{"id":41103,"date":"2018-04-10T10:57:49","date_gmt":"2018-04-10T08:57:49","guid":{"rendered":"https:\/\/www.retarus.com\/fr\/protect-your-company-now\/"},"modified":"2023-11-23T13:27:52","modified_gmt":"2023-11-23T12:27:52","slug":"protect-your-company-now","status":"publish","type":"lp","link":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/","title":{"rendered":"Prot\u00e9gez votre entreprise. D\u00e8s maintenant."},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure\u2026","protected":false},"author":3,"featured_media":41113,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section fb_built=\"1\" custom_padding_last_edited=\"on|desktop\" module_id=\"email-sec-lp\" _builder_version=\"3.22\" custom_padding=\"|-110px||\" custom_padding_tablet=\"50px||50px|\" custom_padding_phone=\"\"][et_pb_row module_class=\"url_link\" _builder_version=\"3.25\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Language link\" _builder_version=\"3.27.4\"]FR<\/a>\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.25\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_css_after=\"#post-40322 .et_pb_section .et_pb_column_1_3{ margin-right: 0; }\" custom_padding__hover=\"|||\"][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][et_pb_text admin_label=\"Die 10 peinlichsten E-Mail Security Pannen\" _builder_version=\"4.8.1\"]

Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants<\/h1>[\/et_pb_text][et_pb_video src=\"https:\/\/youtu.be\/6EVy1W6u1fQ\" admin_label=\"Video 10\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#10\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a010<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Hackern\" _builder_version=\"4.8.1\"]

Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers.
Ch\u00f4mage technique pour tout le monde.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"ATP\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers. Avec Retarus Advanced Threat Protection, les fichiers suspects en pi\u00e8ces jointes sont, entre autres, ex\u00e9cut\u00e9s sur une machine virtuelle et leur comportement est \u00e9valu\u00e9. Apr\u00e8s ce processus de Sandboxing,<\/a> les e-mails identifi\u00e9s comme \u00e9tant infect\u00e9s sont supprim\u00e9s ou mis en quarantaine. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne et comment augmenter votre niveau de protection avec Retarus Advanced Threat Protection.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/_J23U7looLo\" admin_label=\"Video 9\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#9\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a09<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Der CSO hat die Ransomware\" _builder_version=\"4.8.1\"]

Le responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d'information ouvre un ransomware contenu dans la pi\u00e8ce jointe.
Tous les ordinateurs sont verrouill\u00e9s.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"Kann jedem mal passieren\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Cela peut arriver \u00e0 tout le monde. Mais il faut absolument l'\u00e9viter. Il est donc indispensable d'\u00e9viter de telles attaques d\u00e8s le d\u00e9but. Par exemple, en utilisant Retarus Attachment Blocker<\/a>, qui emp\u00eache l'ouverture de pi\u00e8ces jointes pr\u00e9alablement d\u00e9finies. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/sWnPnRdd6Pg\" admin_label=\"Video 8\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#8\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a08<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Chef-Trick\" _builder_version=\"3.27.4\"]

Le directeur financier tombe dans le \u00ab\u00a0pi\u00e8ge du patron\u00a0\u00bb.\r\nVingt mille dollars envol\u00e9s.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Kein Wunder!\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Rien d'\u00e9tonnant\u00a0! Les auteurs d'attaque de Spear-Phishing recueillent des informations sur leurs victimes afin de les persuader de transf\u00e9rer de l'argent par e-mail. Retarus CxO Fraud Detection<\/a> d\u00e9tecte les adresses d'exp\u00e9diteurs usurp\u00e9es et met en quarantaine ces messages frauduleux. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/6W2nwSOOD_A\" admin_label=\"Video 7\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#7\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a07<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Admin\" _builder_version=\"4.8.1\" hover_enabled=\"0\" sticky_enabled=\"0\"]

L'administrateur estime qu'un scanner antivirus est suffisant.
Tous les ordinateurs sont infect\u00e9s.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"Rund 270 neue Virenvarianten\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Chaque jour, environ 322\u00a0000\u00a0nouvelles variantes de virus informatiques voient le jour. C'est pourquoi il est utile de contr\u00f4ler les messages entrants avec tous les moyens disponibles. Retarus AntiVirus MultiScan<\/a> affiche des taux de d\u00e9tection bien plus \u00e9lev\u00e9s que les scanners conventionnels avec jusqu'\u00e0 quatre moteurs. Retarus utilise \u00e9galement le Sandboxing et des m\u00e9thodes d'analyse brevet\u00e9es pour assurer la protection contre des logiciels malveillants encore inconnus. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/KycoaWM4zaw\" admin_label=\"Video 6\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#6\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a06<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Scanner\" _builder_version=\"3.27.4\"]

Malgr\u00e9 le scanner, un virus s'introduit dans le r\u00e9seau.\r\nUn an plus tard, le virus se propage.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Schadprogramme\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

M\u00eame les meilleurs scanners antivirus ne reconnaissent pas les programmes malveillants lorsque ceux-ci sont nouveaux. Retarus Patient Zero Detection<\/a> vous met donc en garde contre les logiciels malveillants et le phishing, m\u00eame quand les e-mails ont d\u00e9j\u00e0 \u00e9t\u00e9 livr\u00e9s. Et PZD Real Time Response peut m\u00eame les supprimer automatiquement des bo\u00eetes de messagerie avant qu'il ne soit trop tard. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/uDnLAeKg0Dw\" admin_label=\"Video 5\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#5\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a05<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Kunden fl\u00f6ten\" _builder_version=\"3.27.4\"]

D'abord, les donn\u00e9es client disparaissent.\r\nPuis ce sont les clients.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Datenbanken\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Gr\u00e2ce au phishing, les hackers obtiennent d'abord les donn\u00e9es d'acc\u00e8s personnelles, puis acc\u00e8dent aux donn\u00e9es et syst\u00e8mes sensibles. Il faut alors emp\u00eacher vos employ\u00e9s d'acc\u00e9der directement aux pages non fiables. Avec Retarus Time-of-Click Protection<\/a> , les adresses web contenues dans les e-mails sont contr\u00f4l\u00e9es en continu, les sites web suspects sont bloqu\u00e9s et vos employ\u00e9s sont imm\u00e9diatement avertis lorsqu'ils cliquent sur les liens suspects. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/Chm7ZNGHy1M\" admin_label=\"Video 4\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#4\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a04<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Top Secret\" _builder_version=\"3.27.4\"]

Des plans de conception top secret.\r\nD\u00e9sormais aux mains de la concurrence.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"DLP\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

La perte de plans ou de documents contractuels peut menacer l'existence des entreprises. Retarus Data Loss Prevention<\/a> emp\u00eache la fuite involontaire, en dehors du r\u00e9seau de l'entreprise, d'informations confidentielles telles que les donn\u00e9es relatives aux clients, aux finances ou \u00e0 la conception. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/akS_T5sGTd8\" admin_label=\"Video 3\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#3\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a03<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Einkaufchef\" _builder_version=\"3.27.4\"]

Le responsable des achats mord \u00e0 l'hame\u00e7on du phishing.\r\nLe compte bancaire de l'entreprise est vid\u00e9.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Phishing\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Gr\u00e2ce au phishing, les hackers obtiennent des donn\u00e9es d'acc\u00e8s personnelles. Il faut alors emp\u00eacher vos employ\u00e9s d'acc\u00e9der directement aux pages non fiables. Avec Retarus Time-of-Click Protection<\/a> , les adresses web contenues dans les e-mails sont contr\u00f4l\u00e9es en continu, les sites web suspects sont bloqu\u00e9s et les utilisateurs sont imm\u00e9diatement avertis lorsqu'ils cliquent sur des liens suspects. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/XM3WPHiPMDM\" admin_label=\"Video 2\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#2\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a02<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Asian Office\" _builder_version=\"3.27.4\"]

Des donn\u00e9es confidentielles envoy\u00e9es aux bureaux asiatiques.\r\nIl n'y a pas de bureaux asiatiques.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Domain-Spoofing\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Les auteurs d'attaques de phishing usurpent des identit\u00e9s dignes de confiance afin d'obtenir des donn\u00e9es sensibles. Gr\u00e2ce aux fonctionnalit\u00e9s de\u00a0 Retarus Advanced Threat Protection<\/a> , emp\u00eachez vos utilisateurs de tomber dans le panneau. Des algorithmes sp\u00e9ciaux d\u00e9tectent le \u00ab\u00a0From-Spoofing\u00a0\u00bb et le \u00ab\u00a0Domain-Spoofing\u00a0\u00bb et identifient ainsi les adresses d'exp\u00e9diteur usurp\u00e9es. Les e-mails frauduleux sont ainsi mis en quarantaine ou supprim\u00e9s imm\u00e9diatement. Nous serions heureux de vous expliquer en personne<\/a> comment cela fonctionne.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/6eXiPAxCXhg\" admin_label=\"Video 1\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#1\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N\u00b0\u00a01<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Datenklau\" _builder_version=\"4.8.1\"]

Deux jours de panne totale.\r\n\r\nEt une r\u00e9putation endommag\u00e9e.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"Email Infrastruktur\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Il existe de nombreuses raisons d'adopter une vision globale de la s\u00e9curit\u00e9 de votre infrastructure de messagerie et de la consolider. Malheureusement, lorsque celles-ci deviennent apparentes, il est souvent d\u00e9j\u00e0 trop tard. La solution innovante Retarus Secure Email Platform<\/a> vous permet d'\u00e9viter cette situation et d'assurer en permanence le bon fonctionnement de la communication. Contactez-nous<\/a> pour d\u00e9couvrir l'offre r\u00e9pondant le mieux aux besoins de communication de votre entreprise.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_blurb use_icon=\"on\" font_icon=\"%%519%%\" icon_color=\"#16a086\" use_icon_font_size=\"on\" icon_font_size=\"105\" _builder_version=\"3.0.106\" header_font_size=\"16\" animation=\"off\"][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][et_pb_text admin_label=\"Sch\u00fctzen Sie Ihr Unternehmen\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"3.27.4\" text_font_size=\"18px\"]

Prot\u00e9gez votre entreprise. D\u00e8s maintenant.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Contact Form\" module_id=\"contactform\" module_class=\"cc-seccomp \" _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" module_alignment=\"left\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" use_border_color=\"off\"][gravityform id=\"24\" title=\"false\" description=\"false\" ajax=\"true\"]\r\n[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|on\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" disabled=\"on\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_image src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/0-email-fails.jpg\" align_tablet=\"center\" align_phone=\"\" align_last_edited=\"on|desktop\" _builder_version=\"3.23\" always_center_on_mobile=\"on\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|on\" _builder_version=\"3.25\" background_color=\"#efefef\" disabled=\"on\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text _builder_version=\"3.27.4\" text_text_color=\"#16a086\"]

Prot\u00e9gez votre entreprise. D\u00e8s maintenant.<\/h2>\r\n[\/et_pb_text][et_pb_text admin_label=\"Contact Form\" module_id=\"contactform\" _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" background_layout=\"dark\" module_alignment=\"left\" use_border_color=\"off\"][content type=contblock name=general-contact-form]\r\n[\/et_pb_text][et_pb_divider show_divider=\"off\" disabled_on=\"on|on|off\" _builder_version=\"3.23.4\" height=\"10px\" hide_on_mobile=\"on\"][\/et_pb_divider][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","footnotes":""},"categories":[2579,2],"tags":[],"class_list":["post-41103","lp","type-lp","status-publish","has-post-thumbnail","hentry","category-campaign","category-security"],"acf":[],"yoast_head":"\nProt\u00e9gez votre entreprise - Email Security de Retarus<\/title>\n<meta name=\"description\" content=\"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prot\u00e9gez votre entreprise - Email Security de Retarus\" \/>\n<meta property=\"og:description\" content=\"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus France\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-23T12:27:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Prot\u00e9gez votre entreprise - Email Security de Retarus\" \/>\n<meta name=\"twitter:description\" content=\"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/\",\"url\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/\",\"name\":\"Prot\u00e9gez votre entreprise - Email Security de Retarus\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png\",\"datePublished\":\"2018-04-10T08:57:49+00:00\",\"dateModified\":\"2023-11-23T12:27:52+00:00\",\"description\":\"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png\",\"contentUrl\":\"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png\",\"width\":1250,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prot\u00e9gez votre entreprise. D\u00e8s maintenant.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/fr\/#website\",\"url\":\"https:\/\/www.retarus.com\/fr\/\",\"name\":\"Retarus France\",\"description\":\"Just another Retarus Global Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Prot\u00e9gez votre entreprise - Email Security de Retarus","description":"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/","og_locale":"fr_FR","og_type":"article","og_title":"Prot\u00e9gez votre entreprise - Email Security de Retarus","og_description":"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.","og_url":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/","og_site_name":"Retarus France","article_modified_time":"2023-11-23T12:27:52+00:00","og_image":[{"width":1250,"height":500,"url":"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Prot\u00e9gez votre entreprise - Email Security de Retarus","twitter_description":"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/","url":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/","name":"Prot\u00e9gez votre entreprise - Email Security de Retarus","isPartOf":{"@id":"https:\/\/www.retarus.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png","datePublished":"2018-04-10T08:57:49+00:00","dateModified":"2023-11-23T12:27:52+00:00","description":"Les 10 incidents de s\u00e9curit\u00e9 de la messagerie les plus embarrassants!. N\u00b0 10\u00a0: Une infrastructure informatique compl\u00e8tement paralys\u00e9e par des hackers. Ch\u00f4mage technique pour tout le monde. Prot\u00e9gez votre infrastructure contre les attaques malveillantes de plus en plus sophistiqu\u00e9es des hackers.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#primaryimage","url":"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png","contentUrl":"https:\/\/www.retarus.com\/fr\/wp-content\/uploads\/sites\/14\/2018\/04\/email-security-fails10.png","width":1250,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/fr\/lp\/protect-your-company-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Prot\u00e9gez votre entreprise. D\u00e8s maintenant."}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/fr\/#website","url":"https:\/\/www.retarus.com\/fr\/","name":"Retarus France","description":"Just another Retarus Global Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/lp\/41103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/lp"}],"about":[{"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/types\/lp"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/comments?post=41103"}],"version-history":[{"count":13,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/lp\/41103\/revisions"}],"predecessor-version":[{"id":50149,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/lp\/41103\/revisions\/50149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/media\/41113"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/media?parent=41103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/categories?post=41103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/fr\/wp-json\/wp\/v2\/tags?post=41103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}