{"id":77938,"date":"2018-04-17T14:27:29","date_gmt":"2018-04-17T14:27:29","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/space-invaders-consumer-grade-iot-enterprise\/"},"modified":"2025-11-10T16:37:37","modified_gmt":"2025-11-10T16:37:37","slug":"space-invaders-consumer-grade-iot-enterprise","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/space-invaders-consumer-grade-iot-enterprise\/","title":{"rendered":"Space Invaders \u2013 les appareils IdO de grand public sont \u00e0 l\u2019assaut"},"content":{"rendered":"<p>J&rsquo;aimais bien le jeux de Space Invaders &#8211; des vagues d&rsquo;assaillants ennemis arrivaient de plus en plus vite pendant que vous essayiez de d\u00e9fendre votre base. Avec l&rsquo;exp\u00e9rience, vous pouvez apprendre leurs tactiques et devenir assez habile pour les arr\u00eater. Pour le personnel informatique d&rsquo;entreprise d&rsquo;aujourd&rsquo;hui, per\u00e7oivent les p\u00e9riph\u00e9riques IdO grand public certainement comme ces envahisseurs de l&rsquo;espace.<\/p>\n<p>Il y a de bonnes nouvelles et de mauvaises nouvelles au sujet de ces nouvelles cr\u00e9atures. Les bonnes nouvelles sont qu&rsquo;elles n&rsquo;ont pas les mauvaises intentions et peuvent \u00eatre profil\u00e9es suffisamment pour confiner leur activit\u00e9. La mauvaise nouvelle, c&rsquo;est qu&rsquo;ils arrivent par vagues, souvent en \u00e9chappant les radars.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/space-invaders-consumer-grade-iot-enterprise\/\">Lire l&rsquo;article en entier<\/a><\/span><\/p>\n<p><em>Pour aider le personnel informatique d&rsquo;une entreprise \u00e0 faire face \u00e0 cette nouvelle vague nous avons publi\u00e9 le document suivant:\u00a0<a href=\"https:\/\/otalliance.org\/system\/files\/files\/initiative\/documents\/enterprise_iot_checklist.pdf\">The Enterprise IoT Security\u00a0 Checklist: Best Practices for Securing Consumer-Grade IoT in the Enterprise<\/a><\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>J&rsquo;aimais bien le jeux de Space Invaders &#8211; des vagues d&rsquo;assaillants ennemis arrivaient de plus en plus vite pendant que vous essayiez de d\u00e9fendre votre base. Avec l&rsquo;exp\u00e9rience, vous pouvez apprendre leurs tactiques et devenir assez habile pour les arr\u00eater. Pour le personnel informatique d&rsquo;entreprise d&rsquo;aujourd&rsquo;hui, per\u00e7oivent les p\u00e9riph\u00e9riques IdO grand public certainement comme ces [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":77933,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,170,156,4909],"tags":[6247,4648,2795],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4221],"class_list":["post-77938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-confidentialite","category-iot-fr","category-renforcer-internet","tag-internet-des-objets-ido","tag-online-trust-alliance-fr","tag-ota-fr","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",1280,854,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-768x512.jpg",768,512,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",1280,854,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",1280,854,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",600,400,false]},"uagb_author_info":{"display_name":"Jeff Wilbur","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/wilbur\/"},"uagb_comment_info":0,"uagb_excerpt":"J&rsquo;aimais bien le jeux de Space Invaders &#8211; des vagues d&rsquo;assaillants ennemis arrivaient de plus en plus vite pendant que vous essayiez de d\u00e9fendre votre base. Avec l&rsquo;exp\u00e9rience, vous pouvez apprendre leurs tactiques et devenir assez habile pour les arr\u00eater. Pour le personnel informatique d&rsquo;entreprise d&rsquo;aujourd&rsquo;hui, per\u00e7oivent les p\u00e9riph\u00e9riques IdO grand public certainement comme ces\u2026","authors":[{"term_id":4221,"user_id":43,"is_guest":0,"slug":"wilbur","display_name":"Jeff Wilbur","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Jeff-Wilbur.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Jeff-Wilbur.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/77938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=77938"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/77938\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/77933"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=77938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=77938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=77938"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=77938"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=77938"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=77938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}