{"id":27986,"date":"2023-01-10T22:06:34","date_gmt":"2023-01-10T21:06:34","guid":{"rendered":"https:\/\/evok.com\/?p=27986"},"modified":"2023-02-14T10:56:19","modified_gmt":"2023-02-14T09:56:19","slug":"social-engineering-2023","status":"publish","type":"post","link":"https:\/\/evok.com\/fr\/social-engineering-2023\/","title":{"rendered":"Tout ce que vous devez savoir sur le social engineering en 2023"},"content":{"rendered":"\n<p>Le social engineering est un terme utilis\u00e9 pour d\u00e9signer un large \u00e9ventail d'activit\u00e9s malveillantes r\u00e9alis\u00e9es par le biais d'interactions humaines. Elle utilise la manipulation psychologique pour inciter les utilisateurs \u00e0 commettre des erreurs de s\u00e9curit\u00e9 ou \u00e0 donner des informations sensibles.<\/p>\n\n\n\n<p>En comprenant bien les attaques de social engineering et en reconnaissant que la v\u00e9ritable protection contre ces attaques passe par le c\u00f4t\u00e9 humain ET technologique, vous pouvez prot\u00e9ger votre organisation des cons\u00e9quences de ces types de pratiques.<\/p>\n\n\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><h2>Table des mati\u00e8res<\/h2><ul><li><a href=\"#h-quels-sont-les-types-d-attaques-de-social-engineering-les-plus-courants\" data-level=\"2\">Quels sont les types d'attaques de social engineering les plus courants ?<\/a><ul><li><a href=\"#h-le-phishing\" data-level=\"3\">Le Phishing<\/a><\/li><li><a href=\"#h-le-baiting\" data-level=\"3\">Le Baiting<\/a><\/li><li><a href=\"#h-le-pretexting\" data-level=\"3\">Le Pretexting<\/a><\/li><\/ul><\/li><li><a href=\"#h-comment-contrer-les-pratiques-de-social-engineering\" data-level=\"2\">Comment contrer les pratiques de social engineering ?<\/a><\/li><\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-quels-sont-les-types-d-attaques-de-social-engineering-les-plus-courants\">Quels sont les types d'attaques de social engineering les plus courants ?<\/h2>\n\n\n\n<p>Voici quelques-unes des techniques de social engineering les plus courantes :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-le-phishing\">Le Phishing<\/h3>\n\n\n\n<p>Le Phishing, aussi appel\u00e9 hame\u00e7onnage, est la tactique de social engineering la plus courante.<\/p>\n\n\n\n<p>Celle-ci se fait par le biais d\u2019un e-mail, un site Web, une publicit\u00e9 sur internet ou une vid\u00e9o pour inciter ses victimes \u00e0 agir. Les personnes derri\u00e8re l\u2019attaque se passent pour une banque, un service de livraison ou une agence gouvernementale, ou bien elles peuvent \u00eatre plus sp\u00e9cifiques et sembler provenir d'un d\u00e9partement de l'entreprise de la victime (ressources humaines, IT, commercial...). Au fait, les e-mails d'hame\u00e7onnage, souvent \u00e0 l\u2019air innocent, comportent un appel \u00e0 l'action. On va donc demander \u00e0 la victime de cliquer sur une URL, qui le m\u00e8nera ensuite \u00e0 un site Web frauduleux contenant un logiciel malveillant.<\/p>\n\n\n\n<p>Bien que les utilisateurs les moins avertis sont conscients de l\u2019existence de cette pratique, elle continue de faire des ravages. D\u2019autant plus que les cybercriminels font beaucoup plus d\u2019efforts pour faire en sorte qu\u2019elles soient bien con\u00e7ues et insoup\u00e7onnables.<\/p>\n\n\n\n<p>A noter qu\u2019il existe des variantes du phishing comme le Spear Phishing qui cible un groupe d\u00e9mographique, comme les employ\u00e9s d'une certaine entreprise ou les directeurs financiers d'un certain secteur. Il y a \u00e9galement le Whaling qui vise les cadres ou les employ\u00e9s de haut niveau.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-le-baiting\">Le Baiting<\/h3>\n\n\n\n<p>Le Baiting (traduit de l\u2019anglais\u00a0: l\u2019app\u00e2t) est \u00e9galement une forme assez courante de social engineering. Celle-ci consiste \u00e0 attirer la victime avec une offre all\u00e9chante (musique ou jeux gratuits). L\u2019attaquant esp\u00e8re que le mot de passe utilis\u00e9 pour se connecter et obtenir les cadeaux num\u00e9riques gratuits est un mot de passe qu'elle utilise sur des sites plus importants. Et s\u2019il est unique, l'attaquant pourra quand m\u00eame le vendre sur le dark web. En entreprise, une attaque de baiting est plus susceptible de consister en une cl\u00e9 USB laiss\u00e9e dans un endroit commun. Lorsque la personne la trouve et la branche sur le r\u00e9seau de l'entreprise pour voir \u00e0 qui elle appartient, elle t\u00e9l\u00e9charge un logiciel malveillant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-le-pretexting\">Le Pretexting<\/h3>\n\n\n\n<p>Comme son nom l\u2019indique, le \"pretexting\" est une forme d'ing\u00e9nierie sociale dans laquelle l'attaquant pr\u00e9sente un pr\u00e9texte pour gagner la confiance de la victime. Celui-ci peut se faire passer pour un investisseur, un repr\u00e9sentant RH ou une autre source \u00ab\u00a0l\u00e9gitime\u00a0\u00bb. Le type de sc\u00e9nario joue sur g\u00e9n\u00e9ralement sur les \u00e9motions de la victime en utilisant un sentiment d'urgence ou l\u2019effet de surprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-comment-contrer-les-pratiques-de-social-engineering\">Comment contrer les pratiques de social engineering ?<\/h2>\n\n\n\n<p>Afin de venir \u00e0 bout des menaces de social engineering, il est indispensable de se focaliser \u00e0 la fois sur le c\u00f4t\u00e9 humain et le c\u00f4t\u00e9 mat\u00e9riel\/logiciel.<\/p>\n\n\n\n<p>Commen\u00e7ons d\u2019abord par le c\u00f4t\u00e9 humain qui repr\u00e9sente le point d\u2019attaque des cyber criminels\u00a0sp\u00e9cialistes en social engineering ! Dans ce sens, la formation \u00e0 la s\u00e9curit\u00e9 reste le meilleur moyen d'\u00e9viter d'\u00eatre victime d'une attaque. Dans le cadre des programmes de sensibilisation \u00e0 la s\u00e9curit\u00e9, les organisations devraient continuer \u00e0 rappeler \u00e0 leurs employ\u00e9s les pratiques courantes suivantes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ne jamais cliquer sur des liens envoy\u00e9s ou des pi\u00e8ces jointes par des personnes qu\u2019ils ne connaissent pas.<\/li>\n\n\n\n<li>Toujours s'assurer de l'adresse web des sites l\u00e9gitimes, quitte \u00e0 la taper manuellement dans leur navigateur.<\/li>\n\n\n\n<li>V\u00e9rifier les fautes d'orthographe ou les domaines inappropri\u00e9s dans un lien (par exemple, une adresse qui devrait se terminer par .gov se termine par .com).<\/li>\n\n\n\n<li>Ne jamais communiquer leur nom d'utilisateur, mot de passe, date de naissance, donn\u00e9es financi\u00e8res ou d'autres informations personnelles en r\u00e9ponse \u00e0 un courriel ou \u00e0 un appel t\u00e9l\u00e9phonique.<\/li>\n<\/ul>\n\n\n\n<p>Passons maintenant au c\u00f4t\u00e9 technologique\u00a0! Il est imp\u00e9ratif de : <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Maintenir votre logiciel anti-malware et anti-virus \u00e0 jour pour s\u00e9curiser votre r\u00e9seau et vos donn\u00e9es.<\/li>\n\n\n\n<li>Adopter une approche de <a href=\"https:\/\/evok.com\/fr\/it-maintenance\/maintenance-et-gestion-dinfrastructure\/\">maintenance informatique pr\u00e9ventive<\/a> qui analyse la structure et le comportement des pages Web pour identifier les menaces potentielles.<\/li>\n<\/ul>\n\n\n\n<p>Et surtout, restez \u00e0 l'aff\u00fbt de toutes les nouveaut\u00e9s en termes de cybers\u00e9curit\u00e9 en devenant un lecteur r\u00e9gulier de notre blog \ud83d\ude09 ! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>En comprenant bien les attaques de social engineering et en reconnaissant que la v\u00e9ritable protection contre ces attaques passe par le c\u00f4t\u00e9 humain ET technologique, vous pouvez prot\u00e9ger votre organisation des cons\u00e9quences de ces types de pratiques.<\/p>\n","protected":false},"author":12,"featured_media":27987,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[51,55],"tags":[56],"class_list":["post-27986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurite","tag-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social engineering : Tout ce que vous devez savoir en 2023<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les diff\u00e9rents types de social engineering et comment lutter contre ces attaques qui menacent votre cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evok.com\/fr\/social-engineering-2023\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tout ce que vous devez savoir sur le social engineering en 2023\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les diff\u00e9rents types de social engineering et comment lutter contre ces attaques qui menacent votre cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evok.com\/fr\/social-engineering-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"EVOK Informatique\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-10T21:06:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-14T09:56:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evok.com\/media\/social-engineering-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"864\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Florian Bourqui\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian Bourqui\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/\"},\"author\":{\"name\":\"Florian Bourqui\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#\\\/schema\\\/person\\\/03eaff51f52c8e29668cc58c6701f122\"},\"headline\":\"Tout ce que vous devez savoir sur le social engineering en 2023\",\"datePublished\":\"2023-01-10T21:06:34+00:00\",\"dateModified\":\"2023-02-14T09:56:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/\"},\"wordCount\":860,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/social-engineering-2023.png\",\"keywords\":[\"cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Blog\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#respond\"]}],\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/\",\"url\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/\",\"name\":\"Social engineering : Tout ce que vous devez savoir en 2023\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/social-engineering-2023.png\",\"datePublished\":\"2023-01-10T21:06:34+00:00\",\"dateModified\":\"2023-02-14T09:56:19+00:00\",\"description\":\"D\u00e9couvrez les diff\u00e9rents types de social engineering et comment lutter contre ces attaques qui menacent votre cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/evok.com\\\/media\\\/social-engineering-2023.png\",\"contentUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/social-engineering-2023.png\",\"width\":1600,\"height\":864,\"caption\":\"social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/social-engineering-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dev.evok.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tout ce que vous devez savoir sur le social engineering en 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/evok.com\\\/fr\\\/\",\"name\":\"EVOK Informatique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/evok.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#organization\",\"name\":\"EVOK - Altern8 SA\",\"alternateName\":\"EVOK\",\"url\":\"https:\\\/\\\/evok.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/evok.com\\\/media\\\/Logo.svg-4.png\",\"contentUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/Logo.svg-4.png\",\"width\":300,\"height\":140,\"caption\":\"EVOK - Altern8 SA\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/evok\\\/\"],\"description\":\"EVOK \u2013 Altern8 SA est une soci\u00e9t\u00e9 suisse d\u2019infog\u00e9rance et de services cloud bas\u00e9e \u00e0 Fribourg. Nous aidons les PME \u00e0 s\u00e9curiser et moderniser leur informatique: cloud h\u00e9berg\u00e9 en Suisse, cybers\u00e9curit\u00e9 op\u00e9rationnelle, Microsoft 365, t\u00e9l\u00e9phonie\\\/VoIP, r\u00e9seaux et support utilisateur. En tant que membre du groupe Sequotech, nous combinons expertise locale, infrastructures souveraines et engagements de service mesurables (SLA). Notre approche est pragmatique: architecture simple, co\u00fbts lisibles, et un point de contact unique pour votre IT au quotidien.\",\"email\":\"info@evok.com\",\"telephone\":\"+41 26 309 27 27\",\"legalName\":\"Altern8 SA\",\"foundingDate\":\"1998-01-01\",\"vatID\":\"CHE-105.467.972 TVA\",\"taxID\":\"CHE-105.467.972\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/evok.com\\\/fr\\\/#\\\/schema\\\/person\\\/03eaff51f52c8e29668cc58c6701f122\",\"name\":\"Florian Bourqui\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social engineering : Tout ce que vous devez savoir en 2023","description":"D\u00e9couvrez les diff\u00e9rents types de social engineering et comment lutter contre ces attaques qui menacent votre cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evok.com\/fr\/social-engineering-2023\/","og_locale":"fr_FR","og_type":"article","og_title":"Tout ce que vous devez savoir sur le social engineering en 2023","og_description":"D\u00e9couvrez les diff\u00e9rents types de social engineering et comment lutter contre ces attaques qui menacent votre cybers\u00e9curit\u00e9.","og_url":"https:\/\/evok.com\/fr\/social-engineering-2023\/","og_site_name":"EVOK Informatique","article_published_time":"2023-01-10T21:06:34+00:00","article_modified_time":"2023-02-14T09:56:19+00:00","og_image":[{"width":1600,"height":864,"url":"https:\/\/evok.com\/media\/social-engineering-2023.png","type":"image\/png"}],"author":"Florian Bourqui","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Florian Bourqui"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#article","isPartOf":{"@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/"},"author":{"name":"Florian Bourqui","@id":"https:\/\/evok.com\/fr\/#\/schema\/person\/03eaff51f52c8e29668cc58c6701f122"},"headline":"Tout ce que vous devez savoir sur le social engineering en 2023","datePublished":"2023-01-10T21:06:34+00:00","dateModified":"2023-02-14T09:56:19+00:00","mainEntityOfPage":{"@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/"},"wordCount":860,"commentCount":0,"publisher":{"@id":"https:\/\/evok.com\/fr\/#organization"},"image":{"@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/evok.com\/media\/social-engineering-2023.png","keywords":["cybers\u00e9curit\u00e9"],"articleSection":["Blog","Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/evok.com\/fr\/social-engineering-2023\/#respond"]}],"accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/","url":"https:\/\/evok.com\/fr\/social-engineering-2023\/","name":"Social engineering : Tout ce que vous devez savoir en 2023","isPartOf":{"@id":"https:\/\/evok.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#primaryimage"},"image":{"@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/evok.com\/media\/social-engineering-2023.png","datePublished":"2023-01-10T21:06:34+00:00","dateModified":"2023-02-14T09:56:19+00:00","description":"D\u00e9couvrez les diff\u00e9rents types de social engineering et comment lutter contre ces attaques qui menacent votre cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evok.com\/fr\/social-engineering-2023\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#primaryimage","url":"https:\/\/evok.com\/media\/social-engineering-2023.png","contentUrl":"https:\/\/evok.com\/media\/social-engineering-2023.png","width":1600,"height":864,"caption":"social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/evok.com\/fr\/social-engineering-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.evok.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Tout ce que vous devez savoir sur le social engineering en 2023"}]},{"@type":"WebSite","@id":"https:\/\/evok.com\/fr\/#website","url":"https:\/\/evok.com\/fr\/","name":"EVOK Informatique","description":"","publisher":{"@id":"https:\/\/evok.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evok.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/evok.com\/fr\/#organization","name":"EVOK - Altern8 SA","alternateName":"EVOK","url":"https:\/\/evok.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/evok.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/evok.com\/media\/Logo.svg-4.png","contentUrl":"https:\/\/evok.com\/media\/Logo.svg-4.png","width":300,"height":140,"caption":"EVOK - Altern8 SA"},"image":{"@id":"https:\/\/evok.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evok\/"],"description":"EVOK \u2013 Altern8 SA est une soci\u00e9t\u00e9 suisse d\u2019infog\u00e9rance et de services cloud bas\u00e9e \u00e0 Fribourg. Nous aidons les PME \u00e0 s\u00e9curiser et moderniser leur informatique: cloud h\u00e9berg\u00e9 en Suisse, cybers\u00e9curit\u00e9 op\u00e9rationnelle, Microsoft 365, t\u00e9l\u00e9phonie\/VoIP, r\u00e9seaux et support utilisateur. En tant que membre du groupe Sequotech, nous combinons expertise locale, infrastructures souveraines et engagements de service mesurables (SLA). Notre approche est pragmatique: architecture simple, co\u00fbts lisibles, et un point de contact unique pour votre IT au quotidien.","email":"info@evok.com","telephone":"+41 26 309 27 27","legalName":"Altern8 SA","foundingDate":"1998-01-01","vatID":"CHE-105.467.972 TVA","taxID":"CHE-105.467.972","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/evok.com\/fr\/#\/schema\/person\/03eaff51f52c8e29668cc58c6701f122","name":"Florian Bourqui"}]}},"_links":{"self":[{"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/posts\/27986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/comments?post=27986"}],"version-history":[{"count":0,"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/posts\/27986\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/media\/27987"}],"wp:attachment":[{"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/media?parent=27986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/categories?post=27986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evok.com\/fr\/wp-json\/wp\/v2\/tags?post=27986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}