{"id":1753,"date":"2022-11-23T16:01:46","date_gmt":"2022-11-23T15:01:46","guid":{"rendered":"http:\/\/mak2com.local\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/"},"modified":"2022-11-23T16:01:46","modified_gmt":"2022-11-23T15:01:46","slug":"les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe","status":"publish","type":"post","link":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/","title":{"rendered":"Les bonnes pratiques de s\u00e9curit\u00e9 informatique &#8211; Renforcer ses mots de passe"},"content":{"rendered":"\n<p>Dans un monde o\u00f9 le num\u00e9rique et l\u2019informatique sont constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les diff\u00e9rents comptes que nous utilisons. Que ce soit pour des <strong>r\u00e9seaux sociaux<\/strong>, pour un <strong>organisme administratif<\/strong>, une <strong>plateforme professionnelle<\/strong>, etc., une faille de s\u00e9curit\u00e9 peut compromettre des donn\u00e9es personnelles qui peuvent par la suite amener \u00e0 une escroquerie, une usurpation d\u2019identit\u00e9, etc.<\/p>\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/VpVXyPhwbC993cgRae29CqFBjtxUjNz4UmZCi9RopEY03Iu2I_bBxZaLGsLYKuSkB4MttVsP20_x9iqKL3dSwgUkr8VSEDLobo6x6jKcakOSAoqpSK4mV0e_Kcm3IUZyxWHVesUszGqFQIGTCGuOVbWFMa8czByhCBWMT9TJ4zVufzexslQlzo5GIK5u_Q\" alt=\"hacker fou\"\/><\/figure>\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>La s\u00e9curit\u00e9 \u00e0 100% est une utopie ! Il est impossible de se s\u00e9curiser \u00e0 100% mais il est possible d\u2019arriver \u00e0 un niveau de s\u00e9curit\u00e9 acceptable pour d\u00e9courager les personnes malveillantes. Cela passe en premier lieu par l\u2019utilisation d\u2019un antivirus ! Beaucoup trop de personnes n&#8217;utilisent aucun antivirus, voire simplement la version gratuite (presque inutile). Il faut peser le pour et le contre : <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Avoir un antivirus avec une licence en moyenne entre 40\u20ac et 50\u20ac\/an offrant ainsi une s\u00e9r\u00e9nit\u00e9 contre le piratage de votre ordinateur.<\/li>\n\n\n\n<li>Ne pas en avoir (ou simplement la version gratuite, donc tr\u00e8s limit\u00e9e) et prendre le risque d\u2019\u00eatre victime encore plus facilement d\u2019un piratage et ainsi risquer de devoir gal\u00e9rer pour r\u00e9cup\u00e9rer vos donn\u00e9es ou r\u00e9parer votre ordinateur\u2026 <\/li>\n<\/ul>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Une fois cette premi\u00e8re \u00e9tape valid\u00e9e, le second levier a enclench\u00e9 sera le mot de passe. <\/p>\n\n<h2 class=\"wp-block-heading\">1. G\u00e9n\u00e9rer un mot de passe robuste<\/h2>\n\n<p><strong>Cas concret : <\/strong><\/p>\n\n<p>\u201cUn comptable, dans le cadre de ses fonctions, va r\u00e9guli\u00e8rement consulter l\u2019\u00e9tat des comptes de son entreprise sur le site internet mis \u00e0 disposition par l\u2019\u00e9tablissement bancaire. Par simplicit\u00e9, il a choisi un mot de passe faible. Ce mot de passe a tr\u00e8s facilement \u00e9t\u00e9 crack\u00e9 lors d\u2019une attaque utilisant un outil automatis\u00e9, et l\u2019entreprise s\u2019est fait voler 10 000\u20ac\u201d<\/p>\n\n<p>Le mot de passe est aujourd\u2019hui incontournable pour s\u00e9curiser un syst\u00e8me. Si un mot de passe du type <strong>Abc12345<\/strong> prendrait moins <strong>d\u2019une seconde<\/strong> (au rythme de <strong>10<sup>10 <\/sup>essais par seconde<\/strong>) \u00e0 cracker, il faudrait en moyenne <strong>3 ans<\/strong> avec un syst\u00e8me automatis\u00e9 pour cracker un mot de passe du type <strong>A%c59_48w<\/strong>. <\/p>\n\n<p>Assez d\u00e9courageant pour une personne malveillante.<\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/-8BMgXTZwTpWCUJcD_c5yCkOI1-pEA7SvTYriICJLDRXdfqFUG-vWFkwFU5FdDfuTnjadTuY1e_iJFS64JJi8qBJMZSADM5R6pull7qgOje0GUVXJ8Cl1oebHUgJzzjrQfw71HUE2SjqksIMiZ4u6HTx1nDNJ98wQFj3VNzeOcnpNhctvJYhI9mir1AN9A\" alt=\"&#xE9;poustouflant\"\/><\/figure>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Nous vous proposons ci-dessous quelques m\u00e9thodes de cr\u00e9ation de mots de passe :<\/p>\n\n<ul class=\"wp-block-list\">\n<li>La m\u00e9thode phon\u00e9tique avec une lettre sur deux en majuscules<\/li>\n<\/ul>\n\n<p>\u00ab J&#8217;ai achet\u00e9 1 abonnement Netflix cet apr\u00e8s-midi. \u00bb<\/p>\n\n<p>Donnerait un mot de passe comme : <strong>GhT1aBnN\u20actFlX7aM<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>La m\u00e9thode des premi\u00e8res lettres avec une lettre sur deux en majuscules<\/li>\n<\/ul>\n\n<p>\u00ab J&#8217;ai achet\u00e9 1 abonnement Netflix cet apr\u00e8s-midi. \u00bb<\/p>\n\n<p>Donnerait un mot de passe comme : <strong>Ja1An7A-m<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>La m\u00e9thode invent\u00e9e par vous-m\u00eame<\/li>\n<\/ul>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Votre mot de passe robuste \u00e9tant d\u00e9fini, il s&#8217;agirait de ne pas le r\u00e9utiliser partout !<\/p>\n\n<h2 class=\"wp-block-heading\">2. M\u00e9moriser l&#8217;ensemble des mots de passe robustes<\/h2>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/aQx04jhZu-eswt_fYyB-LKwCWgAGxBhJsXaY-H9X77o0ln0ZjulQCd8o6n3sLpfzyaRChwKjgSZ5tReduAd5Dq8CbE-Jv3FeEHLyL3hw3GMJLLSZ-1b-ZCihwvjjVYSYPFAr_zpeaL6s8E73tPW7lGP0MafnyMTyJXvo_K8CaDuOWzyB27qj61khTrR-bA\" alt=\"regard septique\"\/><\/figure>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Pas de panique, aujourd&#8217;hui des solutions existent pour vous aider \u00e0 m\u00e9moriser vos mots de passe : bienvenue dans l&#8217;\u00e8re des gestionnaires de mots de passe ! Ces applications vous permettent \u00e0 la fois de g\u00e9n\u00e9rer des mots de passe robustes automatiquement puis de les stocker tous au m\u00eame endroit et de les retrouver dans votre compte au sein de l\u2019application. <\/p>\n\n<p>Ces applications devront \u00eatre d\u00e9verrouill\u00e9es avec un mot de passe principal, le seul que vous aurez besoin de retenir ! Et le tour est jou\u00e9 !<\/p>\n\n<p>Une solution simple, intuitive qui facilitera votre quotidien tout en s\u00e9curisant vos diff\u00e9rentes connexions. <\/p>\n\n<p>Notre recommandation : n&#8217;enregistrez jamais vos mots de passe dans le navigateur internet ou en brut dans votre ordinateur (fichier texte, images, ou autres).<\/p>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Ci-dessous une liste de gestionnaires de mots de passe les plus pl\u00e9biscit\u00e9s : <\/strong><\/p>\n\n<p><a href=\"https:\/\/www.lastpass.com\/fr\">https:\/\/www.lastpass.com\/fr<\/a><\/p>\n\n<p><a href=\"https:\/\/www.dashlane.com\/fr\/\">https:\/\/www.dashlane.com\/fr\/<\/a><\/p>\n\n<p><a href=\"https:\/\/nordvpn.com\/fr\/password-manager\/\">https:\/\/nordvpn.com\/fr\/password-manager\/<\/a><\/p>\n\n<p><a href=\"https:\/\/1password.com\/fr\/\">https:\/\/1password.com\/fr\/<\/a><\/p>\n\n<p><a href=\"https:\/\/www.enpass.io\/\">https:\/\/www.enpass.io\/<\/a><\/p>\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Liens utiles : <\/strong><\/p>\n\n<p><a href=\"https:\/\/ssi.economie.gouv.fr\/motdepasse\">https:\/\/ssi.economie.gouv.fr\/motdepasse<\/a><\/p>\n\n<p><a href=\"https:\/\/www.motdepasse.xyz\/\">https:\/\/www.motdepasse.xyz\/<\/a><\/p>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Vous l&#8217;aurez compris, les mots de passe sont l&#8217;un des premiers \u00e9l\u00e9ments pour renforcer votre s\u00e9curit\u00e9 informatique. <\/p>\n\n<p>Prochaine \u00e9tape : la mise \u00e0 jour de vos logiciels. Nous vous donnons les cl\u00e9s de r\u00e9ussite sur notre article. Stay tuned.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un monde o\u00f9 le num\u00e9rique et l\u2019informatique sont constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1734,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-1753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mak2com - Les bonnes pratiques de s\u00e9curit\u00e9 informatique - Renforcer ses mots de passe<\/title>\n<meta name=\"description\" content=\"Dans un monde o\u00f9 l\u2019informatique est constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les nos comptes...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/\" \/>\n<meta property=\"og:locale\" content=\"eu_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mak2com - Les bonnes pratiques de s\u00e9curit\u00e9 informatique - Renforcer ses mots de passe\" \/>\n<meta property=\"og:description\" content=\"Dans un monde o\u00f9 l\u2019informatique est constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les nos comptes...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/\" \/>\n<meta property=\"og:site_name\" content=\"Mak2com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/fr-fr.facebook.com\/mak2com\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-23T15:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mak2com.fr\/wp-content\/uploads\/2022\/11\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mak2com\" \/>\n<meta name=\"twitter:site\" content=\"@mak2com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/\"},\"author\":{\"name\":\"Alexandre\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#\\\/schema\\\/person\\\/a763e4150de2e288765bd05e6282567d\"},\"headline\":\"Les bonnes pratiques de s\u00e9curit\u00e9 informatique &#8211; Renforcer ses mots de passe\",\"datePublished\":\"2022-11-23T15:01:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/\"},\"wordCount\":705,\"publisher\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mak2com.fr\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg\",\"inLanguage\":\"eu-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/\",\"url\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/\",\"name\":\"Mak2com - Les bonnes pratiques de s\u00e9curit\u00e9 informatique - Renforcer ses mots de passe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mak2com.fr\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg\",\"datePublished\":\"2022-11-23T15:01:46+00:00\",\"description\":\"Dans un monde o\u00f9 l\u2019informatique est constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les nos comptes...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#breadcrumb\"},\"inLanguage\":\"eu-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"eu-ES\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mak2com.fr\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/mak2com.fr\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/non-classifiee\\\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les bonnes pratiques de s\u00e9curit\u00e9 informatique &#8211; Renforcer ses mots de passe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#website\",\"url\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/\",\"name\":\"Mak2com\",\"description\":\"360\u00b0-ko komunikaziorako agentzia \",\"publisher\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"eu-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#organization\",\"name\":\"Mak2com\",\"url\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"eu-ES\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mak2com.fr\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/RVB-LOGO-COULEUR.png\",\"contentUrl\":\"https:\\\/\\\/mak2com.fr\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/RVB-LOGO-COULEUR.png\",\"width\":1840,\"height\":500,\"caption\":\"Mak2com\"},\"image\":{\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr-fr.facebook.com\\\/mak2com\\\/\",\"https:\\\/\\\/x.com\\\/mak2com\",\"https:\\\/\\\/www.instagram.com\\\/mak2com\\\/?hl=fr\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/mak2com\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mak2com.fr\\\/eu\\\/#\\\/schema\\\/person\\\/a763e4150de2e288765bd05e6282567d\",\"name\":\"Alexandre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"eu-ES\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ffcc9b078023e5f2bcede64208cf842a9696afeb6ae211902ce114bd32bc38f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ffcc9b078023e5f2bcede64208cf842a9696afeb6ae211902ce114bd32bc38f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ffcc9b078023e5f2bcede64208cf842a9696afeb6ae211902ce114bd32bc38f?s=96&d=mm&r=g\",\"caption\":\"Alexandre\"},\"description\":\"\u2014 D\u00e9veloppeur Web &amp; Responsable Technique\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mak2com - Les bonnes pratiques de s\u00e9curit\u00e9 informatique - Renforcer ses mots de passe","description":"Dans un monde o\u00f9 l\u2019informatique est constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les nos comptes...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/","og_locale":"eu_ES","og_type":"article","og_title":"Mak2com - Les bonnes pratiques de s\u00e9curit\u00e9 informatique - Renforcer ses mots de passe","og_description":"Dans un monde o\u00f9 l\u2019informatique est constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les nos comptes...","og_url":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/","og_site_name":"Mak2com","article_publisher":"https:\/\/fr-fr.facebook.com\/mak2com\/","article_published_time":"2022-11-23T15:01:46+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mak2com.fr\/wp-content\/uploads\/2022\/11\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg","type":"image\/jpeg"}],"author":"Alexandre","twitter_card":"summary_large_image","twitter_creator":"@mak2com","twitter_site":"@mak2com","twitter_misc":{"Written by":"Alexandre","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#article","isPartOf":{"@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/"},"author":{"name":"Alexandre","@id":"https:\/\/mak2com.fr\/eu\/#\/schema\/person\/a763e4150de2e288765bd05e6282567d"},"headline":"Les bonnes pratiques de s\u00e9curit\u00e9 informatique &#8211; Renforcer ses mots de passe","datePublished":"2022-11-23T15:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/"},"wordCount":705,"publisher":{"@id":"https:\/\/mak2com.fr\/eu\/#organization"},"image":{"@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#primaryimage"},"thumbnailUrl":"https:\/\/mak2com.fr\/wp-content\/uploads\/2022\/11\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg","inLanguage":"eu-ES"},{"@type":"WebPage","@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/","url":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/","name":"Mak2com - Les bonnes pratiques de s\u00e9curit\u00e9 informatique - Renforcer ses mots de passe","isPartOf":{"@id":"https:\/\/mak2com.fr\/eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#primaryimage"},"image":{"@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#primaryimage"},"thumbnailUrl":"https:\/\/mak2com.fr\/wp-content\/uploads\/2022\/11\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg","datePublished":"2022-11-23T15:01:46+00:00","description":"Dans un monde o\u00f9 l\u2019informatique est constamment pr\u00e9sents dans notre quotidien, il est primordial de s\u00e9curiser correctement les nos comptes...","breadcrumb":{"@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#breadcrumb"},"inLanguage":"eu-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/"]}]},{"@type":"ImageObject","inLanguage":"eu-ES","@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#primaryimage","url":"https:\/\/mak2com.fr\/wp-content\/uploads\/2022\/11\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg","contentUrl":"https:\/\/mak2com.fr\/wp-content\/uploads\/2022\/11\/les-bonnes-pratiques-de-securite-informatique-thumbnail.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mak2com.fr\/eu\/non-classifiee\/les-bonnes-pratiques-de-securite-informatique-renforcer-ses-mots-de-passe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/mak2com.fr\/eu\/"},{"@type":"ListItem","position":2,"name":"Les bonnes pratiques de s\u00e9curit\u00e9 informatique &#8211; Renforcer ses mots de passe"}]},{"@type":"WebSite","@id":"https:\/\/mak2com.fr\/eu\/#website","url":"https:\/\/mak2com.fr\/eu\/","name":"Mak2com","description":"360\u00b0-ko komunikaziorako agentzia ","publisher":{"@id":"https:\/\/mak2com.fr\/eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mak2com.fr\/eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"eu-ES"},{"@type":"Organization","@id":"https:\/\/mak2com.fr\/eu\/#organization","name":"Mak2com","url":"https:\/\/mak2com.fr\/eu\/","logo":{"@type":"ImageObject","inLanguage":"eu-ES","@id":"https:\/\/mak2com.fr\/eu\/#\/schema\/logo\/image\/","url":"https:\/\/mak2com.fr\/wp-content\/uploads\/2021\/02\/RVB-LOGO-COULEUR.png","contentUrl":"https:\/\/mak2com.fr\/wp-content\/uploads\/2021\/02\/RVB-LOGO-COULEUR.png","width":1840,"height":500,"caption":"Mak2com"},"image":{"@id":"https:\/\/mak2com.fr\/eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr-fr.facebook.com\/mak2com\/","https:\/\/x.com\/mak2com","https:\/\/www.instagram.com\/mak2com\/?hl=fr","https:\/\/fr.linkedin.com\/company\/mak2com"]},{"@type":"Person","@id":"https:\/\/mak2com.fr\/eu\/#\/schema\/person\/a763e4150de2e288765bd05e6282567d","name":"Alexandre","image":{"@type":"ImageObject","inLanguage":"eu-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/1ffcc9b078023e5f2bcede64208cf842a9696afeb6ae211902ce114bd32bc38f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1ffcc9b078023e5f2bcede64208cf842a9696afeb6ae211902ce114bd32bc38f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1ffcc9b078023e5f2bcede64208cf842a9696afeb6ae211902ce114bd32bc38f?s=96&d=mm&r=g","caption":"Alexandre"},"description":"\u2014 D\u00e9veloppeur Web &amp; Responsable Technique"}]}},"_links":{"self":[{"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/posts\/1753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/comments?post=1753"}],"version-history":[{"count":1,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/posts\/1753\/revisions"}],"predecessor-version":[{"id":1754,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/posts\/1753\/revisions\/1754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/media\/1734"}],"wp:attachment":[{"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/media?parent=1753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/categories?post=1753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mak2com.fr\/eu\/wp-json\/wp\/v2\/tags?post=1753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}