
{"id":1839,"date":"2021-07-21T03:18:21","date_gmt":"2021-07-21T01:18:21","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=1839"},"modified":"2022-09-21T11:50:16","modified_gmt":"2022-09-21T09:50:16","slug":"securite-informatique-comment-proteger-sa-messagerie-electronique","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/","title":{"rendered":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"662\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/image-24.png\" alt=\"\" class=\"wp-image-1840\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/image-24.png 1024w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/image-24-300x194.png 300w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/image-24-768x497.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>D\u00e9sormais, nous envoyons et recevons plusieurs dizaines de courriers \u00e9lectroniques chaque jour. Si les mails ont remplac\u00e9 peu \u00e0 peu les lettres manuscrites, il est important de savoir comment s\u00e9curiser sa messagerie pour \u00e9viter les d\u00e9rives. Nous vous livrons quelques astuces pour savoir comment assurer la s\u00e9curit\u00e9 de vos emails.<\/strong><\/p>\n\n\n\n<p>Moyen de communication par excellence, l&rsquo;envoi d&#8217;emails n&rsquo;est toutefois pas sans risque&nbsp;: par le biais de messages \u00e9lectroniques, des personnes malveillantes peuvent r\u00e9ussir \u00e0 r\u00e9cup\u00e9rer certaines de nos informations confidentielles telles que des codes d&rsquo;acc\u00e8s ou encore des informations bancaires.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Qu&rsquo;est-ce que la s\u00e9curit\u00e9 d&rsquo;une messagerie \u00e9lectronique&nbsp;?<\/h2>\n\n\n\n<p>La s\u00e9curit\u00e9 de la bo\u00eete \u00e9lectronique se situe d&rsquo;une part du c\u00f4t\u00e9 du contenu des emails, mais aussi au niveau des comptes que nous utilisons pour nous connecter.<\/p>\n\n\n\n<p>Contrairement aux id\u00e9es re\u00e7ues, la s\u00e9curisation de nos courriers \u00e9lectroniques ne s&rsquo;arr\u00eate pas \u00e0 l&rsquo;authentification du compte de votre bo\u00eete mail&nbsp;<em>via<\/em>&nbsp;un&nbsp;mot de passe. D&rsquo;autres \u00e9l\u00e9ments comme le contenu du message ou l&rsquo;identit\u00e9 de l&rsquo;exp\u00e9diteur peuvent \u00e9galement \u00eatre valid\u00e9s et s\u00e9curis\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quelles tentatives d&rsquo;attaques pour ma messagerie&nbsp;?<\/h2>\n\n\n\n<p>En mati\u00e8re de cyber malveillance, on parle souvent d&rsquo;hame\u00e7onnage (ou&nbsp;<em>phishing<\/em>&nbsp;en anglais). Cette technique frauduleuse vise \u00e0 leurrer l&rsquo;internaute en se faisant passer pour un tiers de confiance afin de l&rsquo;inciter \u00e0 communiquer ses donn\u00e9es personnelles ou bancaires. Les spams, les hoax, les&nbsp;virus et malwares&nbsp;sont des menaces tout aussi redout\u00e9es par les utilisateurs de messagerie \u00e9lectronique.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.futura-sciences.com\/buildsv6\/images\/mediumoriginal\/a\/6\/3\/a6325bafb3_50178601_se-curite-informatique.jpg\" alt=\"Face aux nombreuses menaces informatiques, mieux vaut savoir s\u00e9curiser sa messagerie \u00e9lectronique. \u00a9 FLY:D, Unsplash\"\/><figcaption><strong>Face aux nombreuses menaces informatiques, mieux vaut savoir s\u00e9curiser sa messagerie \u00e9lectronique. \u00a9 FLY:D, Unsplash<\/strong>&nbsp;<br><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Comment s\u00e9curiser ses messages \u00e9lectroniques&nbsp;?<\/h2>\n\n\n\n<p>Si votre bo\u00eete mail n&rsquo;est pas s\u00e9curis\u00e9e, vous vous exposez \u00e0 des risques comme une fraude bancaire, un vol d&rsquo;identit\u00e9 ou m\u00eame un&nbsp;piratage de vos donn\u00e9es. Il est d\u2019ailleurs conseill\u00e9 de mettre en place une solution de protection de la messagerie \u00e9lectronique, comme Altospam, qui permet de filtrer vos mails en amont.<\/p>\n\n\n\n<p>Pour booster la s\u00e9curit\u00e9 de votre messagerie \u00e9lectronique, voici quelques conseils&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>optez pour un mot de passe robuste afin de mieux s\u00e9curiser l&rsquo;acc\u00e8s \u00e0 votre compte de messagerie. L&rsquo;id\u00e9al&nbsp;? Un m\u00e9lange de lettres, de chiffres, de majuscules\/minuscules et de symboles ;<\/li><li>soyez toujours vigilant \u00e0 la r\u00e9ception de nouveaux mails. M\u00eame si vous connaissez l&rsquo;exp\u00e9diteur, gardez toujours un \u0153il ouvert&nbsp;: il se peut que son compte messagerie ait \u00e9t\u00e9 lui-m\u00eame pirat\u00e9 ;<\/li><li>veillez \u00e0 utiliser des adresses mail diff\u00e9rentes afin de s\u00e9parer vos activit\u00e9s professionnelles et personnelles ;<\/li><li>peu importe l&rsquo;\u00e9metteur du message, ne r\u00e9pondez jamais \u00e0 une demande d&rsquo;informations confidentielles par mail ;<\/li><li>dans vos emails, ne cliquez pas sur des liens qui ne vous inspirent pas confiance ;<\/li><li>m\u00e9fiez-vous des pi\u00e8ces jointes \u00e0 vos messages, elles pourraient renfermer&nbsp;des virus&nbsp;ou m\u00eame des logiciels espions. En cas de doute, ne les ouvrez pas et supprimez le courrier ;<\/li><li>ne r\u00e9pondez jamais aux emails de type pyramide financi\u00e8re ou encore cha\u00eene porte-bonheur. Il s&rsquo;agit souvent de tentatives d&rsquo;escroquerie.<\/li><\/ul>\n\n\n\n<p>S\u00e9curiser sa messagerie \u00e9lectronique&nbsp;? Une \u00e9tape indispensable lorsque l&rsquo;on souhaite prot\u00e9ger efficacement ses donn\u00e9es personnelles. En plus de renforcer son mot de place, il est recommand\u00e9 de rester vigilant \u00e0 la r\u00e9ception de&nbsp;chaque nouvel email&nbsp;afin d&rsquo;\u00e9viter les tentatives d&rsquo;intrusion.<\/p>\n\n\n\n<p>Avec Futura<\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9sormais, nous envoyons et recevons plusieurs dizaines de courriers \u00e9lectroniques chaque jour. Si les mails ont remplac\u00e9 peu \u00e0 peu les lettres manuscrites, il est important de savoir comment s\u00e9curiser [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1842,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,71,195,11],"tags":[],"class_list":["post-1839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-astuce","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ? - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?\" \/>\n<meta property=\"og:description\" content=\"D\u00e9sormais, nous envoyons et recevons plusieurs dizaines de courriers \u00e9lectroniques chaque jour. Si les mails ont remplac\u00e9 peu \u00e0 peu les lettres manuscrites, il est important de savoir comment s\u00e9curiser sa messagerie pour \u00e9viter les d\u00e9rives. Nous vous livrons quelques astuces pour savoir comment assurer la s\u00e9curit\u00e9 de vos emails.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-21T01:18:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-21T09:50:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?\" \/>\n<meta name=\"twitter:description\" content=\"D\u00e9sormais, nous envoyons et recevons plusieurs dizaines de courriers \u00e9lectroniques chaque jour. Si les mails ont remplac\u00e9 peu \u00e0 peu les lettres manuscrites, il est important de savoir comment s\u00e9curiser sa messagerie pour \u00e9viter les d\u00e9rives. Nous vous livrons quelques astuces pour savoir comment assurer la s\u00e9curit\u00e9 de vos emails.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/social.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?\",\"datePublished\":\"2021-07-21T01:18:21+00:00\",\"dateModified\":\"2022-09-21T09:50:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/\"},\"wordCount\":616,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/at-24.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Astuce\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/\",\"name\":\"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ? - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/at-24.jpg\",\"datePublished\":\"2021-07-21T01:18:21+00:00\",\"dateModified\":\"2022-09-21T09:50:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/at-24.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/at-24.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/07\\\/21\\\/securite-informatique-comment-proteger-sa-messagerie-electronique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ? - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?","og_description":"D\u00e9sormais, nous envoyons et recevons plusieurs dizaines de courriers \u00e9lectroniques chaque jour. Si les mails ont remplac\u00e9 peu \u00e0 peu les lettres manuscrites, il est important de savoir comment s\u00e9curiser sa messagerie pour \u00e9viter les d\u00e9rives. Nous vous livrons quelques astuces pour savoir comment assurer la s\u00e9curit\u00e9 de vos emails.","og_url":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-07-21T01:18:21+00:00","article_modified_time":"2022-09-21T09:50:16+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/social.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?","twitter_description":"D\u00e9sormais, nous envoyons et recevons plusieurs dizaines de courriers \u00e9lectroniques chaque jour. Si les mails ont remplac\u00e9 peu \u00e0 peu les lettres manuscrites, il est important de savoir comment s\u00e9curiser sa messagerie pour \u00e9viter les d\u00e9rives. Nous vous livrons quelques astuces pour savoir comment assurer la s\u00e9curit\u00e9 de vos emails.","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/social.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?","datePublished":"2021-07-21T01:18:21+00:00","dateModified":"2022-09-21T09:50:16+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/"},"wordCount":616,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/at-24.jpg","articleSection":["Actualit\u00e9","Astuce","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/","url":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/","name":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ? - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/at-24.jpg","datePublished":"2021-07-21T01:18:21+00:00","dateModified":"2022-09-21T09:50:16+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/at-24.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/07\/at-24.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/07\/21\/securite-informatique-comment-proteger-sa-messagerie-electronique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 informatique : Comment prot\u00e9ger sa messagerie \u00e9lectronique ?"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=1839"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1839\/revisions"}],"predecessor-version":[{"id":3491,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1839\/revisions\/3491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/1842"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=1839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=1839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=1839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}