{"id":29554,"date":"2025-05-12T15:13:41","date_gmt":"2025-05-12T13:13:41","guid":{"rendered":"https:\/\/dev.evok.com\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/"},"modified":"2025-05-12T15:13:45","modified_gmt":"2025-05-12T13:13:45","slug":"are-your-employees-the-weakest-link-in-your-cybersecurity-chain","status":"publish","type":"post","link":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/","title":{"rendered":"Are your employees the weakest link in your cybersecurity chain?"},"content":{"rendered":"\n<p>How many times have you heard phrases like: \"Your employees are the weak link in your <strong>cybersecurity <\/strong>\", \"Employees are the major access point for <strong>cyber attacks<\/strong> \", etc.? You know, this doesn't have to be the case. On the contrary, your employees can be <strong>your company's greatest security<\/strong> asset. That is, of course, if you train them properly in <strong>cybersecurity<\/strong> policies and practices.      <\/p>\n\n<p>Find out how your employees can be the weakest link in your <strong>cybersecurity <\/strong>chain, and how you can turn them into your strength.  <\/p>\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><h2>Contents :<\/h2><ul><li><a href=\"#h-le-role-des-employes-dans-la-cybersecurite-de-l-entreprise\" data-level=\"2\">The role of employees in corporate cybersecurity&nbsp;<\/a><\/li><li><a href=\"#h-les-employes-sont-ils-reellement-le-maillon-faible-de-la-chaine-de-cybersecurite\" data-level=\"2\">Are employees really the weakest link in the cybersecurity chain?<\/a><\/li><li><a href=\"#h-comment-faire-de-vos-employes-la-force-de-votre-cybersecurite\" data-level=\"2\">How can you make your employees the driving force behind your cybersecurity?<\/a><\/li><li><a href=\"#h-a-retenir\" data-level=\"2\">To remember<\/a><\/li><\/ul><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"h-le-role-des-employes-dans-la-cybersecurite-de-l-entreprise\"><strong>The role of employees in corporate cybersecurity  <\/strong><\/h2>\n\n<p>Although companies in <strong>Switzerland<\/strong> and around the world are constantly protecting their data from hackers, the greatest <strong>cybersecurity<\/strong> threat remains the human factor. Indeed, human error is almost at the root of all reported data breaches.   <\/p>\n\n<p>Hackers target frontline employees and sometimes even the most diligent CEOs with highly sophisticated and often personalized attacks. For example, the company's LinkedIn profile and website contain a treasure trove for a <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-phishing\">spear-phishing<\/a> attack. It's all there: e-mail addresses, domains, employee relationships and the CEO's agenda, for example.    <\/p>\n\n<p>These details make it easier for hackers to create a credible point of contact to exploit. For them, unsuspecting employees represent an easy target, but it's the keys they hold on the corporate network that are the ultimate objective.   <\/p>\n\n<p>These are just some of the reasons why the human factor threatens <strong>corporate security<\/strong>. In addition to phishing and social engineering, there are also viruses and <strong><a href=\"https:\/\/evok.com\/fr\/installation-et-gestion-de-firewall\/\">malware<\/a><\/strong> such as <strong>ransomware<\/strong>, or the accidental loss of equipment used at work (telephone, computer). <\/p>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/evok.com\/fr\/installation-et-gestion-de-firewall\/\"><strong>Protect yourself against malware with our cutting-edge solutions<\/strong><\/a><\/div>\n<\/div>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-les-employes-sont-ils-reellement-le-maillon-faible-de-la-chaine-de-cybersecurite\"><strong>Are employees really the weakest link in the cybersecurity chain?<\/strong><\/h2>\n\n<p><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png\" alt=\"\" class=\"wp-image-27828\" width=\"758\" height=\"408\"\/><\/figure>\n<\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>Before taking any action, companies need to ensure that their employees are part of their cyber planning to strengthen their resilience.<\/em><\/p>\n<\/blockquote>\n\n<p><\/p>\n\n<p>All the evidence suggests that employees are always at the forefront of <strong>cybersecurity<\/strong> issues. However, it must be stressed that employees' lack of awareness of <strong>corporate security<\/strong> is the responsibility of the organization's culture. Because if you make your employees aware, they will be your most important line of defense.  <\/p>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-comment-faire-de-vos-employes-la-force-de-votre-cybersecurite\"><strong>How can you make<\/strong><strong> your employees the driving force behind your cybersecurity?<\/strong><\/h2>\n\n<p><\/p>\n\n<h4 class=\"wp-block-heading\" id=\"h-1-sensibiliser-et-former-vos-employes\">1. <strong>Educate and train your employees <\/strong> <\/h4>\n\n<p>Do your employees know your company's <strong>cybersecurity <\/strong>policies? Are they familiar with password best practices? Do they have unique identifiers that they change regularly? Are they aware of the latest cyber threats, such as <strong>malware<\/strong> and phishing attempts? For example, do they know what to do when they receive an e-mail designed to look like their supervisor's? The first step is to raise employee awareness and provide ongoing training on <strong>cybersecurity<\/strong> issues.     <\/p>\n\n<h4 class=\"wp-block-heading\" id=\"h-2-instaurer-la-politique-des-mots-de-passe\">2. <strong>Set up password policy <\/strong> <\/h4>\n\n<p>Employees often prefer simple passwords that they can easily remember, but this should not be practiced.  <\/p>\n\n<p>Implement 2FA authentication for an extra layer of protection. In addition, to ensure that employees generate or create strong passwords that even they can't remember, provide them with password management tools that allow them to store and quickly access their accounts with the added security feature. Also, it's not just about having strong passwords, but changing them frequently. Here's another step you can take to protect your company's security.   <\/p>\n\n<h4 class=\"wp-block-heading\" id=\"h-3-utilisation-des-donnees-et-de-l-internet\">3. <strong>Use of data and the Internet<\/strong><\/h4>\n\n<p>Ensure that clear rules are established when employees are connected to the company network. Establish policies that guarantee the protection of company data. Firstly, make it clear that business e-mails must only be used for work purposes, and that personal e-mails must be restricted.  <\/p>\n\n<p>Secondly, storage devices such as external hard drives or USB sticks should be prohibited, unless they are supplied and\/or analyzed by the company.<\/p>\n\n<p>In addition, unless it's necessary for work, you can restrict employee access to websites that aren't important, such as social networks or online video streaming. This will help employees avoid going to fraudulent websites that could potentially break into your network. <\/p>\n\n<h4 class=\"wp-block-heading\" id=\"h-4-investir-dans-une-solution-de-securite\"><strong>4. Invest in a security solution  <\/strong><\/h4>\n\n<p>Today, malicious software (malware) exploits advanced techniques to bypass network security tools and equipment. The effects on a company can be disastrous, especially if the <strong>malware<\/strong> is ransomware that locks your computer and prevents you from accessing it until you pay the ransom. <\/p>\n\n<p>To guarantee your cybersecurity at the highest level, EVOK partners with several suppliers of the latest security equipment, including <strong><a href=\"https:\/\/www.paloaltonetworks.com\/\">Palo Alto Networks<\/a><\/strong><a href=\"https:\/\/www.juniper.net\/us\/en.html\">Juniper Networks<\/a> and <strong><a href=\"https:\/\/www.fortinet.com\/\">Fortinet<\/a>.<\/strong> <\/p>\n\n<p>Our certified staff are able to draw up a security strategy that reflects the constraints of your profession. Our equipment secures your applications, protects your identities, and detects and prevents advanced threats, even in encrypted traffic. They use cutting-edge technologies such as Machine Learning, which can detect variations in threats, predict the next stages of an attack, and implement protection in near-real time.  <\/p>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-a-retenir\">To remember<\/h2>\n\n<p>So keep in mind that all companies are potential targets for <strong>data breaches<\/strong>. Hackers don't care about your industry, sales or number of employees. They're only interested in the data you possess, and will stop at nothing to get their hands on it. That's why, as a company, it's incumbent on you to have a solid <strong>data confidentiality<\/strong> strategy, even when it comes to your employees.     <\/p>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/evok.com\/fr\/contactez-nous\/\">Contact us for support<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Find out how your employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.  <\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[108,106],"tags":[114,112],"class_list":["post-29554","post","type-post","status-publish","format-standard","hentry","category-blog-en","category-cybersecurity","tag-computer-security","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are my employees putting their cyber security at risk?<\/title>\n<meta name=\"description\" content=\"Find out how employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are your employees the weakest link in your cybersecurity chain?\" \/>\n<meta property=\"og:description\" content=\"Find out how employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"EVOK Informatique\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-12T13:13:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-12T13:13:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png\" \/>\n<meta name=\"author\" content=\"Florian Bourqui\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian Bourqui\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/\"},\"author\":{\"name\":\"Florian Bourqui\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/person\\\/03eaff51f52c8e29668cc58c6701f122\"},\"headline\":\"Are your employees the weakest link in your cybersecurity chain?\",\"datePublished\":\"2025-05-12T13:13:41+00:00\",\"dateModified\":\"2025-05-12T13:13:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/\"},\"wordCount\":909,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png\",\"keywords\":[\"computer security\",\"cyber security\"],\"articleSection\":[\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#respond\"]}],\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/\",\"url\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/\",\"name\":\"Are my employees putting their cyber security at risk?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png\",\"datePublished\":\"2025-05-12T13:13:41+00:00\",\"dateModified\":\"2025-05-12T13:13:45+00:00\",\"description\":\"Find out how employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/evok.com\\\/media\\\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png\",\"contentUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/evok.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are your employees the weakest link in your cybersecurity chain?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/evok.com\\\/en\\\/\",\"name\":\"EVOK Informatique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/evok.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#organization\",\"name\":\"EVOK - Altern8 SA\",\"alternateName\":\"EVOK\",\"url\":\"https:\\\/\\\/evok.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/evok.com\\\/media\\\/Logo.svg-4.png\",\"contentUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/Logo.svg-4.png\",\"width\":300,\"height\":140,\"caption\":\"EVOK - Altern8 SA\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/evok\\\/\"],\"description\":\"EVOK \u2013 Altern8 SA est une soci\u00e9t\u00e9 suisse d\u2019infog\u00e9rance et de services cloud bas\u00e9e \u00e0 Fribourg. Nous aidons les PME \u00e0 s\u00e9curiser et moderniser leur informatique: cloud h\u00e9berg\u00e9 en Suisse, cybers\u00e9curit\u00e9 op\u00e9rationnelle, Microsoft 365, t\u00e9l\u00e9phonie\\\/VoIP, r\u00e9seaux et support utilisateur. En tant que membre du groupe Sequotech, nous combinons expertise locale, infrastructures souveraines et engagements de service mesurables (SLA). Notre approche est pragmatique: architecture simple, co\u00fbts lisibles, et un point de contact unique pour votre IT au quotidien.\",\"email\":\"info@evok.com\",\"telephone\":\"+41 26 309 27 27\",\"legalName\":\"Altern8 SA\",\"foundingDate\":\"1998-01-01\",\"vatID\":\"CHE-105.467.972 TVA\",\"taxID\":\"CHE-105.467.972\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/person\\\/03eaff51f52c8e29668cc58c6701f122\",\"name\":\"Florian Bourqui\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are my employees putting their cyber security at risk?","description":"Find out how employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/","og_locale":"en_US","og_type":"article","og_title":"Are your employees the weakest link in your cybersecurity chain?","og_description":"Find out how employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.","og_url":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/","og_site_name":"EVOK Informatique","article_published_time":"2025-05-12T13:13:41+00:00","article_modified_time":"2025-05-12T13:13:45+00:00","og_image":[{"url":"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png","type":"","width":"","height":""}],"author":"Florian Bourqui","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Florian Bourqui","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#article","isPartOf":{"@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/"},"author":{"name":"Florian Bourqui","@id":"https:\/\/evok.com\/en\/#\/schema\/person\/03eaff51f52c8e29668cc58c6701f122"},"headline":"Are your employees the weakest link in your cybersecurity chain?","datePublished":"2025-05-12T13:13:41+00:00","dateModified":"2025-05-12T13:13:45+00:00","mainEntityOfPage":{"@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/"},"wordCount":909,"commentCount":0,"publisher":{"@id":"https:\/\/evok.com\/en\/#organization"},"image":{"@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png","keywords":["computer security","cyber security"],"articleSection":["Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#respond"]}],"accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/","url":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/","name":"Are my employees putting their cyber security at risk?","isPartOf":{"@id":"https:\/\/evok.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#primaryimage"},"image":{"@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png","datePublished":"2025-05-12T13:13:41+00:00","dateModified":"2025-05-12T13:13:45+00:00","description":"Find out how employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.","breadcrumb":{"@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#primaryimage","url":"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png","contentUrl":"https:\/\/evok.com\/media\/Cyberse&#x301;curite&#x301;-employe&#x301;s-1024x553.png"},{"@type":"BreadcrumbList","@id":"https:\/\/evok.com\/en\/are-your-employees-the-weakest-link-in-your-cybersecurity-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evok.com\/en\/"},{"@type":"ListItem","position":2,"name":"Are your employees the weakest link in your cybersecurity chain?"}]},{"@type":"WebSite","@id":"https:\/\/evok.com\/en\/#website","url":"https:\/\/evok.com\/en\/","name":"EVOK Informatique","description":"","publisher":{"@id":"https:\/\/evok.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evok.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evok.com\/en\/#organization","name":"EVOK - Altern8 SA","alternateName":"EVOK","url":"https:\/\/evok.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evok.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evok.com\/media\/Logo.svg-4.png","contentUrl":"https:\/\/evok.com\/media\/Logo.svg-4.png","width":300,"height":140,"caption":"EVOK - Altern8 SA"},"image":{"@id":"https:\/\/evok.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evok\/"],"description":"EVOK \u2013 Altern8 SA est une soci\u00e9t\u00e9 suisse d\u2019infog\u00e9rance et de services cloud bas\u00e9e \u00e0 Fribourg. Nous aidons les PME \u00e0 s\u00e9curiser et moderniser leur informatique: cloud h\u00e9berg\u00e9 en Suisse, cybers\u00e9curit\u00e9 op\u00e9rationnelle, Microsoft 365, t\u00e9l\u00e9phonie\/VoIP, r\u00e9seaux et support utilisateur. En tant que membre du groupe Sequotech, nous combinons expertise locale, infrastructures souveraines et engagements de service mesurables (SLA). Notre approche est pragmatique: architecture simple, co\u00fbts lisibles, et un point de contact unique pour votre IT au quotidien.","email":"info@evok.com","telephone":"+41 26 309 27 27","legalName":"Altern8 SA","foundingDate":"1998-01-01","vatID":"CHE-105.467.972 TVA","taxID":"CHE-105.467.972","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/evok.com\/en\/#\/schema\/person\/03eaff51f52c8e29668cc58c6701f122","name":"Florian Bourqui"}]}},"_links":{"self":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts\/29554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/comments?post=29554"}],"version-history":[{"count":1,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts\/29554\/revisions"}],"predecessor-version":[{"id":29556,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts\/29554\/revisions\/29556"}],"wp:attachment":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/media?parent=29554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/categories?post=29554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/tags?post=29554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}