{"id":3872,"date":"2025-11-25T13:41:27","date_gmt":"2025-11-25T13:41:27","guid":{"rendered":"https:\/\/phishia.fr\/?p=3872"},"modified":"2025-12-11T01:07:53","modified_gmt":"2025-12-11T01:07:53","slug":"protecting-workstations-and-infrastructure-a-vital-challenge-for-hospitals-and-healthcare-associations","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/protecting-workstations-and-infrastructure-a-vital-challenge-for-hospitals-and-healthcare-associations\/","title":{"rendered":"Protecting workstations and infrastructure: a vital challenge for hospitals and healthcare associations"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3872\" class=\"elementor elementor-3872\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1117903 e-flex e-con-boxed e-con e-parent\" data-id=\"1117903\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9edc2cf elementor-widget elementor-widget-text-editor\" data-id=\"9edc2cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a hospital or healthcare association, everything now depends on the information system: patient records, admissions, pharmacy, imaging, payroll, team coordination...<\/p><p>When ransomware encrypts servers or a simple workstation is used as an entry point for an attacker,\u00a0<strong>continuity of care is at stake<\/strong>.<\/p><p>That's why\u00a0<strong>workstations<\/strong>\u00a0(PCs, clinical workstations, laptops) and\u00a0<strong>\u201cthe \u201dmachines\" that run them<\/strong>\u00a0(servers, network, storage) has become a strategic issue, not just an IT one.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a04d24 e-flex e-con-boxed e-con e-parent\" data-id=\"6a04d24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15fe91a elementor-widget elementor-widget-heading\" data-id=\"15fe91a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Why substations and infrastructures are at the heart of risk<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2965720 e-flex e-con-boxed e-con e-parent\" data-id=\"2965720\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f384fbc elementor-widget elementor-widget-text-editor\" data-id=\"f384fbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Almost all recent attacks in the healthcare sector follow the same pattern:<\/p>\n<p>A\u00a0<strong>user station<\/strong>\u00a0is compromised (mail bomb, website bomb, USB key).<\/p>\n<p>The attacker recovers\u00a0<strong>identifiers<\/strong>, is on the rise, reaching the\u2019<strong>directory<\/strong>\u00a0and servers.<\/p>\n<p>It encrypts or steals data, shuts down critical applications and blocks hospitals.<\/p>\n<p>In other words:<\/p>\n<ul>\n<li>the\u00a0<strong>workstation<\/strong>\u00a0is the front door,<\/li>\n<li>l\u2019<strong>infrastructure<\/strong>\u00a0is the final target.<\/li>\n<\/ul>\n<p>Strengthening these two levels means reducing the risk of mass blockages in a very tangible way.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca2b2b9 e-flex e-con-boxed e-con e-parent\" data-id=\"ca2b2b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2771a4 elementor-widget elementor-widget-heading\" data-id=\"c2771a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. The right reflexes for safe workstations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5512d2 e-flex e-con-boxed e-con e-parent\" data-id=\"a5512d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d50a800 elementor-widget elementor-widget-text-editor\" data-id=\"d50a800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"102\">Here, the idea is to build a <strong data-start=\"33\" data-end=\"74\">a simple, homogeneous and controllable base<\/strong> for workstations.<\/p>\n<h5><b>Homogenous, controlled workstations<\/b><\/h5>\n<p data-start=\"143\" data-end=\"407\">We define a few <strong data-start=\"163\" data-end=\"184\">job profiles<\/strong> (nursing, administration, management...) who start from common images, with the same basic settings.<br data-start=\"286\" data-end=\"289\" \/>We take this opportunity to <strong data-start=\"308\" data-end=\"344\">remove unnecessary software<\/strong> which increase the attack surface and complicate management.<\/p>\n<p data-start=\"409\" data-end=\"509\">The more similar the positions, the easier it is to <strong data-start=\"463\" data-end=\"508\">manage, correct and monitor them<\/strong>.<\/p>\n<h5><b>Limited rights to limit damage<\/b><\/h5>\n<p data-start=\"565\" data-end=\"776\">Users stay on <strong data-start=\"598\" data-end=\"619\">standard accounts<\/strong>, without administrative rights on their workstations.<br data-start=\"665\" data-end=\"668\" \/>The technical teams use <strong data-start=\"713\" data-end=\"740\">separate admin accounts<\/strong>, only when necessary.<\/p>\n<p data-start=\"778\" data-end=\"903\">Thus, if a user account is stolen, the attacker cannot <strong data-start=\"844\" data-end=\"902\">take complete control of the station in just a few clicks<\/strong>.<\/p>\n<h5><b>Protect and detect on every workstation<\/b><\/h5>\n<p data-start=\"953\" data-end=\"1245\">Each station has a <strong data-start=\"979\" data-end=\"1020\">centrally managed antimalware<\/strong>.<br data-start=\"1021\" data-end=\"1024\" \/>When possible, we add a more advanced brick (EDR\/XDR type) that monitors machine behavior and sends alerts in the event of suspicious activity (massive encryption, unusual execution, etc.).<\/p>\n<p data-start=\"1247\" data-end=\"1310\">In practice, it's a <strong data-start=\"1269\" data-end=\"1309\">\u201calarm system\u201d for each station<\/strong>.<\/p>\n<h5><b>Keeping workstations up to date<\/b><\/h5>\n<p data-start=\"1347\" data-end=\"1452\">We set up a <strong data-start=\"1366\" data-end=\"1404\">regular updating process<\/strong> for the system and the main software :<\/p>\n<ul data-start=\"1453\" data-end=\"1535\">\n<li data-start=\"1453\" data-end=\"1494\">\n<p data-start=\"1455\" data-end=\"1494\">rapid tests on a small perimeter,<\/p>\n<\/li>\n<li data-start=\"1495\" data-end=\"1535\">\n<p data-start=\"1497\" data-end=\"1535\">then rolled out to the rest of the fleet.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1537\" data-end=\"1680\">It's hardly visible to users, but it's one of the most important <strong data-start=\"1598\" data-end=\"1628\">the most effective levers<\/strong> to close doors already known to attackers.<\/p>\n<h5><b>Protecting mobiles and data<\/b><\/h5>\n<p data-start=\"1730\" data-end=\"1899\">All laptops should have their own <strong data-start=\"1773\" data-end=\"1791\">encrypted disk<\/strong>.<br data-start=\"1792\" data-end=\"1795\" \/>In the event of loss or theft, this prevents a third party from directly retrieving patient data from the disk.<\/p>\n<h5><b>Training and coaching users<\/b><\/h5>\n<p data-start=\"1948\" data-end=\"2248\">Finally, the technical base is not enough without the right reflexes on the human side.<br data-start=\"2023\" data-end=\"2026\" \/>A <strong data-start=\"2041\" data-end=\"2090\">short, job-specific awareness-raising sessions<\/strong> (nurses, secretaries, managers, etc.) and <strong data-start=\"2133\" data-end=\"2164\">simulated mail bombs<\/strong> to anchor the right reactions: don't click, alert, pass on to support.<\/p>\n<p data-start=\"2250\" data-end=\"2380\" data-is-last-node=\"\" data-is-only-node=\"\">Together, they form a <strong data-start=\"2270\" data-end=\"2296\">workstation base<\/strong> both realistic for the field... and solid in the face of the most common attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6bf9db e-flex e-con-boxed e-con e-parent\" data-id=\"b6bf9db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fad420 elementor-widget elementor-widget-heading\" data-id=\"0fad420\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. The right reflexes for securing infrastructure (servers, network, etc.)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bd7ba6 e-flex e-con-boxed e-con e-parent\" data-id=\"2bd7ba6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e05384 elementor-widget elementor-widget-text-editor\" data-id=\"1e05384\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On the machine side, the aim is twofold:\u00a0<strong>making compromise more difficult<\/strong>\u00a0and\u00a0<strong>limit propagation<\/strong>\u00a0if something goes wrong.<\/p>\n<h5><strong>Active Directory expertise<\/strong><\/h5>\n<ul>\n<li>Separate administration accounts from \u201cday-to-day\u201d accounts.<\/li>\n<li>Limit the number of people with very high entitlements.<\/li>\n<li>Monitor sensitive operations (adding to admin groups, modifying policies, etc.).<\/li>\n<\/ul>\n<p>When the directory is compromised, everything else is within the attacker's reach: it deserves special attention.<\/p>\n<h5><strong>Segmented network<\/strong><\/h5>\n<ul>\n<li>Separate networks: users, servers, biomedical equipment, guests, etc.<\/li>\n<li>Instead of connecting everything to everything, authorize only the flows you need.<\/li>\n<\/ul>\n<p>The idea: if a workstation is infected, it should not be able to reach all critical servers in a matter of seconds.<\/p>\n<h5><strong>Hardened and monitored servers<\/strong><\/h5>\n<ul>\n<li>Apply consistent security settings on all servers (unnecessary services turned off, logs enabled, access filtered).<\/li>\n<li>Keep systems and technical components up to date.<\/li>\n<li>Centralize\u00a0<strong>newspapers<\/strong>\u00a0(logs) to identify abnormal activity.<\/li>\n<\/ul>\n<h5><strong>Reliable, isolated backups<\/strong><\/h5>\n<ul>\n<li>Backups\u00a0<strong>tested<\/strong>\u00a0regularly (to check that you really know how to restore).<\/li>\n<li>A portion of the backups are stored\u00a0<strong>isolated<\/strong>\u00a0from the network, so that ransomware doesn't encrypt them too.<\/li>\n<li>Clear prioritization: which systems to restore first to restart clinical activity.<\/li>\n<\/ul>\n<h5><strong>Supervision and reaction<\/strong><\/h5>\n<ul>\n<li>Gather logs from workstations, servers, firewalls, etc. in one place.<\/li>\n<li>Use a supervision center (internal or external) to analyze alerts.<\/li>\n<li>Documenting\u00a0<strong>response procedures<\/strong>\u00a0These include isolating a substation, cutting off a network segment, switching to downgraded mode and informing the authorities.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a876c3d e-flex e-con-boxed e-con e-parent\" data-id=\"a876c3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-344b078 elementor-widget elementor-widget-heading\" data-id=\"344b078\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. How Phishia helps hospitals and associations in concrete terms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0d01bb e-flex e-con-boxed e-con e-parent\" data-id=\"a0d01bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-073a59d elementor-widget elementor-widget-text-editor\" data-id=\"073a59d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishia acts as\u00a0<strong>partner in the field<\/strong>\u00a0to transform these principles into operational reality:<\/p>\n<ul>\n<li><strong>Targeted diagnosis<\/strong>\u00a0mapping of critical workstations, servers and workflows, and analysis of the most significant weaknesses.<\/li>\n<li><strong>Defining a realistic base<\/strong>\u00a0: workstation profiles, rights adjustment, update policy, simple but effective network segmentation.<\/li>\n<li><strong>Implementation support<\/strong>\u00a0Support for in-house teams and service providers to deploy measures without disrupting care.<\/li>\n<li><strong>Awareness-raising and exercises<\/strong>\u00a0These include e-mail attack simulation campaigns, crisis management exercises, and updates to BCP\/ERP plans to integrate these protections.<\/li>\n<\/ul>\n<div>\u00a0<\/div>\n<p>The aim is not to sell you yet another layer of technology, but to\u00a0<strong>build coherent, usable protection<\/strong>\u00a0with your means.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c6b90c e-flex e-con-boxed e-con e-parent\" data-id=\"8c6b90c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4009eb0 elementor-widget elementor-widget-heading\" data-id=\"4009eb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. What about your jobs and your infra?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd78b12 e-flex e-con-boxed e-con e-parent\" data-id=\"fd78b12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d95f161 elementor-widget elementor-widget-text-editor\" data-id=\"d95f161\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Do you manage a hospital, group or healthcare association and feel that your workstations or infrastructure are vulnerable?<br \/>Let's discuss it: in just a few discussions, we can identify your priorities and build a customized action plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In a hospital or healthcare association, everything now depends on the information system: patient records, admissions, pharmacy, imaging, payroll, team coordination... When ransomware encrypts servers or a simple workstation is used as an entry point by an attacker, continuity of care is at stake. This is why [...]<\/p>","protected":false},"author":3,"featured_media":3895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[28],"class_list":["post-3872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite","tag-sante"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/protecting-workstations-and-infrastructure-a-vital-challenge-for-hospitals-and-healthcare-associations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9 - Phishia\" \/>\n<meta property=\"og:description\" content=\"Dans un h\u00f4pital ou une association de sant\u00e9, tout d\u00e9pend d\u00e9sormais du syst\u00e8me d\u2019information : dossier patient, admissions, pharmacie, imagerie, paie, coordination des \u00e9quipes\u2026 Quand un ran\u00e7ongiciel chiffre les serveurs ou qu\u2019un simple poste de travail sert de porte d\u2019entr\u00e9e \u00e0 un attaquant,\u00a0c\u2019est la continuit\u00e9 des soins qui est en jeu. C\u2019est pour \u00e7a que [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/protecting-workstations-and-infrastructure-a-vital-challenge-for-hospitals-and-healthcare-associations\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-25T13:41:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T01:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Bannieres-YouTube-Protection-des-infrastructures-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9\",\"datePublished\":\"2025-11-25T13:41:27+00:00\",\"dateModified\":\"2025-12-11T01:07:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/\"},\"wordCount\":1144,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Bannieres-YouTube-Protection-des-infrastructures.png\",\"keywords\":[\"Sant\u00e9\"],\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/\",\"name\":\"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Bannieres-YouTube-Protection-des-infrastructures.png\",\"datePublished\":\"2025-11-25T13:41:27+00:00\",\"dateModified\":\"2025-12-11T01:07:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Bannieres-YouTube-Protection-des-infrastructures.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Bannieres-YouTube-Protection-des-infrastructures.png\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting workstations and infrastructure: a vital challenge for hospitals and healthcare associations - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/protecting-workstations-and-infrastructure-a-vital-challenge-for-hospitals-and-healthcare-associations\/","og_locale":"en_US","og_type":"article","og_title":"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9 - Phishia","og_description":"Dans un h\u00f4pital ou une association de sant\u00e9, tout d\u00e9pend d\u00e9sormais du syst\u00e8me d\u2019information : dossier patient, admissions, pharmacie, imagerie, paie, coordination des \u00e9quipes\u2026 Quand un ran\u00e7ongiciel chiffre les serveurs ou qu\u2019un simple poste de travail sert de porte d\u2019entr\u00e9e \u00e0 un attaquant,\u00a0c\u2019est la continuit\u00e9 des soins qui est en jeu. C\u2019est pour \u00e7a que [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/protecting-workstations-and-infrastructure-a-vital-challenge-for-hospitals-and-healthcare-associations\/","og_site_name":"Phishia","article_published_time":"2025-11-25T13:41:27+00:00","article_modified_time":"2025-12-11T01:07:53+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Bannieres-YouTube-Protection-des-infrastructures-1024x576.png","type":"image\/png"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9","datePublished":"2025-11-25T13:41:27+00:00","dateModified":"2025-12-11T01:07:53+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/"},"wordCount":1144,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Bannieres-YouTube-Protection-des-infrastructures.png","keywords":["Sant\u00e9"],"articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/","name":"Protecting workstations and infrastructure: a vital challenge for hospitals and healthcare associations - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Bannieres-YouTube-Protection-des-infrastructures.png","datePublished":"2025-11-25T13:41:27+00:00","dateModified":"2025-12-11T01:07:53+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Bannieres-YouTube-Protection-des-infrastructures.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Bannieres-YouTube-Protection-des-infrastructures.png","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/proteger-les-postes-de-travail-et-linfrastructure-un-enjeu-vital-pour-les-hopitaux-et-associations-de-sante\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"Prot\u00e9ger les postes de travail et l\u2019infrastructure : un enjeu vital pour les h\u00f4pitaux et associations de sant\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, Junior CyberSecurity Consultant"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=3872"}],"version-history":[{"count":8,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3872\/revisions"}],"predecessor-version":[{"id":3982,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3872\/revisions\/3982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/3895"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=3872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=3872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=3872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}