes d'information et de ne jamais partager des donn\u00e9es sensibles sans \u00eatre totalement s\u00fbr de l'authenticit\u00e9 de l'auteur de la demande.<\/p>\n<h2><strong>Cas de vuln\u00e9rabilit\u00e9 dans les entreprises<\/strong><\/h2>\n<ol>\n<li><strong>Phishing ciblant les employ\u00e9s<\/strong>Le cas d'un pirate informatique : Une grande entreprise a \u00e9t\u00e9 attaqu\u00e9e lorsqu'un pirate a envoy\u00e9 un courriel \u00e0 plusieurs employ\u00e9s en se faisant passer pour le directeur des technologies de l'information. L'e-mail demandait aux employ\u00e9s de changer leurs mots de passe sur un faux site, ce qui a permis au pirate d'acc\u00e9der aux comptes de l'entreprise.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>Attaque par hame\u00e7onnage<\/strong>Dans une autre entreprise, un pirate informatique s'est fait passer pour un fournisseur r\u00e9gulier de l'entreprise et a demand\u00e9 un changement de compte bancaire pour les paiements. L'entreprise a transf\u00e9r\u00e9 une importante somme d'argent sur le compte du pirate avant de se rendre compte de la fraude.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong>L'ing\u00e9nierie sociale \u00e0 travers les r\u00e9seaux sociaux<\/strong>Un employ\u00e9 a partag\u00e9 des d\u00e9tails sur son travail et les syst\u00e8mes qu'il utilisait sur les m\u00e9dias sociaux. Un pirate informatique a utilis\u00e9 ces informations pour tromper le service d'assistance technique de l'entreprise et acc\u00e9der aux comptes de l'employ\u00e9.<\/li>\n<\/ol>\n<h2><strong>T\u00e9moignages d'entreprises ayant \u00e9vit\u00e9 des attaques d'ing\u00e9nierie sociale<\/strong><\/h2>\n<h3><strong>1. une tentative d'hame\u00e7onnage stopp\u00e9e gr\u00e2ce \u00e0 la sensibilisation du personnel<\/strong><\/h3>\n<p><strong>Ce que les pirates ont essay\u00e9 de faire :<\/strong> Un groupe de cybercriminels a tent\u00e9 d'attaquer une soci\u00e9t\u00e9 de services financiers en envoyant des courriels de phishing \u00e0 plusieurs employ\u00e9s. Ces courriels semblaient provenir du directeur financier de la soci\u00e9t\u00e9 et demandaient aux employ\u00e9s d'entrer leurs informations d'identification sur un site web qui imitait la page de connexion de la soci\u00e9t\u00e9. L'objectif \u00e9tait d'acc\u00e9der aux comptes des employ\u00e9s et de compromettre les syst\u00e8mes internes.<\/p>\n<p><strong>Comment ils l'ont \u00e9vit\u00e9 :<\/strong> Gr\u00e2ce \u00e0 un programme de formation continue \u00e0 la cybers\u00e9curit\u00e9, l'un des employ\u00e9s a reconnu le courriel comme suspect. Au lieu de cliquer sur le lien, il a inform\u00e9 l'\u00e9quipe de s\u00e9curit\u00e9 de l'entreprise. Cette \u00e9quipe a pu analyser le courriel et confirmer qu'il s'agissait d'une tentative d'hame\u00e7onnage. Elle a ensuite alert\u00e9 l'ensemble de l'organisation et renforc\u00e9 les mesures de s\u00e9curit\u00e9, emp\u00eachant ainsi l'attaque de r\u00e9ussir.<\/p>\n<h3><strong>2) L'usurpation d'identit\u00e9 est \u00e9vit\u00e9e gr\u00e2ce \u00e0 une v\u00e9rification rigoureuse<\/strong><\/h3>\n<p><strong>Ce que les pirates ont essay\u00e9 de faire :<\/strong> Dans un autre cas, un pirate s'est fait passer pour un fournisseur habituel d'une entreprise manufacturi\u00e8re et a envoy\u00e9 un courrier \u00e9lectronique au service des comptes fournisseurs pour demander un changement du compte bancaire sur lequel les paiements \u00e9taient effectu\u00e9s. Le plan du pirate consistait \u00e0 d\u00e9tourner une importante somme d'argent vers un compte qu'il contr\u00f4lait.<\/p>\n<p><strong>Comment ils l'ont \u00e9vit\u00e9 :<\/strong> La politique de l'entreprise exigeait que toute demande de modification des informations de paiement soit v\u00e9rifi\u00e9e par un appel t\u00e9l\u00e9phonique direct au fournisseur. Apr\u00e8s avoir tent\u00e9 de v\u00e9rifier la demande, le service de la comptabilit\u00e9 fournisseurs a contact\u00e9 le v\u00e9ritable fournisseur, qui a ni\u00e9 avoir demand\u00e9 le changement. L'alerte a \u00e9t\u00e9 donn\u00e9e et la tentative d'usurpation d'identit\u00e9 a \u00e9t\u00e9 d\u00e9jou\u00e9e avant que l'argent ne soit transf\u00e9r\u00e9.<\/p>\n<h3><strong>3. L'ing\u00e9nierie sociale via les r\u00e9seaux sociaux perturb\u00e9e par une surveillance proactive<\/strong><\/h3>\n<p><strong>Ce que les pirates ont essay\u00e9 de faire :<\/strong> Lors d'une tentative d'infiltration, des pirates ont identifi\u00e9 un employ\u00e9 d'une entreprise technologique par le biais de ses r\u00e9seaux sociaux. Ils ont ensuite utilis\u00e9 les informations publi\u00e9es par l'employ\u00e9 pour cr\u00e9er un faux profil et se faire passer pour lui. Le plan consistait \u00e0 contacter le support technique de l'entreprise et \u00e0 demander une r\u00e9initialisation du mot de passe, en invoquant des probl\u00e8mes d'acc\u00e8s.<\/p>\n<p><strong>Comment ils l'ont \u00e9vit\u00e9 :<\/strong> L'entreprise avait mis en place un syst\u00e8me proactif de surveillance des m\u00e9dias sociaux, con\u00e7u pour d\u00e9tecter les risques de s\u00e9curit\u00e9 potentiels li\u00e9s \u00e0 l'ing\u00e9nierie sociale. D\u00e8s qu'elle a remarqu\u00e9 la cr\u00e9ation du faux profil, l'\u00e9quipe de s\u00e9curit\u00e9 a pris des mesures imm\u00e9diates pour prot\u00e9ger les comptes des employ\u00e9s et a inform\u00e9 le personnel du support technique de la tentative de canular. En cons\u00e9quence, le pirate n'a pu acc\u00e9der \u00e0 aucun compte et la s\u00e9curit\u00e9 de l'entreprise est rest\u00e9e intacte.<\/p>\n<p>Ces cas montrent comment la pr\u00e9paration, la formation et des politiques claires peuvent faire toute la diff\u00e9rence pour emp\u00eacher une attaque d'ing\u00e9nierie sociale r\u00e9ussie. L'essentiel est de rester vigilant et de toujours mettre en place un protocole de s\u00e9curit\u00e9 solide.<\/p>\n<h3><strong>R\u00e9sum\u00e9<\/strong><\/h3>\n<p>L'ing\u00e9nierie sociale est un d\u00e9fi complexe car elle ne repose pas sur la technologie, mais sur la manipulation humaine. Les entreprises doivent apprendre \u00e0 leurs employ\u00e9s \u00e0 reconna\u00eetre les signes d'une attaque potentielle et \u00e9tablir des proc\u00e9dures claires pour traiter les demandes d'information. Une combinaison de sensibilisation, de formation et de protocoles de s\u00e9curit\u00e9 peut \u00eatre la cl\u00e9 de la protection contre ces menaces.<\/p>\n<p><a href=\"https:\/\/masterbase.com\/fr\/es\/es\/es\/academie\/cours-disponibles\/decouvrir-la-formation-certifiante-en-automatisation\/\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"9097\" data-permalink=\"https:\/\/masterbase.com\/fr\/hacia-un-futuro-saludable-la-impactante-evolucion-de-los-procesos-hospitalarios-mediante-la-automatizacion\/masterbase\/image-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?fit=980%2C451&amp;ssl=1\" data-orig-size=\"980,451\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Curso Automatizaci\u00f3n\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?fit=800%2C368&amp;ssl=1\" class=\"aligncenter wp-image-9097\" src=\"https:\/\/i0.wp.com\/masterbase.com\/es\/es\/es\/wp-content\/uploads\/2024\/01\/image-1-300x138.png?resize=517%2C238&#038;ssl=1\" alt=\"Cours d&#039;automatisation\" width=\"517\" height=\"238\" srcset=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?resize=300%2C138&amp;ssl=1 300w, https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?resize=768%2C353&amp;ssl=1 768w, https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?resize=18%2C8&amp;ssl=1 18w, https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?w=980&amp;ssl=1 980w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>L'ing\u00e9nierie sociale est l'une des menaces les plus sous-estim\u00e9es en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>","protected":false},"author":239642484,"featured_media":16003,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[1391],"tags":[],"class_list":["post-15885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae<\/title>\n<meta name=\"description\" content=\"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/masterbase.com\/fr\/demasquer-lingenierie-sociale-cas-reels-et-strategies-de-defense\/base-principale\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae\" \/>\n<meta property=\"og:description\" content=\"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/masterbase.com\/fr\/demasquer-lingenierie-sociale-cas-reels-et-strategies-de-defense\/base-principale\/\" \/>\n<meta property=\"og:site_name\" content=\"MasterBase\u00ae\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-26T14:25:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T10:35:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alejandro Dur\u00e1n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Dur\u00e1n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/\"},\"author\":{\"name\":\"Alejandro Dur\u00e1n\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#\\\/schema\\\/person\\\/3d21ff79b63b95ca967e019b4c633701\"},\"headline\":\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa\",\"datePublished\":\"2024-08-26T14:25:11+00:00\",\"dateModified\":\"2024-09-13T10:35:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/\"},\"wordCount\":978,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/\",\"url\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/\",\"name\":\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"datePublished\":\"2024-08-26T14:25:11+00:00\",\"dateModified\":\"2024-09-13T10:35:56+00:00\",\"description\":\"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"width\":2000,\"height\":2000,\"caption\":\"Ingenier\u00eda Social\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\\\/masterbase\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/masterbase.com\\\/cs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#website\",\"url\":\"https:\\\/\\\/masterbase.com\\\/da\\\/\",\"name\":\"MasterBase\u00ae\",\"description\":\"Automatas that work for you\",\"publisher\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/masterbase.com\\\/da\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#organization\",\"name\":\"MasterBase\u00ae\",\"url\":\"https:\\\/\\\/masterbase.com\\\/da\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1\",\"width\":1476,\"height\":972,\"caption\":\"MasterBase\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/da\\\/#\\\/schema\\\/person\\\/3d21ff79b63b95ca967e019b4c633701\",\"name\":\"Alejandro Dur\u00e1n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g\",\"caption\":\"Alejandro Dur\u00e1n\"},\"description\":\"Chief Marketing Ofiicer\",\"url\":\"https:\\\/\\\/masterbase.com\\\/fr\\\/author\\\/aledurmc1970\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9masquer l'ing\u00e9nierie sociale : cas concrets et strat\u00e9gies de d\u00e9fense - MasterBase\u00ae","description":"Alors que beaucoup s'inqui\u00e8tent des virus, des logiciels malveillants et des pirates informatiques, on oublie souvent que la plus grande vuln\u00e9rabilit\u00e9 se trouve en nous-m\u00eames : les \u00eatres humains.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/masterbase.com\/fr\/demasquer-lingenierie-sociale-cas-reels-et-strategies-de-defense\/base-principale\/","og_locale":"fr_FR","og_type":"article","og_title":"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae","og_description":"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.","og_url":"https:\/\/masterbase.com\/fr\/demasquer-lingenierie-sociale-cas-reels-et-strategies-de-defense\/base-principale\/","og_site_name":"MasterBase\u00ae","article_published_time":"2024-08-26T14:25:11+00:00","article_modified_time":"2024-09-13T10:35:56+00:00","og_image":[{"width":2000,"height":2000,"url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","type":"image\/png"}],"author":"Alejandro Dur\u00e1n","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Alejandro Dur\u00e1n","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#article","isPartOf":{"@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/"},"author":{"name":"Alejandro Dur\u00e1n","@id":"https:\/\/masterbase.com\/da\/#\/schema\/person\/3d21ff79b63b95ca967e019b4c633701"},"headline":"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa","datePublished":"2024-08-26T14:25:11+00:00","dateModified":"2024-09-13T10:35:56+00:00","mainEntityOfPage":{"@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/"},"wordCount":978,"commentCount":0,"publisher":{"@id":"https:\/\/masterbase.com\/da\/#organization"},"image":{"@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","articleSection":["Ciberseguridad"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/","url":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/","name":"D\u00e9masquer l'ing\u00e9nierie sociale : cas concrets et strat\u00e9gies de d\u00e9fense - MasterBase\u00ae","isPartOf":{"@id":"https:\/\/masterbase.com\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#primaryimage"},"image":{"@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","datePublished":"2024-08-26T14:25:11+00:00","dateModified":"2024-09-13T10:35:56+00:00","description":"Alors que beaucoup s'inqui\u00e8tent des virus, des logiciels malveillants et des pirates informatiques, on oublie souvent que la plus grande vuln\u00e9rabilit\u00e9 se trouve en nous-m\u00eames : les \u00eatres humains.","breadcrumb":{"@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#primaryimage","url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","contentUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","width":2000,"height":2000,"caption":"Ingenier\u00eda Social"},{"@type":"BreadcrumbList","@id":"https:\/\/masterbase.com\/es\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/masterbase.com\/cs\/"},{"@type":"ListItem","position":2,"name":"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa"}]},{"@type":"WebSite","@id":"https:\/\/masterbase.com\/da\/#website","url":"https:\/\/masterbase.com\/da\/","name":"MasterBase","description":"Des automates qui travaillent pour vous","publisher":{"@id":"https:\/\/masterbase.com\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/masterbase.com\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/masterbase.com\/da\/#organization","name":"MasterBase","url":"https:\/\/masterbase.com\/da\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/masterbase.com\/da\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2023\/09\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1","contentUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2023\/09\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1","width":1476,"height":972,"caption":"MasterBase\u00ae"},"image":{"@id":"https:\/\/masterbase.com\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/masterbase.com\/da\/#\/schema\/person\/3d21ff79b63b95ca967e019b4c633701","name":"Alejandro Dur\u00e1n","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g","caption":"Alejandro Dur\u00e1n"},"description":"Directeur du marketing","url":"https:\/\/masterbase.com\/fr\/author\/aledurmc1970\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pf6Ilf-48d","_links":{"self":[{"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/posts\/15885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/users\/239642484"}],"replies":[{"embeddable":true,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/comments?post=15885"}],"version-history":[{"count":2,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/posts\/15885\/revisions"}],"predecessor-version":[{"id":15888,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/posts\/15885\/revisions\/15888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/media\/16003"}],"wp:attachment":[{"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/media?parent=15885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/categories?post=15885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/masterbase.com\/fr\/wp-json\/wp\/v2\/tags?post=15885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}