{"id":4854,"date":"2023-09-20T11:59:32","date_gmt":"2023-09-20T09:59:32","guid":{"rendered":"https:\/\/bluemind.purpl-web.com\/?p=4854"},"modified":"2023-09-20T12:02:17","modified_gmt":"2023-09-20T10:02:17","slug":"cyber-attacks-yes-you-are-a-target","status":"publish","type":"post","link":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/","title":{"rendered":"Cyber attacks: yes, you are a target (but don&#8217;t panic, there are solutions)"},"content":{"rendered":"\n<p>We must collectively realize that no one is immune to cyber criminals. The threat of cyber-attacks is very real, it never abates, even worse, it is steadily increasing in ingenuity and complexity.<\/p>\n\n\n\n<p>You&#8217;ll be affected, sooner or later, whatever the size of your organization, whatever your sector of activity. <strong>You are a target<\/strong>. The risks associated with cyber attacks are serious, ranging from <strong>financial losses <\/strong>and <strong>reputational damages to data theft and potential legal consequences<\/strong>.<\/p>\n\n\n\n<p>In this article, co-written with <a href=\"https:\/\/aucae.com\/fr\/\">Aucae<\/a>, our expert partner in cybersecurity training and preparation, we take a look at the current state of cyber-malware, and offer practical, immediately actionable answers to help you protect yourself and react in case of an attack.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>The cyber attacks threat today<\/strong><\/h2>\n\n\n\n<p>Cyber-attacks are an omnipresent and protean threat: they are constantly evolving, changing and becoming more complex, so much so that it&#8217;s impossible to know exactly what the one that will affect you (or has already affected you but hasn&#8217;t yet been discovered) will look like. Will it be a <a href=\"https:\/\/www.francetvinfo.fr\/faits-divers\/police\/arnaque-au-faux-president-des-escrocs-volent-plus-de-38-millions-d-euros-a-deux-entreprises-en-se-faisant-passer-pour-le-pdg_5662811.html\">president scam<\/a>, a <a href=\"https:\/\/www.capital.fr\/votre-argent\/gare-a-cette-arnaque-au-faux-tueur-a-gages-1474152\">hitman<\/a> scam, a fake email urging one of your colleagues to update a password or an e-mail?<\/p>\n\n\n\n<p>Here&#8217;s a classic example that strikes a lot in the professional world:<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"465\" src=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/linkedin-en-anglais-1024x465.png\" alt=\"Linkedin scam - BlueMind\" class=\"wp-image-4856\" srcset=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/linkedin-en-anglais-1024x465.png 1024w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/linkedin-en-anglais-300x136.png 300w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/linkedin-en-anglais-150x68.png 150w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/linkedin-en-anglais-768x349.png 768w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/linkedin-en-anglais.png 1096w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This email is spam! It impersonates the Linkedin network to make you think that your account is threatened by a change of email address that is not of your making. Worried, you&#8217;ll want to act quickly to protect your account by clicking on the link&#8230; Except that the link written in the message and the actual link you&#8217;ll be redirected to when you click on it are actually different. You&#8217;ll be taken to a page that mimics the LinkedIn interface and asks you to enter your password. You\u2019ll voluntarily enter your login details thinking you&#8217;re doing something to secure your account&#8230; but in reality, you will be giving your login details to hackers!<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-1024x683.jpg\" alt=\"\" class=\"wp-image-4862\" srcset=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-1024x683.jpg 1024w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-300x200.jpg 300w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-150x100.jpg 150w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-768x512.jpg 768w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-1536x1024.jpg 1536w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-2048x1365.jpg 2048w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/pexels-cottonbro-studio-5483248-1140x760.jpg 1140w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To understand the seriousness of the situation, we only need to look at the following statistics and figures:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li><strong><em>Phishing<\/em><\/strong>: phishing attacks &#8211; using fraudulent e-mails or messages to trick individuals into revealing sensitive information, as in the case above &#8211; remain a widespread threat. In 2020 alone, the Anti-Phishing Working Group (APWG) counted 1.4 million phishing sites worldwide.<\/li>\n\n\n\n<li><strong><em>Ransomware: <\/em><\/strong>they <a href=\"https:\/\/itsocial.fr\/enjeux-it\/enjeux-securite\/cybersecurite\/black-basta-et-big-head-des-ransomwares-qui-se-font-passer-pour-des-mises-a-jour-windows\/\">ingeniously<\/a> invite you to click on a malicious link or, via phishing, have been able to retrieve your credentials to secretly install a program on your information system. Cyber attackers can now remotely block your IS and demand a ransom to free it. The consequences can quickly become catastrophic (<a href=\"https:\/\/www.zdnet.fr\/actualites\/la-commune-de-sartrouville-prise-dans-la-toile-d-un-ransomware-39960944.htm\">24 hours of blocking for the city of Sartrouville already amounts to \u20ac200,000 in damage<\/a>, and no one is spared, from <a href=\"https:\/\/www.letelegramme.fr\/ille-et-vilaine\/rennes-35000\/le-chu-de-rennes-vise-par-une-cyberattaque-6377794.php\">hospitals<\/a> to <a href=\"https:\/\/www.01net.com\/actualites\/ransomware-hackers-8base-sement-chaos.html\">SMEs<\/a>, from <a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-thales-de-nouveau-inquiete-par-lockbit-88479.html\">major groups<\/a> to <a href=\"https:\/\/www.ladepeche.fr\/2019\/11\/19\/haute-garonne-la-mairie-daussonne-victime-dune-cyberattaque,8550874.php\">cities of all sizes<\/a>). The increase in ransomware attacks is alarming, with the number of incidents rising exponentially. <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/\">According to Cybersecurity Ventures<\/a>, ransomware is believed to have caused $20 billion worth of damage by 2020.<\/li>\n<\/ol>\n\n\n\n<p>These examples only scratch the surface of the diverse and sophisticated cyber threats facing organizations today.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>Preparing for cyber attacks: AUCAE&#8217;s training and preparation solution<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em><u>Training<\/u><\/em><\/strong><\/li>\n<\/ul>\n\n\n\n<p>As the frequency and complexity of cyberattacks increase, it has become essential for organizations to prioritize cybersecurity awareness and training, as well as being prepared to organize themselves in the event of an attack, in order to effectively mitigate risk and damage. <a href=\"https:\/\/aucae.com\/fr\/\">AUCAE<\/a>, a renowned cybersecurity training solution, offers a comprehensive approach to training and strengthening an organization&#8217;s cyber defense capabilities.<\/p>\n\n\n\n<p>To understand the urgency and effectiveness of these training solutions, let&#8217;s look at a <strong>real-life <\/strong>cyber attack <strong>scenario.<\/strong> Let&#8217;s imagine that an unsuspecting employee receives a carefully crafted phishing e-mail that appears to come from a trusted source. Unaware of the potential danger, he unknowingly clicks on a malicious link, giving the attackers access to the company&#8217;s internal network.<\/p>\n\n\n\n<p>AUCAE&#8217;s training modules enable employees to <strong>recognize <\/strong>and <strong>respond effectively to <\/strong>these threats. By simulating realistic cyber-attack scenarios, they equip individuals with the <strong>knowledge and skills needed <\/strong>to identify and report suspicious activity. Through training, employees learn how to <strong>spot phishing attempts, avoid downloading malicious attachments and follow best practices <\/strong>for maintaining a secure digital environment.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em><u>Preparation<\/u><\/em><\/strong><\/li>\n<\/ul>\n\n\n\n<p>In addition to training people, it is also essential to be organized so as to have the necessary tools and procedures in place in the event of a cyber crisis. It&#8217;s not when the house is on fire that you wonder where the fire extinguisher is!&nbsp; Aucae helps you to accelerate awareness at all internal levels, and to draw up and organize the necessary tools and procedures in response to a cyber crisis, all made available through the AUCAE Digital Crisis management tool.<\/p>\n\n\n\n<p>Aucae can also help you meet your cyber-insurance obligations, a key issue today.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>Responding to an attack: AUCAE and BlueMind Digital Crisis<\/strong><\/h2>\n\n\n\n<p>Despite the best training and defense mechanisms, the reality is that cyber attacks can still penetrate even the most fortified systems! With <strong>around 20% of attacks succeeding, <\/strong>organizations need to be ready to respond effectively in the event of an incident.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"287\" src=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-1024x287.png\" alt=\"\" class=\"wp-image-4849\" srcset=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-1024x287.png 1024w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-300x84.png 300w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-150x42.png 150w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-768x215.png 768w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-1536x431.png 1536w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-2048x574.png 2048w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/bandeau-2-entreprises-avec-fond-copie-1140x320.png 1140w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-luminous-vivid-orange-color has-text-color\"><strong><em>AUCAE Digital Crisis: crisis management organization<\/em><\/strong><\/h3>\n\n\n\n<p>Aucae&#8217;s Digital Crisis Response is a SaaS-based tool that enables you to get involved, take responsibility and react effectively: action and reaction in the same solution. It&#8217;s a bimodal solution &#8211; training mode and real-life situation &#8211; that increases your ability to react in the event of a cyber-attack.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-luminous-vivid-orange-color has-text-color\"><strong><em>BlueMind Digital Crisis: preserve your communication skills<\/em><\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.bluemind.net\/\"><\/a><a href=\"https:\/\/www.bluemind.net\/digital-crisis\/\"><\/a>BlueMind Digital Crisis offers&nbsp;an <strong>intuitive, sovereign email solution in the event of a cyberattack<\/strong>. Ready-to-use and available at any time, it is kept separate from your IT systems and maintained independently to prevent all contagion risks.<\/p>\n\n\n\n<p>It enables you to <strong>communicate<\/strong>, coordinate and share information for the duration of the crisis.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">&nbsp;<strong>BlueMind Digital Crisis highlights, in 6 key points<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Essential communications tools needed in a crisis<\/strong>:&nbsp;<a href=\"https:\/\/bluemind.purpl-web.com\/en\/webmail-or-thick-client-do-you-really-have-to-choose\/\" target=\"_blank\" rel=\"noreferrer noopener\">email<\/a>,&nbsp;<a href=\"https:\/\/bluemind.purpl-web.com\/en\/organising-a-meeting-with-the-bluemind\/\" target=\"_blank\" rel=\"noreferrer noopener\">calendar<\/a>, videoconferencing, mobile devices,<\/li>\n\n\n\n<li>A <strong>simple<\/strong>, <strong>intuitive<\/strong>,&nbsp;<a href=\"https:\/\/bluemind.purpl-web.com\/en\/how-does-bluemind-improves-its-solutions-users-experience\/\" target=\"_blank\" rel=\"noreferrer noopener\">user-friendly solution<\/a>,<\/li>\n\n\n\n<li>Can be <strong>enabled and controlled by functional areas<\/strong> without delay,<\/li>\n\n\n\n<li><strong>Separate from your IT systems<\/strong>, no risk of contagion,<\/li>\n\n\n\n<li><strong>Secure<\/strong>:&nbsp;<a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2014\/12\/secnumcloud-referentiel-exigences-v3.2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SecNumCloud<\/a>&nbsp;hosting, keeping you out of the Cloud Act\u2019s reach,<\/li>\n\n\n\n<li><strong>Sovereign<\/strong>: a made-in-Europe solution, hosted in France, developed in complete transparency.<\/li>\n<\/ul>\n\n\n\n<p>BlueMind Digital Crisis interfaces with AUCAE&#8217;s crisis management solution to provide a comprehensive crisis <strong>management <\/strong>and <strong>communication <\/strong>solution.<\/p>\n\n\n\n<p>Digital Crisis helps organizations contain and neutralize threats, mitigate potential damage and ensure a rapid return to normal.<\/p>\n\n\n\n<p>Whether conducting forensic investigations following an attack, <strong>recovering compromised data <\/strong>or implementing <strong>enhanced security measures<\/strong>, the BlueMind Digital Crisis &#8211; AUCAE joint solution offers a <strong>holistic approach <\/strong>to managing cyber attacks, ensuring <strong>business continuity <\/strong>and <strong>protecting valuable assets<\/strong>.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"208\" src=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/image2.png\" alt=\"BlueMind digital Crisis\" class=\"wp-image-4865\" srcset=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/image2.png 724w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/image2-300x86.png 300w, https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/image2-150x43.png 150w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/figure>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>In today&#8217;s cyber threat landscape, organizations need to remain <strong>vigilant and proactive <\/strong>in their efforts to defend against attacks. Together, AUCAE and BlueMind offer <strong>a powerful combination of training, preparedness and incident response, <\/strong>ensuring <strong>a secure, sovereign digital environment <\/strong>for businesses in the face of evolving cyber threats. Through this partnership, organizations can improve their cybersecurity posture <strong>and protect their assets, data and reputation<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The threat of cyber-attacks is very real and never abates. With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of an attack<\/p>\n","protected":false},"author":8,"featured_media":4844,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[179,11],"tags":[192,57],"class_list":["post-4854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solution-en","category-usages-en","tag-featured","tag-sovereignty"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber attacks: yes, you are a target - Bluemind<\/title>\n<meta name=\"description\" content=\"With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of a cybertattack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber attacks: yes, you are a target (but don&#039;t panic, there are solutions)\" \/>\n<meta property=\"og:description\" content=\"With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of a cybertattack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\" \/>\n<meta property=\"og:site_name\" content=\"Bluemind\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-20T09:59:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-20T10:02:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyberattaques\u00a0: oui, vous \u00eates concern\u00e9s (mais pas de panique, il y a des solutions)\" \/>\n<meta name=\"twitter:description\" content=\"Dans cet article co\u00e9crit avec Aucae, notre partenaire expert de la cybers\u00e9curit\u00e9, nous proposons des r\u00e9ponses concr\u00e8tes face aux cyberattaques.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cyber attacks: yes, you are a target (but don&#8217;t panic, there are solutions)\",\"datePublished\":\"2023-09-20T09:59:32+00:00\",\"dateModified\":\"2023-09-20T10:02:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\"},\"wordCount\":1191,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png\",\"keywords\":[\"Featured\",\"sovereignty\"],\"articleSection\":[\"BlueMind's Solution\",\"Practices\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\",\"url\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\",\"name\":\"Cyber attacks: yes, you are a target - Bluemind\",\"isPartOf\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png\",\"datePublished\":\"2023-09-20T09:59:32+00:00\",\"dateModified\":\"2023-09-20T10:02:17+00:00\",\"description\":\"With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of a cybertattack\",\"breadcrumb\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage\",\"url\":\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png\",\"contentUrl\":\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png\",\"width\":700,\"height\":394,\"caption\":\"Cyberr\u00e9silience\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bluemind.purpl-web.com\/en\/homepage\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber attacks: yes, you are a target (but don&rsquo;t panic, there are solutions)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#website\",\"url\":\"https:\/\/bluemind.purpl-web.com\/en\/\",\"name\":\"Bluemind\",\"description\":\"Collaborative messaging\",\"publisher\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bluemind.purpl-web.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#organization\",\"name\":\"BlueMind\",\"url\":\"https:\/\/bluemind.purpl-web.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2017\/06\/logobm_300.png\",\"contentUrl\":\"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2017\/06\/logobm_300.png\",\"width\":300,\"height\":100,\"caption\":\"BlueMind\"},\"image\":{\"@id\":\"https:\/\/bluemind.purpl-web.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber attacks: yes, you are a target - Bluemind","description":"With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of a cybertattack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/","og_locale":"en_US","og_type":"article","og_title":"Cyber attacks: yes, you are a target (but don't panic, there are solutions)","og_description":"With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of a cybertattack","og_url":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/","og_site_name":"Bluemind","article_published_time":"2023-09-20T09:59:32+00:00","article_modified_time":"2023-09-20T10:02:17+00:00","og_image":[{"url":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Cyberattaques\u00a0: oui, vous \u00eates concern\u00e9s (mais pas de panique, il y a des solutions)","twitter_description":"Dans cet article co\u00e9crit avec Aucae, notre partenaire expert de la cybers\u00e9curit\u00e9, nous proposons des r\u00e9ponses concr\u00e8tes face aux cyberattaques.","twitter_image":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png","twitter_misc":{"Written by":"","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#article","isPartOf":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/"},"author":{"name":"","@id":""},"headline":"Cyber attacks: yes, you are a target (but don&#8217;t panic, there are solutions)","datePublished":"2023-09-20T09:59:32+00:00","dateModified":"2023-09-20T10:02:17+00:00","mainEntityOfPage":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/"},"wordCount":1191,"commentCount":0,"publisher":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/#organization"},"image":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage"},"thumbnailUrl":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png","keywords":["Featured","sovereignty"],"articleSection":["BlueMind's Solution","Practices"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/","url":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/","name":"Cyber attacks: yes, you are a target - Bluemind","isPartOf":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage"},"image":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage"},"thumbnailUrl":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png","datePublished":"2023-09-20T09:59:32+00:00","dateModified":"2023-09-20T10:02:17+00:00","description":"With our cybersecurity expert partner Aucae, we offer practical, immediately actionable answers to help you protect yourself and react in case of a cybertattack","breadcrumb":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#primaryimage","url":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png","contentUrl":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2023\/09\/header-copie.png","width":700,"height":394,"caption":"Cyberr\u00e9silience"},{"@type":"BreadcrumbList","@id":"https:\/\/bluemind.purpl-web.com\/en\/cyber-attacks-yes-you-are-a-target\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bluemind.purpl-web.com\/en\/homepage\/"},{"@type":"ListItem","position":2,"name":"Cyber attacks: yes, you are a target (but don&rsquo;t panic, there are solutions)"}]},{"@type":"WebSite","@id":"https:\/\/bluemind.purpl-web.com\/en\/#website","url":"https:\/\/bluemind.purpl-web.com\/en\/","name":"Bluemind","description":"Collaborative messaging","publisher":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bluemind.purpl-web.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bluemind.purpl-web.com\/en\/#organization","name":"BlueMind","url":"https:\/\/bluemind.purpl-web.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bluemind.purpl-web.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2017\/06\/logobm_300.png","contentUrl":"https:\/\/bluemind.purpl-web.com\/wp-content\/uploads\/2017\/06\/logobm_300.png","width":300,"height":100,"caption":"BlueMind"},"image":{"@id":"https:\/\/bluemind.purpl-web.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/posts\/4854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/comments?post=4854"}],"version-history":[{"count":9,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/posts\/4854\/revisions"}],"predecessor-version":[{"id":4867,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/posts\/4854\/revisions\/4867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/media\/4844"}],"wp:attachment":[{"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/media?parent=4854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/categories?post=4854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bluemind.purpl-web.com\/en\/wp-json\/wp\/v2\/tags?post=4854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}