{"id":3072,"date":"2025-06-20T12:44:30","date_gmt":"2025-06-20T12:44:30","guid":{"rendered":"https:\/\/phishia.fr\/?p=3072"},"modified":"2025-11-21T15:10:23","modified_gmt":"2025-11-21T15:10:23","slug":"the-most-common-cyberattack-scenarios-for-smes","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/the-most-common-cyberattack-scenarios-for-smes\/","title":{"rendered":"The most common cyberattack scenarios for SMEs"},"content":{"rendered":"<h2 class=\"wp-block-heading\"><strong>Why have SMEs become prime targets for cyber attacks?<\/strong><\/h2>\n\n\n\n<p>Today, small and medium-sized businesses are on the front line when it comes to cyber threats. Long neglected in favor of larger organizations, they have now become prime targets for cybercriminals. With little protection, no dedicated cybersecurity team and often obsolete systems, they are easy prey.<\/p>\n\n\n\n<p>According to ANSSI, almost one in two cyber attacks in France targets an SME. According to a Hiscox 2024 study, one in five SMEs has already suffered a successful attack, and the average cost of an incident exceeds 50,000 euros, not counting operating losses and reputational impact. The explosion in \"kit\" malware, the spread of teleworking and the growing complexity of information systems all contribute to this vulnerability.<\/p>\n\n\n\n<p>Faced with this reality, constant monitoring and immediate reaction capability are essential. This is precisely the role of Phishia's managed SOC (Security Operations Center): to offer SMBs continuous, expert, tailored protection, without mobilizing inordinate internal resources. Here's how we deal with the most common threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing: a daily threat that exploits trust<\/strong><\/h2>\n\n\n\n<p>Phishing is one of the most widespread attacks. By imitating a legitimate communication (email, SMS, call), the attacker attempts to obtain a password, embezzle funds or infiltrate the system.<\/p>\n\n\n\n<p>In SMEs, where procedures are often more flexible, these attacks regularly succeed. A simple false e-mail from the manager can be enough to provoke a fraudulent transfer or the disclosure of sensitive identifiers.<\/p>\n\n\n\n<p>Phishia's SOC intervenes upstream: intelligent filtering, behavioral detection and simulation campaigns enable us to anticipate risks. In the event of an incident, the message is quarantined, an alert is issued, and our team initiates a rapid response: blocking access, checking connections and tracing actions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ransomware: a company paralyzed in minutes<\/strong><\/h2>\n\n\n\n<p>Ransomware encrypts company files and blocks access to them. A ransom is then demanded, usually in cryptocurrency, with no guarantee of data recovery.<\/p>\n\n\n\n<p>These attacks proliferate via booby-trapped attachments, software vulnerabilities or insecure remote connections. Without isolated, reliable backups, a company can be forced to shut down completely.<\/p>\n\n\n\n<p>Phishia's SOC monitors information systems in real time for characteristic signals: massive encryption, unusual transfers, suspicious processes. As soon as any behavior is detected, the machine is isolated, the data secured if possible, and the investigation launched to neutralize the threat and identify its origin.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Social engineering: cybersecurity starts with people<\/strong><\/h2>\n\n\n\n<p>Social engineering is based on psychological manipulation. The attacker poses as a colleague, customer or service provider in order to obtain information or access.<\/p>\n\n\n\n<p>Telecommuting, outsourcing and operational urgency make employees more vulnerable to these tactics. A simple, well-executed call can be enough to obtain a password or the transfer of confidential files.<\/p>\n\n\n\n<p>The SOC detects these indirect intrusions by analyzing abnormal behavior: unusual connections, unauthorized access, geographical inconsistencies. We reinforce controls for all sensitive applications, and support companies in raising awareness among their teams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Software vulnerabilities: silent entry points<\/strong><\/h2>\n\n\n\n<p>Cyber attacks often exploit known vulnerabilities in non-updated software. These vulnerabilities, once detected by the attackers, are used to infiltrate without warning.<\/p>\n\n\n\n<p>Many SMEs struggle to keep their systems up to date, due to a lack of resources or technical support. This exposes them to invisible intrusions, sometimes lasting months.<\/p>\n\n\n\n<p>Phishia's SOC carries out regular vulnerability scans, classifies vulnerabilities according to their criticality, and issues clear recommendations. If we work with an IT service provider, we follow up on patches to ensure rapid, secure remediation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Compromised passwords: the most common vulnerability<\/strong><\/h2>\n\n\n\n<p>Cybercriminals often use credentials stolen in other hacks to gain access to business systems. If the passwords are reused or too simple, the intrusion becomes immediate.<\/p>\n\n\n\n<p>In SMEs, passwords are sometimes shared, not renewed, or stored in the clear. This practice leaves the organization highly exposed.<\/p>\n\n\n\n<p>Phishia's SOC continuously monitors compromised databases. If an identifier from your domain appears, an alert is sent. We also support the implementation of robust security rules: complex password, secure manager, multi-factor authentication (MFA).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion: continuous cybersecurity without complexity<\/strong><\/h2>\n\n\n\n<p>Digital threats are now a fact of life for even the smallest companies. A single click can be enough to compromise an entire organization. Faced with this permanent risk, it's no longer enough to install an antivirus or make a monthly backup: constant vigilance, adapted tools and active security management are required.<\/p>\n\n\n\n<p>That's what Phishia's managed SOC offers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>24\/7 threat monitoring,<\/strong><\/li>\n\n\n\n<li><strong>Intelligent detection of weak signals,<\/strong><\/li>\n\n\n\n<li><strong>Real-time reaction,<\/strong><\/li>\n\n\n\n<li><strong>Human, personalized and pragmatic support,<\/strong><\/li>\n\n\n\n<li><strong>Clear reporting for long-term safety management.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Phishia provides SMEs with a truly professional cybersecurity center, without having to internalize rare skills or mobilize disproportionate resources.<\/p>\n\n\n\n<p><strong>Do you want to secure your organization without complexity or extra cost?<\/strong><\/p>\n\n\n\n<p><br><strong><em><a href=\"https:\/\/phishia.fr\/en\/contact\/\">contact us<\/a><\/em><\/strong> for a demonstration of our SOC and a free diagnosis of your exposure to cyber-risks.<\/p>","protected":false},"excerpt":{"rendered":"<p>Why have SMEs become prime targets for cyber attacks? Today, small and medium-sized businesses are on the front line when it comes to cyber threats. Long neglected in favor of larger organizations, they have now become prime targets for cybercriminals. Less protected, without dedicated cybersecurity teams and often equipped with obsolete systems, they represent the [...]<\/p>","protected":false},"author":1,"featured_media":3073,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-3072","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les sc\u00e9narios de cyberattaques les plus courants sur les PME - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/the-most-common-cyberattack-scenarios-for-smes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les sc\u00e9narios de cyberattaques les plus courants sur les PME - Phishia\" \/>\n<meta property=\"og:description\" content=\"Pourquoi les PME sont-elles devenues les cibles privil\u00e9gi\u00e9es des cyberattaques ? Les petites et moyennes entreprises se retrouvent aujourd\u2019hui en premi\u00e8re ligne face aux cybermenaces. Longtemps d\u00e9laiss\u00e9es au profit des grandes organisations, elles sont d\u00e9sormais devenues les cibles privil\u00e9gi\u00e9es des cybercriminels. Moins prot\u00e9g\u00e9es, sans \u00e9quipe cybers\u00e9curit\u00e9 d\u00e9di\u00e9e et souvent dot\u00e9es de syst\u00e8mes obsol\u00e8tes, elles repr\u00e9sentent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/the-most-common-cyberattack-scenarios-for-smes\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T12:44:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:10:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"Les sc\u00e9narios de cyberattaques les plus courants sur les PME\",\"datePublished\":\"2025-06-20T12:44:30+00:00\",\"dateModified\":\"2025-11-21T15:10:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/\"},\"wordCount\":1055,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/\",\"name\":\"Les sc\u00e9narios de cyberattaques les plus courants sur les PME - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png\",\"datePublished\":\"2025-06-20T12:44:30+00:00\",\"dateModified\":\"2025-11-21T15:10:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png\",\"width\":1024,\"height\":1536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Les sc\u00e9narios de cyberattaques les plus courants sur les PME\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The most common cyber attack scenarios for SMEs - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/the-most-common-cyberattack-scenarios-for-smes\/","og_locale":"en_US","og_type":"article","og_title":"Les sc\u00e9narios de cyberattaques les plus courants sur les PME - Phishia","og_description":"Pourquoi les PME sont-elles devenues les cibles privil\u00e9gi\u00e9es des cyberattaques ? Les petites et moyennes entreprises se retrouvent aujourd\u2019hui en premi\u00e8re ligne face aux cybermenaces. Longtemps d\u00e9laiss\u00e9es au profit des grandes organisations, elles sont d\u00e9sormais devenues les cibles privil\u00e9gi\u00e9es des cybercriminels. Moins prot\u00e9g\u00e9es, sans \u00e9quipe cybers\u00e9curit\u00e9 d\u00e9di\u00e9e et souvent dot\u00e9es de syst\u00e8mes obsol\u00e8tes, elles repr\u00e9sentent [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/the-most-common-cyberattack-scenarios-for-smes\/","og_site_name":"Phishia","article_published_time":"2025-06-20T12:44:30+00:00","article_modified_time":"2025-11-21T15:10:23+00:00","og_image":[{"width":1024,"height":1536,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png","type":"image\/png"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"Les sc\u00e9narios de cyberattaques les plus courants sur les PME","datePublished":"2025-06-20T12:44:30+00:00","dateModified":"2025-11-21T15:10:23+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/"},"wordCount":1055,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png","articleSection":["Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/","name":"The most common cyber attack scenarios for SMEs - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png","datePublished":"2025-06-20T12:44:30+00:00","dateModified":"2025-11-21T15:10:23+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1443_PME-et-Code-Informatique_simple_compose_01jy6nqn8recxv3750pztkw26p.png","width":1024,"height":1536},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-scenarios-de-cyberattaques-les-plus-courants-sur-les-pme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Les sc\u00e9narios de cyberattaques les plus courants sur les PME"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=3072"}],"version-history":[{"count":1,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3072\/revisions"}],"predecessor-version":[{"id":3074,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3072\/revisions\/3074"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/3073"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=3072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=3072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=3072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}