{"id":894,"date":"2024-07-06T13:33:42","date_gmt":"2024-07-06T13:33:42","guid":{"rendered":"https:\/\/www.becybersafe.be\/?post_type=podcasts&#038;p=894"},"modified":"2024-08-23T10:34:01","modified_gmt":"2024-08-23T10:34:01","slug":"les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme","status":"publish","type":"podcasts","link":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/","title":{"rendered":"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME"},"content":{"rendered":"\n<p>&#8211;  avec Serge Houtain<\/p>\n\n\n\n<p>Dans cet \u00e9pisode, Serge Houtain, consultant ind\u00e9pendant et sp\u00e9cialiste de la cybercriminialit\u00e9 et de la s\u00e9curit\u00e9 en ligne, nous familiarise avec les termes tels que le phishing, le ransomware, la brute force attack, et bien d&#8217;autres encore.&nbsp;<\/p>\n\n\n\n<p>Et pour ne pas tomber dans ces pi\u00e8ges, il donne de nombreux conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.&nbsp;<\/p>\n\n\n\n<p>De quoi rendre votre activit\u00e9 plus r\u00e9siliente et moins vuln\u00e9rable du point de vue num\u00e9rique.&nbsp;<\/p>\n\n\n\n<div id=\"buzzsprout-player-15355443\"><\/div><script src=\"https:\/\/www.buzzsprout.com\/2379178\/15355443-les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme.js?container_id=buzzsprout-player-15355443&#038;player=small\" type=\"text\/javascript\" charset=\"utf-8\"><\/script>\n","protected":false},"excerpt":{"rendered":"<p>&#8211; avec Serge Houtain Dans cet \u00e9pisode, Serge Houtain, consultant ind\u00e9pendant et sp\u00e9cialiste de la cybercriminialit\u00e9 et de la s\u00e9curit\u00e9 &hellip; <a href=\"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/\">Continued<\/a><\/p>\n","protected":false},"author":6,"featured_media":895,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"podcast_tag":[],"class_list":["post-894","podcasts","type-podcasts","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME - BeCyberSafe<\/title>\n<meta name=\"description\" content=\"Dans ce podcast, nous parlons de phishing, ransomware, brute force attack, et bien d&#039;autres piratages en ligne et donnons des conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME - BeCyberSafe\" \/>\n<meta property=\"og:description\" content=\"Dans ce podcast, nous parlons de phishing, ransomware, brute force attack, et bien d&#039;autres piratages en ligne et donnons des conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/\" \/>\n<meta property=\"og:site_name\" content=\"BeCyberSafe\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-23T10:34:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/\",\n\t            \"name\": \"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME - BeCyberSafe\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#website\"\n\t            },\n\t            \"primaryImageOfPage\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#primaryimage\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#primaryimage\"\n\t            },\n\t            \"thumbnailUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg\",\n\t            \"datePublished\": \"2024-07-06T13:33:42+00:00\",\n\t            \"dateModified\": \"2024-08-23T10:34:01+00:00\",\n\t            \"description\": \"Dans ce podcast, nous parlons de phishing, ransomware, brute force attack, et bien d'autres piratages en ligne et donnons des conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"fr-FR\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"ImageObject\",\n\t            \"inLanguage\": \"fr-FR\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#primaryimage\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg\",\n\t            \"contentUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg\",\n\t            \"width\": 250,\n\t            \"height\": 250\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.becybersafe.be\/fr\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Podcasts\",\n\t                    \"item\": \"https:\/\/www.becybersafe.be\/fr\/podcasts\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#website\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/fr\/\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"description\": \"\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.becybersafe.be\/fr\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"fr-FR\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#organization\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/fr\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"fr-FR\",\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/\",\n\t                \"url\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"contentUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"width\": 1104,\n\t                \"height\": 463,\n\t                \"caption\": \"BeCyberSafe\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/\"\n\t            }\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME - BeCyberSafe","description":"Dans ce podcast, nous parlons de phishing, ransomware, brute force attack, et bien d'autres piratages en ligne et donnons des conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/","og_locale":"fr_FR","og_type":"article","og_title":"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME - BeCyberSafe","og_description":"Dans ce podcast, nous parlons de phishing, ransomware, brute force attack, et bien d'autres piratages en ligne et donnons des conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.","og_url":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/","og_site_name":"BeCyberSafe","article_modified_time":"2024-08-23T10:34:01+00:00","og_image":[{"width":250,"height":250,"url":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/","url":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/","name":"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME - BeCyberSafe","isPartOf":{"@id":"https:\/\/www.becybersafe.be\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#primaryimage"},"image":{"@id":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg","datePublished":"2024-07-06T13:33:42+00:00","dateModified":"2024-08-23T10:34:01+00:00","description":"Dans ce podcast, nous parlons de phishing, ransomware, brute force attack, et bien d'autres piratages en ligne et donnons des conseils et astuces pour prot\u00e9ger votre pr\u00e9sence en ligne avec des ressources limit\u00e9es.","breadcrumb":{"@id":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#primaryimage","url":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg","contentUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/07\/BeCyberSafe-Podcast-Serge-Houtain--e1720272795511.jpg","width":250,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.becybersafe.be\/fr\/podcasts\/les-bases-de-la-cybersecurite-pour-independants-webshops-tpe-pme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.becybersafe.be\/fr\/"},{"@type":"ListItem","position":2,"name":"Podcasts","item":"https:\/\/www.becybersafe.be\/fr\/podcasts\/"},{"@type":"ListItem","position":3,"name":"Les bases de la cybers\u00e9curit\u00e9 pour ind\u00e9pendants, webshops, TPE et PME"}]},{"@type":"WebSite","@id":"https:\/\/www.becybersafe.be\/fr\/#website","url":"https:\/\/www.becybersafe.be\/fr\/","name":"BeCyberSafe","description":"","publisher":{"@id":"https:\/\/www.becybersafe.be\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.becybersafe.be\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.becybersafe.be\/fr\/#organization","name":"BeCyberSafe","url":"https:\/\/www.becybersafe.be\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","contentUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","width":1104,"height":463,"caption":"BeCyberSafe"},"image":{"@id":"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/podcasts\/894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/podcasts"}],"about":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/types\/podcasts"}],"author":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":2,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/podcasts\/894\/revisions"}],"predecessor-version":[{"id":943,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/podcasts\/894\/revisions\/943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/media\/895"}],"wp:attachment":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/media?parent=894"}],"wp:term":[{"taxonomy":"podcast_tag","embeddable":true,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/podcast_tag?post=894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}