{"id":426,"date":"2025-01-28T16:36:26","date_gmt":"2025-01-28T16:36:26","guid":{"rendered":"https:\/\/phishia.fr\/?p=426"},"modified":"2025-11-21T15:05:36","modified_gmt":"2025-11-21T15:05:36","slug":"securing-premises","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/securing-premises\/","title":{"rendered":"Facility Security"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"h.sq8kz0oimq0a_l\">What is premises security?&nbsp;<\/h2>\n\n\n\n<p>Securing premises involves implementing physical security measures to protect facilities, property and people within a building or site. This typically includes the installation of locking devices, alarm systems, surveillance cameras, access controls and other security equipment.<\/p>\n\n\n\n<p>The aim of securing premises is to prevent intrusion, theft, vandalism and other harmful incidents. By implementing appropriate security measures, companies can reduce risks to staff and assets, protect the confidentiality of sensitive information and maintain business continuity.<\/p>\n\n\n\n<p>As part of securing premises, companies can implement a number of physical security measures. These can include installing heavy-duty locks on doors and windows, using alarm systems to detect intrusions and deter burglars, and installing surveillance cameras to monitor activities around the building. In addition, companies can opt for access controls such as identification badges, fingerprint readers or facial recognition systems to restrict access to sensitive areas to authorized persons only. Security measures can also include adequate exterior lighting to deter intruders and make vulnerable areas more visible.&nbsp;<\/p>\n\n\n\n<p>Strategies for securing premises vary according to the specific needs of each company and the level of risk to which they are exposed. A thorough risk assessment, followed by the implementation of appropriate security measures, is essential to ensure effective protection of premises and occupants.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.dkjvhd9ohcip_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>How does securing my premises secure my information system?&nbsp;<\/h2>\n\n\n\n<p>Securing the premises, an important part of the\u00a0<a href=\"\/en\/blog\/cybersecurity\/implementation-of-smsi\/\">ISO 27001 standard<\/a>contributes to the overall security of the information system in several ways:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Physical protection of equipment<\/li>\n<\/ol>\n\n\n\n<p>By preventing intrusions and securing premises, companies avoid the risk of theft or physical damage to IT equipment. This includes servers, computers, storage devices and other essential components of the IT infrastructure.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Preventing unauthorized access<\/li>\n<\/ol>\n\n\n\n<p>By implementing physical access controls, such as identification badges, locks and surveillance systems, companies can limit access to premises where sensitive IT equipment is located. This reduces the risk of unauthorized access and malicious manipulation of systems.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Protection of sensitive data<\/li>\n<\/ol>\n\n\n\n<p>By securing premises, companies also protect sensitive data stored on site. This can include confidential information on customers, employees, products or company operations. By limiting physical access to this data, companies reduce the risk of leakage or theft of confidential information.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Continuity of operations<\/li>\n<\/ol>\n\n\n\n<p>By preventing incidents such as theft, vandalism or service interruptions caused by physical intrusion, securing premises helps maintain continuity of IT operations. This ensures that systems remain operational and that business activities can continue as normal, even in the event of physical incidents.<a href=\"\/en\/contact\/\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.4h2lobmjn9iv_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>How can I set up an efficient security system tailored to my needs?&nbsp;<\/h2>\n\n\n\n<p>To set up an effective premises security system tailored to your needs, follow these steps :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Risk assessment<\/li>\n<\/ol>\n\n\n\n<p>Start by carrying out a comprehensive risk assessment to identify potential threats to your premises. This can include intrusion, theft, vandalism, natural disasters, etc.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Identifying specific needs<\/li>\n<\/ol>\n\n\n\n<p>Based on the risk assessment, identify your specific needs in terms of securing the premises. For example, you may need access controls to restrict entry to certain areas, alarm systems to detect intrusions, or surveillance cameras to monitor activities around the building.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Technology and equipment selection<\/li>\n<\/ol>\n\n\n\n<p>Based on your identified needs, select the appropriate security technologies and equipment. This may include secure locks, alarm systems with motion sensors, high-resolution surveillance cameras, biometric access controls and more.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Installation and configuration<\/li>\n<\/ol>\n\n\n\n<p>Once the equipment has been selected, install and configure it according to the manufacturer's specifications and best safety practices. Make sure all equipment is properly configured and integrated to ensure proper operation.<\/p>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Staff training<\/li>\n<\/ol>\n\n\n\n<p>Make sure your staff are trained in the use of security equipment and the procedures to follow in the event of an incident. Make them aware of security best practices and company policies on access to premises and asset protection.<\/p>\n\n\n\n<ol start=\"6\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Maintenance and follow-up<\/li>\n<\/ol>\n\n\n\n<p>Plan regular maintenance routines to ensure that all security equipment is working properly. Also monitor system performance and adapt it as necessary to meet your company's changing security needs.<\/p>\n\n\n\n<p>By following these steps, you can implement effective premises security tailored to your needs, helping to protect your assets, data and employees from potential threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.sid7bwdmazpy_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>How can I get support during this process?&nbsp;<\/h2>\n\n\n\n<p>There are several options to help you secure your premises:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Physical security consultants<\/li>\n<\/ol>\n\n\n\n<p>Hiring specialized security consultants can be an effective option. These experts can assess your specific needs, carry out in-depth risk analyses and recommend solutions tailored to your business.<\/p>\n\n\n\n<p>At Phishia, we support companies in securing their working environment by installing various solutions that enable a hollistic and sustainable approach over time.&nbsp;<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Security solutions providers<\/li>\n<\/ol>\n\n\n\n<p>Many suppliers offer a complete range of physical security solutions, such as access control systems, surveillance cameras, alarms and more. These suppliers can advise you on the best options for your business, and help you implement the chosen solutions.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Private security companies<\/li>\n<\/ol>\n\n\n\n<p>Some private security companies offer surveillance and patrol services to protect your premises 24 hours a day, 7 days a week. You can hire them to enhance the security of your facilities and deter intruders.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Professional networks and associations<\/li>\n<\/ol>\n\n\n\n<p>Joining professional networks or associations in the physical security field can put you in touch with experts and solution providers. You'll benefit from advice and recommendations from trusted experts.<\/p>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/securing-premises\/\"><\/a>Self-training and research<\/li>\n<\/ol>\n\n\n\n<p>If you have limited resources, you can also educate yourself and research best practices in physical security. Many guides and online resources are available to help you understand the basics and make informed decisions.<\/p>\n\n\n\n<p>By choosing the approach that best suits your needs and budget, you can benefit from the expertise and support you need to effectively secure your premises, ensuring the protection of your assets and employees.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is premises security?  Premises security is the implementation of physical security measures to protect facilities, assets and people within a building or site. This generally includes the installation of locking devices, alarm systems, surveillance cameras, access controls [...].<\/p>","protected":false},"author":2,"featured_media":391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curisation des Locaux - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/securing-premises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curisation des Locaux - Phishia\" \/>\n<meta property=\"og:description\" content=\"Qu&rsquo;est ce que la s\u00e9curisation des locaux?&nbsp; La s\u00e9curisation des locaux consiste \u00e0 mettre en place des mesures de s\u00e9curit\u00e9 physiques pour prot\u00e9ger les installations, les biens et les personnes \u00e0 l&rsquo;int\u00e9rieur d&rsquo;un b\u00e2timent ou d&rsquo;un site. Cela comprend g\u00e9n\u00e9ralement l&rsquo;installation de dispositifs de verrouillage, de syst\u00e8mes d&rsquo;alarme, de cam\u00e9ras de surveillance, de contr\u00f4les d&rsquo;acc\u00e8s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/securing-premises\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T16:36:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:05:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-3-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pauline Desmarets\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pauline Desmarets\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/\"},\"author\":{\"name\":\"Pauline Desmarets\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/9206c7bdf32a01c09611a465d7d83c88\"},\"headline\":\"S\u00e9curisation des Locaux\",\"datePublished\":\"2025-01-28T16:36:26+00:00\",\"dateModified\":\"2025-11-21T15:05:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/\"},\"wordCount\":1387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-3-1.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/\",\"name\":\"S\u00e9curisation des Locaux - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-3-1.jpg\",\"datePublished\":\"2025-01-28T16:36:26+00:00\",\"dateModified\":\"2025-11-21T15:05:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-3-1.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-3-1.jpg\",\"width\":1280,\"height\":719},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/securisation-des-locaux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curisation des Locaux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/9206c7bdf32a01c09611a465d7d83c88\",\"name\":\"Pauline Desmarets\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Premises security - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/securing-premises\/","og_locale":"en_US","og_type":"article","og_title":"S\u00e9curisation des Locaux - Phishia","og_description":"Qu&rsquo;est ce que la s\u00e9curisation des locaux?&nbsp; La s\u00e9curisation des locaux consiste \u00e0 mettre en place des mesures de s\u00e9curit\u00e9 physiques pour prot\u00e9ger les installations, les biens et les personnes \u00e0 l&rsquo;int\u00e9rieur d&rsquo;un b\u00e2timent ou d&rsquo;un site. Cela comprend g\u00e9n\u00e9ralement l&rsquo;installation de dispositifs de verrouillage, de syst\u00e8mes d&rsquo;alarme, de cam\u00e9ras de surveillance, de contr\u00f4les d&rsquo;acc\u00e8s [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/securing-premises\/","og_site_name":"Phishia","article_published_time":"2025-01-28T16:36:26+00:00","article_modified_time":"2025-11-21T15:05:36+00:00","og_image":[{"width":1280,"height":719,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-3-1.jpg","type":"image\/jpeg"}],"author":"Pauline Desmarets","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pauline Desmarets","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/"},"author":{"name":"Pauline Desmarets","@id":"https:\/\/phishia.fr\/#\/schema\/person\/9206c7bdf32a01c09611a465d7d83c88"},"headline":"S\u00e9curisation des Locaux","datePublished":"2025-01-28T16:36:26+00:00","dateModified":"2025-11-21T15:05:36+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/"},"wordCount":1387,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-3-1.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/","name":"Premises security - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-3-1.jpg","datePublished":"2025-01-28T16:36:26+00:00","dateModified":"2025-11-21T15:05:36+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-3-1.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-3-1.jpg","width":1280,"height":719},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/securisation-des-locaux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curisation des Locaux"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/9206c7bdf32a01c09611a465d7d83c88","name":"Pauline Desmarets"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":21,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/426\/revisions"}],"predecessor-version":[{"id":2820,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/426\/revisions\/2820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/391"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}