{"id":10733,"date":"2018-05-04T12:28:48","date_gmt":"2018-05-04T11:28:48","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=10733\/"},"modified":"2020-01-03T10:12:51","modified_gmt":"2020-01-03T09:12:51","slug":"protecting-company-identity","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/","title":{"rendered":"Protecting Company Identity: Digitalisation\u2019s New Challenge"},"content":{"rendered":"<p><em>Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it. In addition to damaging the company\u2019s image, cyber-attacks can carry heavy financial consequences, as we experienced this Summer during the WannaCry and NotPetya attacks that have generated a total of billions of euros in losses for companies.<\/em><\/p>\n<p><em>To avoid these costly consequences, companies are clearly concentrating on securing their critical IT infrastructures, but cyber-attacks are not only targeted at network vulnerabilities, datacentres and workstations. Users, whether internal or external to the organisation, are a prime target. Attackers usurp the identity of the targeted organisation to trick users in order to carry out their misdeeds.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>The Company\u2019s Digital Presence: A New Risk Factor<\/h2>\n<p>In recent years, companies\u2019 <strong>digital transformation<\/strong> has been characterised mainly by <strong>exponential development of external communication via digital channels<\/strong>; means of communication have multiplied and become the privileged vectors of exchange and interaction, revolutionising the customer relationship and exchanges with partners. To remain closer to clients and partners companies promote the use of digital communication via:<\/p>\n<ul>\n<li>Emails<\/li>\n<li>Instant Messaging<\/li>\n<li>Institutional websites and Web applications<\/li>\n<li>Mobile applications<\/li>\n<li>Social networks<\/li>\n<\/ul>\n<p>These media are the company\u2019s showcase allowing it to portray itself, to expose and to radiate its brand image, via its own graphic impact, elements of language and messages. They personify the company and therefore refer directly to its perceived value. In addition, digitalisation has made it possible to largely substitute the physical relationship by digital services, accessible at any time and anywhere in the world, via which the company gives access to its community as well as its products and services, boosting ever faster, simpler and customised interactions with the users.<\/p>\n<p>This heightened digital presence has enabled companies to develop their communication and the accessibility of their services, using digital channels to represent the company directly and fly its brand image flag. But there is a flip side to the coin: <strong>this digital ubiquity increases the possibility for attackers to usurp the company identity for malicious purposes.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Damaged Brand Image: the cyber-attack\u2019s collateral damage<\/h2>\n<p>During a cyber-attack using <strong>spoofing of the company&#8217;s identity<\/strong> as a vector, the attackers\u2019 intentions can be varied:<\/p>\n<p><strong>Some attacks aim directly to undermine the company\u2019s credibility<\/strong>, to make the company appear incompetent, or to show the malicious group\u2019s superiority imposing its antagonistic ideology:<\/p>\n<p>Over the last few years, there have been cases of website defacing where the content of the pages has been changed to transmit false information and mock businesses in order to harm their image. In 2015, Lenovo paid the price when \u201chacktivist\u201d group Lizard Squad attacked its website, redirecting visitors to photos of the attack\u2019s protagonists. Attackers can also publish false information on a social network after stealing the Community Manager\u2019s credentials. One defining moment of 2017 in France was the hijacking of the Ministry of Culture\u2019s Twitter account by a joker distilling various abusive tweets. For the companies affected by these attacks, the <strong>financial consequences are as expected<\/strong>: following these events and announcements, the <strong>repercussions on sales and stock market value<\/strong> are always accompanied by <strong>a heavy impact on brand image<\/strong>.<\/p>\n<p>In other cases, <strong>the attackers divert the company\u2019s identity, this time seeking to steal money<\/strong>. In this case, the attackers pass themselves off as the company in order to commit frauds aimed directly at tricking the users:<\/p>\n<ul>\n<li>The \u201c<strong>President scams<\/strong>\u201d are steadily increasing and allow attackers to divert large sums of money by misleading employees in finance to believe they have to execute an urgent transfer for a company director. In France, the total damage caused by this fraud is estimated at more than 400 million euros per annum.<\/li>\n<li>Corporate employees are also the target of <strong>phishing campaigns<\/strong>, which can trigger a viral load contained in an attachment or a link from a seemingly familiar email. The goal may be to deploy a Cryptolocker to demand a ransom, or to gain a gateway into the organisation&#8217;s information system.<\/li>\n<li>Companies are also affected indirectly when phishing campaigns use <em>their<\/em> domain name to send fake emails to customers asking them to update their bank information or other personal data that may have value.<\/li>\n<li>The great novelty for collecting client data is via <strong>fake mobile apps<\/strong> imitating a legitimate application by their logo and interface but acting as a spyware when installed on the user\u2019s smartphone. For example, a false WhatsApp application integrating malware was downloaded more than 1 million times on the Google Play store in October 2017.<\/li>\n<\/ul>\n<p>In a digital world where customer confidence, increasingly sensitive to cyber subjects, is easily lost, <strong>protecting brand image has become a major issue for businesses<\/strong>, alongside protecting their IT infrastructure and data. But what are the best practices to put into place to limit these risks of usurpation?<\/p>\n<p>&nbsp;<\/p>\n<h2>Dedicated Solutions and Organised Monitoring for better protection<\/h2>\n<p>A company\u2019s brand image protection of necessarily passes through the protection of digital communication channels. Depending on the type of channel, different action can be taken:<\/p>\n<ul>\n<li><strong>Names of websites, email addresses and social network accounts similar to those of the company need to be monitored<\/strong>. This practice is recommended by the ANSSI (French Information Security Agency) to combat the brand usurpation, as well as the monitoring of the &#8220;Dark App Store&#8221; offering users pirated and potentially malicious versions of enterprise mobile applications.<\/li>\n<li><strong>Carrying out regular audits and vulnerability scans on institutional sites and mobile applications<\/strong> allows the identification of vulnerabilities that could provide entry points during a cyber-attack. The necessary corrective measures can then be implemented to secure these media especially against defacing.<\/li>\n<li><strong>Implementing multi-factor authentication for email and social network administrator accounts<\/strong> reduces the risk of spoofing by simply stealing credentials. This greatly limits the risk of malicious content being published or shared, or theft of sensitive data accessible via mailboxes, as was the case in 2017 for the firm Deloitte. In this theft, more than 5 million e\u2011mails containing sensitive exchanges with their customers were stolen, following the theft of one of the administrator\u2019s credentials<\/li>\n<li><strong>Activating protection such as SPF, DKIM or DMARC protocols can prevent the spoofing of company email addresses<\/strong>. In fact, these protocols protect the company\u2019s domain names by declaring the IP addresses legitimate for sending emails and implementing signature mechanisms for emails to certify them. These protocols ensure that the company&#8217;s domain name cannot be used from an undeclared server.<\/li>\n<\/ul>\n<p>Since digitalisation has favoured exposure of enterprise identities, cyber-attackers and hacktivists therefore take advantage to attack the companies and their ecosystem by posing as the company. In all these attacks and frauds, the attacker uses more or less complex means to usurp the company\u2019s identity to attack and to weaken it. A damaged company brand image, for its customers but also for the general public, <strong>can cause financial losses of millions of euros, added to which are the huge losses that an attack crippling the company\u2019s information system generates<\/strong>.<\/p>\n<p><strong>The subject of protecting companies\u2019 digital identity<\/strong>, in whatever form, <strong>needs addressed<\/strong> so that they can protect themselves against the frequent and costly usurpation of which they are victims.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it. In addition to&#8230;<\/p>\n","protected":false},"author":1268,"featured_media":9904,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[2969,2871,2817,3349,2827,3350,2971],"coauthors":[2764,2891],"class_list":["post-10733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-company","tag-cyberattack","tag-data-protection","tag-e-mail-en","tag-identity","tag-image-en","tag-information-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Company Identity: Digitalisation\u2019s New Challenge - RiskInsight<\/title>\n<meta name=\"description\" content=\"Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Company Identity: Digitalisation\u2019s New Challenge - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-04T11:28:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-03T09:12:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aurore Yvard\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aurore Yvard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\"},\"author\":{\"name\":\"B3noitL4diEu\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/086e35ac89f755ed960c3bc4a2f37ea9\"},\"headline\":\"Protecting Company Identity: Digitalisation\u2019s New Challenge\",\"datePublished\":\"2018-05-04T11:28:48+00:00\",\"dateModified\":\"2020-01-03T09:12:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\"},\"wordCount\":1218,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg\",\"keywords\":[\"company\",\"cyberattack\",\"data protection\",\"e-mail\",\"identity\",\"image\",\"information protection\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\",\"name\":\"Protecting Company Identity: Digitalisation\u2019s New Challenge - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg\",\"datePublished\":\"2018-05-04T11:28:48+00:00\",\"dateModified\":\"2020-01-03T09:12:51+00:00\",\"description\":\"Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg\",\"width\":3873,\"height\":3873,\"caption\":\"flat design for team work concept over yellow\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Company Identity: Digitalisation\u2019s New Challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/086e35ac89f755ed960c3bc4a2f37ea9\",\"name\":\"B3noitL4diEu\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/b3noitl4dieu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Company Identity: Digitalisation\u2019s New Challenge - RiskInsight","description":"Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Company Identity: Digitalisation\u2019s New Challenge - RiskInsight","og_description":"Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/","og_site_name":"RiskInsight","article_published_time":"2018-05-04T11:28:48+00:00","article_modified_time":"2020-01-03T09:12:51+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg","type":"image\/jpeg"}],"author":"Aurore Yvard","twitter_misc":{"Written by":"Aurore Yvard","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/"},"author":{"name":"B3noitL4diEu","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/086e35ac89f755ed960c3bc4a2f37ea9"},"headline":"Protecting Company Identity: Digitalisation\u2019s New Challenge","datePublished":"2018-05-04T11:28:48+00:00","dateModified":"2020-01-03T09:12:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/"},"wordCount":1218,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg","keywords":["company","cyberattack","data protection","e-mail","identity","image","information protection"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/","name":"Protecting Company Identity: Digitalisation\u2019s New Challenge - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg","datePublished":"2018-05-04T11:28:48+00:00","dateModified":"2020-01-03T09:12:51+00:00","description":"Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company\u2019s image and therefore on the trust conferred on it.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw.jpg","width":3873,"height":3873,"caption":"flat design for team work concept over yellow"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/protecting-company-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Protecting Company Identity: Digitalisation\u2019s New Challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/086e35ac89f755ed960c3bc4a2f37ea9","name":"B3noitL4diEu","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/b3noitl4dieu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1268"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=10733"}],"version-history":[{"count":1,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10733\/revisions"}],"predecessor-version":[{"id":10735,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10733\/revisions\/10735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9904"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=10733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=10733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=10733"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=10733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}