{"id":4126,"date":"2022-10-18T13:09:23","date_gmt":"2022-10-18T13:09:23","guid":{"rendered":"https:\/\/challengeseconomiques.com\/?p=4126"},"modified":"2022-10-18T13:09:52","modified_gmt":"2022-10-18T13:09:52","slug":"mois-de-la-sensibilisation-a-la-cybersecurite-retour-aux-bases-les-entreprises-doivent-renforcer-les-elements-fondamentaux-du-risque-de-securite","status":"publish","type":"post","link":"https:\/\/challengeseconomiques.com\/?p=4126","title":{"rendered":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases  Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9"},"content":{"rendered":"<p><strong>Anna Collard, Vice-Pr\u00e9sidente de la Strat\u00e9gie de Contenu et \u00c9vang\u00e9liste chez KnowBe4 AFRICA <\/strong><\/p>\n<p><strong>La cybers\u00e9curit\u00e9 est le probl\u00e8me de tous. C&rsquo;est le probl\u00e8me du Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d&rsquo;Information (RSSI), du PDG et du directeur. Et de chaque employ\u00e9 \u00e0 tous les niveaux de l&rsquo;organisation, de la personne qui sert le th\u00e9 \u00e0 celle qui dirige l&rsquo;\u00e9quipe. La cybercriminalit\u00e9 est perp\u00e9tr\u00e9e par des cybercriminels qui sont d\u00e9termin\u00e9s \u00e0 infiltrer l&rsquo;entreprise, \u00e0 voler les donn\u00e9es, \u00e0 prendre le contr\u00f4le et \u00e0 gagner le plus d&rsquo;argent possible, et ils sont pr\u00eats \u00e0 faire tout ce qu&rsquo;il faut pour atteindre chacun de ces indicateurs cl\u00e9s de performance (ICP). D&rsquo;apr\u00e8s Anna Collard, Vice-Pr\u00e9sidente de la Strat\u00e9gie de Contenu et \u00c9vang\u00e9liste chez KnowBe4 AFRICA (<a href=\"https:\/\/www.africa-newsroom.com\/press\/countlinks\/222124\/https:%7D%7Dwww.KnowBe4.com\/website\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/www.KnowBe4.com<\/a>), la protection de l&rsquo;entreprise, de ses ressources et de son personnel d\u00e9pend de la compr\u00e9hension, par tous, des principes de base et de la fa\u00e7on de les appliquer.<\/strong><\/p>\n<p>\u00ab Il sera toujours n\u00e9cessaire de s&rsquo;assurer que l&rsquo;organisation dispose des niveaux de technologie, de politique et de processus de s\u00e9curit\u00e9 ad\u00e9quats \u00bb, dit-elle, \u00ab mais il faut \u00e9galement que les niveaux de formation et de compr\u00e9hension de la s\u00e9curit\u00e9 au sein du personnel soient ad\u00e9quats pour soutenir l&rsquo;investissement dans la technologie de s\u00e9curit\u00e9. Les entreprises n&rsquo;accordent toujours pas assez d&rsquo;attention \u00e0 la seule vuln\u00e9rabilit\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 qui est toujours ouverte aux attaques, prompte \u00e0 commettre des erreurs et qui peut accidentellement laisser la porte num\u00e9rique grande ouverte : les personnes. \u00bb<\/p>\n<p>Revenir aux bases signifie mettre la formation en s\u00e9curit\u00e9 \u00e0 la port\u00e9e des employ\u00e9s de mani\u00e8re constante et coh\u00e9rente. Il s&rsquo;agit de renforcer sans cesse le message, d&rsquo;enseigner aux personnes les risques, nouveaux et anciens, puis de tester leurs connaissances pour s&rsquo;assurer qu&rsquo;ils ont vraiment compris les menaces et comment les \u00e9viter. Cette approche strat\u00e9gique de r\u00e9p\u00e9ter, apprendre et tester est un moyen av\u00e9r\u00e9 de garantir que les employ\u00e9s re\u00e7oivent les bases fondamentales dont ils ont besoin pour rester conscients de la s\u00e9curit\u00e9 et \u00eatre pr\u00e9par\u00e9s.<\/p>\n<p>Une autre m\u00e9thode qui s&rsquo;est av\u00e9r\u00e9e inestimable lorsqu&rsquo;il s&rsquo;agit de modifier des mod\u00e8les et d&rsquo;imposer des comportements est le mod\u00e8le comportemental de Fogg (<a href=\"https:\/\/www.africa-newsroom.com\/press\/countlinks\/222124\/https:%7D%7DBehaviorModel.org%7D\/website\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/BehaviorModel.org\/<\/a>), d\u00e9velopp\u00e9 par le fondateur du Stanford Behavior Design Lab, BJ Fogg. Son mod\u00e8le sugg\u00e8re que trois \u00e9l\u00e9ments doivent \u00eatre pr\u00e9sents pour qu&rsquo;un comportement sp\u00e9cifique se produise : la motivation, la capacit\u00e9 et les incitations. Cela signifie que la formation en s\u00e9curit\u00e9 doit \u00eatre mise en \u0153uvre parall\u00e8lement \u00e0 des motivations intelligentes de changement du comportement, afin de garantir que les le\u00e7ons apprises en mati\u00e8re de s\u00e9curit\u00e9 influencent directement le comportement.<\/p>\n<p>\u00ab Le probl\u00e8me est que les personnes sont occup\u00e9es et stress\u00e9es au travail, donc elles ignorent souvent la formation ou la consid\u00e8rent comme une interruption de leur journ\u00e9e \u00bb, explique M<sup>me<\/sup> Collard. \u00ab Elles sont \u00e9galement plus susceptibles de commettre une erreur en cliquant sur un lien ou en se laissant prendre au pi\u00e8ge d&rsquo;un courriel d&rsquo;hame\u00e7onnage si elles sont fatigu\u00e9es et distraites. Cela signifie que la formation en sensibilisation \u00e0 la s\u00e9curit\u00e9 doit \u00eatre d\u00e9velopp\u00e9e correctement. Elle doit \u00eatre claire, simple \u00e0 comprendre et accessible aux utilisateurs. \u00bb<\/p>\n<p>En plus de veiller \u00e0 ce que la formation soit plus attrayante pour que les personnes l&rsquo;adoptent et s&rsquo;y engagent, les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9. Cela signifie qu&rsquo;il faut leur rappeler qu&rsquo;elles sont autant expos\u00e9es au risque que l&rsquo;entreprise (l&rsquo;hame\u00e7onnage et le piratage ne sont pas l&rsquo;apanage de l&rsquo;organisation et ils peuvent avoir des r\u00e9percussions personnelles et professionnelles \u00e0 long terme pour les individus) et leur donner une fiche d&rsquo;information qui met en \u00e9vidence les risques les plus courants en un coup d&rsquo;\u0153il. Assurez-vous que les personnes savent \u00e0 quel point l&rsquo;hame\u00e7onnage est devenu populaire aupr\u00e8s des cybercriminels (Deloitte (<a href=\"https:\/\/bit.ly\/3EPtz2l\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/bit.ly\/3EPtz2l<\/a>) a d\u00e9couvert que 91 % de toutes les cyberattaques commencent par un courriel d&rsquo;hame\u00e7onnage) et comment une attaque r\u00e9ussie peut paralyser l&rsquo;entreprise. Alors, renforcez ce message, r\u00e9p\u00e9tez-le et maintenez la formation.<\/p>\n<p>\u00ab Les bases ne se r\u00e9sument pas \u00e0 : ne cliquez pas, ne r\u00e9pondez pas d&rsquo;une mani\u00e8re \u00e9motive, v\u00e9rifiez l&rsquo;URL, ne t\u00e9l\u00e9chargez pas \u00bb, conclut M<sup>me<\/sup> Collard. \u00ab Elles sont \u00e9galement centr\u00e9es sur l&rsquo;importance du pare-feu humain dans la protection de l&rsquo;entreprise, l&rsquo;impact d&rsquo;une attaque sur la r\u00e9putation et la conformit\u00e9 de l&rsquo;entreprise, le risque de perte personnelle et de fraude, et la responsabilit\u00e9 partag\u00e9e pour que la s\u00e9curit\u00e9 soit le probl\u00e8me et la priorit\u00e9 de chacun. \u00bb<\/p>\n<p><strong>(APO)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anna Collard, Vice-Pr\u00e9sidente de la Strat\u00e9gie de Contenu et \u00c9vang\u00e9liste chez KnowBe4 AFRICA La cybers\u00e9curit\u00e9 est le probl\u00e8me de tous. C&rsquo;est le probl\u00e8me du Responsable&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4127,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,10],"tags":[],"class_list":["post-4126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite-economique","category-infos-eco","wpcat-8-id","wpcat-10-id"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9 - challenges economiques<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/challengeseconomiques.com\/?p=4126\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9 - challenges economiques\" \/>\n<meta property=\"og:description\" content=\"Anna Collard, Vice-Pr\u00e9sidente de la Strat\u00e9gie de Contenu et \u00c9vang\u00e9liste chez KnowBe4 AFRICA La cybers\u00e9curit\u00e9 est le probl\u00e8me de tous. C&rsquo;est le probl\u00e8me du Responsable...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/challengeseconomiques.com\/?p=4126\" \/>\n<meta property=\"og:site_name\" content=\"challenges economiques\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T13:09:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-18T13:09:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"497\" \/>\n\t<meta property=\"og:image:height\" content=\"418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#article\",\"isPartOf\":{\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/challengeseconomiques.com\/#\/schema\/person\/b4568c9afebc5a9238a771873801e349\"},\"headline\":\"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9\",\"datePublished\":\"2022-10-18T13:09:23+00:00\",\"dateModified\":\"2022-10-18T13:09:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126\"},\"wordCount\":870,\"image\":{\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage\"},\"thumbnailUrl\":\"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg\",\"articleSection\":[\"Actualit\u00e9 \u00e9conomique\",\"Infos \u00e9co\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126\",\"url\":\"https:\/\/challengeseconomiques.com\/?p=4126\",\"name\":\"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9 - challenges economiques\",\"isPartOf\":{\"@id\":\"https:\/\/challengeseconomiques.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage\"},\"image\":{\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage\"},\"thumbnailUrl\":\"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg\",\"datePublished\":\"2022-10-18T13:09:23+00:00\",\"dateModified\":\"2022-10-18T13:09:52+00:00\",\"author\":{\"@id\":\"https:\/\/challengeseconomiques.com\/#\/schema\/person\/b4568c9afebc5a9238a771873801e349\"},\"breadcrumb\":{\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/challengeseconomiques.com\/?p=4126\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage\",\"url\":\"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg\",\"contentUrl\":\"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg\",\"width\":497,\"height\":418},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/challengeseconomiques.com\/?p=4126#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/challengeseconomiques.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/challengeseconomiques.com\/#website\",\"url\":\"https:\/\/challengeseconomiques.com\/\",\"name\":\"challenges economiques\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/challengeseconomiques.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/challengeseconomiques.com\/#\/schema\/person\/b4568c9afebc5a9238a771873801e349\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/challengeseconomiques.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/099e42240b5eea11acdb72751fcce0dd918603f0749d24974b7984ea47ed9fd9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/099e42240b5eea11acdb72751fcce0dd918603f0749d24974b7984ea47ed9fd9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/challengeseconomiques.com\"],\"url\":\"https:\/\/challengeseconomiques.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9 - challenges economiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/challengeseconomiques.com\/?p=4126","og_locale":"fr_FR","og_type":"article","og_title":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9 - challenges economiques","og_description":"Anna Collard, Vice-Pr\u00e9sidente de la Strat\u00e9gie de Contenu et \u00c9vang\u00e9liste chez KnowBe4 AFRICA La cybers\u00e9curit\u00e9 est le probl\u00e8me de tous. C&rsquo;est le probl\u00e8me du Responsable...","og_url":"https:\/\/challengeseconomiques.com\/?p=4126","og_site_name":"challenges economiques","article_published_time":"2022-10-18T13:09:23+00:00","article_modified_time":"2022-10-18T13:09:52+00:00","og_image":[{"width":497,"height":418,"url":"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/challengeseconomiques.com\/?p=4126#article","isPartOf":{"@id":"https:\/\/challengeseconomiques.com\/?p=4126"},"author":{"name":"admin","@id":"https:\/\/challengeseconomiques.com\/#\/schema\/person\/b4568c9afebc5a9238a771873801e349"},"headline":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9","datePublished":"2022-10-18T13:09:23+00:00","dateModified":"2022-10-18T13:09:52+00:00","mainEntityOfPage":{"@id":"https:\/\/challengeseconomiques.com\/?p=4126"},"wordCount":870,"image":{"@id":"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage"},"thumbnailUrl":"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg","articleSection":["Actualit\u00e9 \u00e9conomique","Infos \u00e9co"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/challengeseconomiques.com\/?p=4126","url":"https:\/\/challengeseconomiques.com\/?p=4126","name":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9 - challenges economiques","isPartOf":{"@id":"https:\/\/challengeseconomiques.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage"},"image":{"@id":"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage"},"thumbnailUrl":"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg","datePublished":"2022-10-18T13:09:23+00:00","dateModified":"2022-10-18T13:09:52+00:00","author":{"@id":"https:\/\/challengeseconomiques.com\/#\/schema\/person\/b4568c9afebc5a9238a771873801e349"},"breadcrumb":{"@id":"https:\/\/challengeseconomiques.com\/?p=4126#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/challengeseconomiques.com\/?p=4126"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/challengeseconomiques.com\/?p=4126#primaryimage","url":"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg","contentUrl":"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg","width":497,"height":418},{"@type":"BreadcrumbList","@id":"https:\/\/challengeseconomiques.com\/?p=4126#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/challengeseconomiques.com\/"},{"@type":"ListItem","position":2,"name":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : retour aux bases Les entreprises doivent renforcer les \u00e9l\u00e9ments fondamentaux du risque de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/challengeseconomiques.com\/#website","url":"https:\/\/challengeseconomiques.com\/","name":"challenges economiques","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/challengeseconomiques.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/challengeseconomiques.com\/#\/schema\/person\/b4568c9afebc5a9238a771873801e349","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/challengeseconomiques.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/099e42240b5eea11acdb72751fcce0dd918603f0749d24974b7984ea47ed9fd9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/099e42240b5eea11acdb72751fcce0dd918603f0749d24974b7984ea47ed9fd9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/challengeseconomiques.com"],"url":"https:\/\/challengeseconomiques.com\/?author=1"}]}},"jetpack_featured_media_url":"https:\/\/challengeseconomiques.com\/wp-content\/uploads\/2022\/10\/collard.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/posts\/4126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4126"}],"version-history":[{"count":1,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/posts\/4126\/revisions"}],"predecessor-version":[{"id":4128,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/posts\/4126\/revisions\/4128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=\/wp\/v2\/media\/4127"}],"wp:attachment":[{"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/challengeseconomiques.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}