{"id":3730,"date":"2013-05-07T18:50:51","date_gmt":"2013-05-07T17:50:51","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3730"},"modified":"2019-12-31T11:39:40","modified_gmt":"2019-12-31T10:39:40","slug":"proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/","title":{"rendered":"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026"},"content":{"rendered":"<p>Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab\u00a0officiel\u00a0\u00bb dans de nombreux contextes. Nous pouvons par exemple citer<a href=\"http:\/\/www.bbc.co.uk\/news\/world-middle-east-21241753\" target=\"_blank\" rel=\"noopener noreferrer\"> l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook<\/a> ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre <a href=\"http:\/\/www.telegraph.co.uk\/technology\/twitter\/8065696\/Twitter-experiment-by-police-a-success.html\" target=\"_blank\" rel=\"noopener noreferrer\">les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement<\/a>. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame<a href=\"http:\/\/www.usatoday.com\/story\/money\/business\/2013\/04\/02\/social-media-facebook-investors\/2047307\/\" target=\"_blank\" rel=\"noopener noreferrer\"> autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux<\/a>\u00a0.<\/p>\n<h2>\u00a0<strong>De trop nombreux cas de d\u00e9tournement des r\u00e9seaux sociaux<\/strong><\/h2>\n<p>Mais ces r\u00e9seaux n\u2019ont pas \u00e9t\u00e9 con\u00e7us initialement comme des outils de communication officielle, ma\u00eetris\u00e9e et contr\u00f4l\u00e9e. Il est tr\u00e8s simple de publier et \u00adde commenter. L\u2019information est \u00e9galement tr\u00e8s rapidement relay\u00e9e. C\u2019est ce qui fait leur force &#8211; mais aussi leur faiblesse quand\u00a0 leur usage est d\u00e9tourn\u00e9\u2026<\/p>\n<p>C\u2019est ce qui est arriv\u00e9 r\u00e9cemment au compte Twitter de l\u2019Associated Press. Agence de presse r\u00e9put\u00e9e aux Etats-Unis, l\u2019AP a subi une attaque <a href=\"http:\/\/www.theverge.com\/2013\/4\/23\/4257392\/ap-twitter-hacked-claims-explosions-white-house-president-injured\" target=\"_blank\" rel=\"noopener noreferrer\">qui a entra\u00een\u00e9 la publication sur son fil d\u2019un message annon\u00e7ant un attentat \u00e0 la Maison Blanche<\/a> ! Cette fausse information a \u00e9t\u00e9 rapidement d\u00e9mentie mais les effets en ont \u00e9t\u00e9 r\u00e9els et s\u00e9rieux\u00a0: <a href=\"http:\/\/www.guardian.co.uk\/business\/2013\/apr\/23\/ap-tweet-hack-wall-street-freefall\" target=\"_blank\" rel=\"noopener noreferrer\">Wall Street a d\u00e9croch\u00e9 pendant plusieurs heures<\/a> !<\/p>\n<p>Ce cas n\u2019est qu\u2019un exemple parmi d\u2019autres, nombreux. Nous pouvons <a href=\"http:\/\/mashable.com\/2013\/02\/18\/burger-king-twitter-account-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">citer r\u00e9cemment Burger King<\/a>\u00a0 ou encore <a href=\"http:\/\/www.cnbc.com\/id\/100471409\" target=\"_blank\" rel=\"noopener noreferrer\">Jeep<\/a>\u00a0 dont les comptes ont \u00e9t\u00e9 d\u00e9tourn\u00e9s \u2013 certes \u00a0de mani\u00e8re humoristique &#8211; pour faire de la publicit\u00e9 \u00e0 leur concurrent\u00a0!<\/p>\n<p>&nbsp;<\/p>\n<h2>Une s\u00e9curit\u00e9 d\u00e9su\u00e8te bas\u00e9e sur de simples mots de passe<\/h2>\n<p>Mais pourquoi assiste-t-on \u00e0 cette multiplication de cas\u00a0? En partie car il est tr\u00e8s simple de prendre le contr\u00f4le d\u2019un compte sur un r\u00e9seau social. Bien souvent celui-ci n\u2019est prot\u00e9g\u00e9 que par un mot de passe, \u00e0 la complexit\u00e9 toute relative et qui, surtout, est souvent largement partag\u00e9 au sein des soci\u00e9t\u00e9s \u00a0!<\/p>\n<p>En effet, les comptes Twitter et Facebook sont associ\u00e9s \u00e0 un seul email et \u00e0 un seul mot de passe. Ces informations doivent donc \u00eatre partag\u00e9es si plusieurs personnes sont amen\u00e9es \u00e0 faire vivre le compte d\u2019une entreprise. Sans parler des d\u00e9parts ou des mobilit\u00e9s qui laissent des situations souvent d\u00e9sastreuses, il est facile aujourd\u2019hui de pi\u00e9ger le poste de travail d\u2019un employ\u00e9 d\u2019un service communication pour s\u2019emparer de ces identifiants\u00a0!<\/p>\n<h2>\u00a0<strong>Quelles bonnes pratiques suivre\u00a0?<\/strong><\/h2>\n<p>Afin de r\u00e9duire ces risques, il est possible pour l\u2019entreprise d\u2019utiliser des plates-formes professionnelles d\u2019interaction avec les r\u00e9seaux sociaux. Ces outils, par exemple SproutSocial ou Hootsuit, permette de masquer le compte Twitter principal et de cr\u00e9er des comptes pour chacune des personnes pouvant intervenir sur les r\u00e9seaux sociaux. Ces outils ajoutent \u00e9galement une notion de tra\u00e7abilit\u00e9 et de suivi des actions qui peuvent \u00eatre int\u00e9ressantes. Assortis d\u2019une charte de \u00ab\u00a0community manager\u00a0\u00bb, ils r\u00e9duisent les risques d\u2019usages malencontreux ou malicieux.\u00a0 Mais cela ne r\u00e9duit pas le risque li\u00e9 au vol des identifiants.<\/p>\n<p>Pour r\u00e9pondre \u00e0 cette menace, les fournisseurs de r\u00e9seaux sociaux r\u00e9fl\u00e9chissent actuellement \u00e0 augmenter le niveau de s\u00e9curit\u00e9 de leur service, en particulier en requ\u00e9rant une authentification \u00e0 deux facteurs \u00e0 la place du mot de passe. Il s\u2019agira alors pour utiliser le service d\u2019utiliser un mot de passe unique, par exemple d\u00e9livr\u00e9 par SMS ou via une application d\u00e9di\u00e9e, en compl\u00e9ment du mot de passe habituel. Google et Dropbox ont d\u00e9j\u00e0 mis en\u00a0 place ce syst\u00e8me avec succ\u00e8s. Les entreprises devront donc faire \u00e9voluer leurs pratiques pour inclure ces nouveaux m\u00e9canismes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab\u00a0officiel\u00a0\u00bb dans de nombreux contextes&#8230;.<\/p>\n","protected":false},"author":15,"featured_media":3532,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,37],"tags":[1131,3303,1132,106],"coauthors":[837],"class_list":["post-3730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-digital-innovation","tag-communication","tag-cyberawareness","tag-mots-de-passe","tag-reseaux-sociaux"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026<\/title>\n<meta name=\"description\" content=\"Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab officiel \u00bb dans de nombreux contextes. Nous pouvons par exemple citer l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026\" \/>\n<meta property=\"og:description\" content=\"Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab officiel \u00bb dans de nombreux contextes. Nous pouvons par exemple citer l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-07T17:50:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:39:40+00:00\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026\",\"datePublished\":\"2013-05-07T17:50:51+00:00\",\"dateModified\":\"2019-12-31T10:39:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\"},\"wordCount\":701,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"communication\",\"cyberawareness\",\"mots de passe\",\"r\u00e9seaux sociaux\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Digital &amp; innovation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\",\"name\":\"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2013-05-07T17:50:51+00:00\",\"dateModified\":\"2019-12-31T10:39:40+00:00\",\"description\":\"Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab officiel \u00bb dans de nombreux contextes. Nous pouvons par exemple citer l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux .\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026","description":"Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab officiel \u00bb dans de nombreux contextes. Nous pouvons par exemple citer l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/","og_locale":"en_US","og_type":"article","og_title":"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026","og_description":"Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab officiel \u00bb dans de nombreux contextes. Nous pouvons par exemple citer l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux .","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/","og_site_name":"RiskInsight","article_published_time":"2013-05-07T17:50:51+00:00","article_modified_time":"2019-12-31T10:39:40+00:00","author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026","datePublished":"2013-05-07T17:50:51+00:00","dateModified":"2019-12-31T10:39:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/"},"wordCount":701,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage"},"thumbnailUrl":"","keywords":["communication","cyberawareness","mots de passe","r\u00e9seaux sociaux"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Digital &amp; innovation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/","name":"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage"},"thumbnailUrl":"","datePublished":"2013-05-07T17:50:51+00:00","dateModified":"2019-12-31T10:39:40+00:00","description":"Les r\u00e9seaux sociaux ont envahi notre vie quotidienne. Initialement utilis\u00e9s \u00e0 de simples fins de divertissement, d\u2019information aux consommateurs ou clients, leur r\u00f4le a \u00e9volu\u00e9 et ils sont aujourd\u2019hui utilis\u00e9s comme un moyen de communication \u00ab officiel \u00bb dans de nombreux contextes. Nous pouvons par exemple citer l\u2019arm\u00e9e \u00e9gyptienne qui publie r\u00e9guli\u00e8rement sur Facebook ou encore la police de Manchester qui a utilis\u00e9 ces m\u00e9dias pour mieux suivre les \u00e9meutes des ann\u00e9es pr\u00e9c\u00e9dentes et qui continue aujourd\u2019hui \u00e0 utiliser Twitter largement. La c\u00e9l\u00e8bre SEC, le gendarme am\u00e9ricain de la bourse, a m\u00eame autoris\u00e9 r\u00e9cemment les soci\u00e9t\u00e9s cot\u00e9es a effectuer des communications officielles par le biais des r\u00e9seaux sociaux .","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/proteger-son-image-sur-les-reseaux-sociaux-ou-lheresie-du-mot-de-passe-partage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Prot\u00e9ger son image sur les r\u00e9seaux sociaux ou l\u2019h\u00e9r\u00e9sie du mot de passe partag\u00e9\u2026"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3730"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3730\/revisions"}],"predecessor-version":[{"id":12454,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3730\/revisions\/12454"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3730"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}