{"id":24172,"date":"2021-08-25T11:01:23","date_gmt":"2021-08-25T09:01:23","guid":{"rendered":"https:\/\/piekblog.com\/cybercriminalite-un-probleme-plus-reel-que-jamais\/"},"modified":"2021-08-26T08:17:55","modified_gmt":"2021-08-26T06:17:55","slug":"cybercriminalite-un-probleme-plus-reel-que-jamais","status":"publish","type":"post","link":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/","title":{"rendered":"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais"},"content":{"rendered":"<p>En lisant les journaux, nous pouvons d\u00e9j\u00e0 apprendre qu\u2019il existe des cybercriminels qui proposent un vaccin contre le coronavirus. Par ailleurs, il n\u2019a jamais \u00e9t\u00e9 plus facile de devenir cybercriminel qu\u2019aujourd\u2019hui, notamment face aux lois qui ont toujours une longueur de retard dans le monde entier. Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9. Le march\u00e9 des logiciels malveillants repr\u00e9sente plusieurs millions d\u2019euros \u00e0 travers le monde, et les entreprises, organisations et particuliers sont toujours pr\u00eats \u00e0 payer une ran\u00e7on pour r\u00e9cup\u00e9rer le contr\u00f4le de leurs propres ordinateurs ou serveurs.<\/p>\n<p><a href=\"https:\/\/www.fbi.gov\/news\/testimony\/dangerous-partners-big-tech-and-beijing\" target=\"_blank\" rel=\"noopener\">L\u2019hacktivisme<\/a> est un autre ph\u00e9nom\u00e8ne du secteur de la cybercriminalit\u00e9. On parle d\u2019hacktivisme pour d\u00e9signer l\u2019usage de l\u2019intimidation ou de la menace pour influencer les pouvoirs publics ou soci\u00e9taux. L\u2019hacktivisme est toujours motiv\u00e9 par des fins politiques. Les objectifs peuvent \u00eatre de d\u00e9noncer diverses affaires ou d\u2019exprimer un m\u00e9contentement concernant les lois de certains pays ou r\u00e9gions. En fin de compte, cette activit\u00e9 fait toutefois partie du domaine de la cybercriminalit\u00e9 car ses acteurs tentent d\u2019infiltrer ou de neutraliser des r\u00e9seaux.<\/p>\n<p>Avec le d\u00e9veloppement de l\u2019impression 4D et de la bio-impression, nous connaissons d\u00e9sormais les technologies qui succ\u00e8deront aux imprimantes 3D. Ces appareils peuvent toutefois eux aussi \u00eatre utilis\u00e9s \u00e0 des fins n\u00e9fastes. Nous avons d\u00e9j\u00e0 pu voir au cin\u00e9ma qu\u2019il est possible d\u2019imprimer des visages et des mains. Cependant, cette technologie ne fait plus partie du domaine de la science-fiction. Les imprimantes 3D modernes sont en effet d\u00e9j\u00e0 capables d\u2019imprimer une copie de la main d\u2019une personne afin de l\u2019enfiler comme un gant. Cette m\u00e9thode permet aux criminels d\u2019infiltrer les syst\u00e8mes de s\u00e9curit\u00e9 verrouill\u00e9s par empreinte digitale ou scan de la paume de la main. Par ailleurs, les imprimantes 3D sont aussi utilis\u00e9es pour imprimer des <a href=\"https:\/\/www.justice.gov\/usao-nv\/pr\/las-vegas-man-indicted-illegal-possessions-3-d-printed-glock-switches-and-firearms\" target=\"_blank\" rel=\"noopener\">armes \u00e0 feu<\/a>. \u00c0 l\u2019heure actuelle, il existe peu de lois relatives \u00e0 ce domaine.<\/p>\n<p>Quelles sont les mesures que les entreprises, les organisations et les particuliers peuvent prendre pour s\u2019assurer de ne pas \u00eatre victimes de la cybercriminalit\u00e9 ? Tout d\u2019abord, il faut naturellement \u00e9viter d\u2019\u00eatre na\u00eff et de cliquer sur les liens d\u2019e-mails sans explicitement reconna\u00eetre l\u2019exp\u00e9diteur. Il faut ensuite disposer d\u2019une politique de s\u00e9curit\u00e9 relative \u00e0 l\u2019usage des syst\u00e8mes informatiques et d\u2019Internet ainsi que d\u2019une bonne protection des syst\u00e8mes. Il est \u00e9galement important de modifier r\u00e9guli\u00e8rement les mots de passe et d\u2019emp\u00eacher qu\u2019ils ne soient trop simples. Enfin, les autorit\u00e9s doivent elles aussi s\u2019impliquer, non seulement au niveau national, mais aussi sur le plan europ\u00e9en et mondial. Les cybercriminels doivent pouvoir \u00eatre jug\u00e9s par n\u2019importe quel pays, quelle que soit leur localisation. N\u00e9anmoins, tant que certains pays, comme la Cor\u00e9e du Nord, la Chine et la Russie, emploieront des cybercriminels au sein de leurs services publics, la cybercriminalit\u00e9 restera un probl\u00e8me de grande ampleur \u00e0 travers le monde.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En lisant les journaux, nous pouvons d\u00e9j\u00e0 apprendre qu\u2019il existe  [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":24167,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[275],"tags":[341],"class_list":["post-24172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-piek-fr","tag-cybercrime-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais - PIEK<\/title>\n<meta name=\"description\" content=\"Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais - PIEK\" \/>\n<meta property=\"og:description\" content=\"Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/\" \/>\n<meta property=\"og:site_name\" content=\"PIEK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PiekIEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T09:01:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-26T06:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wendy Wings\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:site\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wendy Wings\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/\"},\"author\":{\"name\":\"Wendy Wings\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\"},\"headline\":\"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais\",\"datePublished\":\"2021-08-25T09:01:23+00:00\",\"dateModified\":\"2021-08-26T06:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/\"},\"wordCount\":567,\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"keywords\":[\"Cybercrime\"],\"articleSection\":[\"PIEK\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/\",\"name\":\"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais - PIEK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"datePublished\":\"2021-08-25T09:01:23+00:00\",\"dateModified\":\"2021-08-26T06:17:55+00:00\",\"description\":\"Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#primaryimage\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"width\":1200,\"height\":900,\"caption\":\"Hackers robbing computer. people in black masks stealing data and money. Thiefs stealing confidential data documents from computer useful for anti phishing and internet viruses campaigns.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cybercriminalite-un-probleme-plus-reel-que-jamais\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/\",\"name\":\"PIEK\",\"description\":\"Your knowledge provider for the electronics industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#organization\",\"name\":\"PIEK International Education Centre (I.E.C.)\",\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"width\":300,\"height\":120,\"caption\":\"PIEK International Education Centre (I.E.C.)\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PiekIEC\",\"https:\\\/\\\/x.com\\\/PiekIEC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/piek-international-education-centre-bv\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PIEKtraining\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\",\"name\":\"Wendy Wings\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"caption\":\"Wendy Wings\"},\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/author\\\/wendy-wings\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais - PIEK","description":"Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais - PIEK","og_description":"Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9.","og_url":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/","og_site_name":"PIEK","article_publisher":"https:\/\/www.facebook.com\/PiekIEC","article_published_time":"2021-08-25T09:01:23+00:00","article_modified_time":"2021-08-26T06:17:55+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","type":"image\/jpeg"}],"author":"Wendy Wings","twitter_card":"summary_large_image","twitter_creator":"@PiekIEC","twitter_site":"@PiekIEC","twitter_misc":{"\u00c9crit par":"Wendy Wings","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#article","isPartOf":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/"},"author":{"name":"Wendy Wings","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e"},"headline":"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais","datePublished":"2021-08-25T09:01:23+00:00","dateModified":"2021-08-26T06:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/"},"wordCount":567,"publisher":{"@id":"https:\/\/piekblog.com\/fr\/#organization"},"image":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","keywords":["Cybercrime"],"articleSection":["PIEK"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/","url":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/","name":"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais - PIEK","isPartOf":{"@id":"https:\/\/piekblog.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#primaryimage"},"image":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","datePublished":"2021-08-25T09:01:23+00:00","dateModified":"2021-08-26T06:17:55+00:00","description":"Certains malfaiteurs offrent aussi des options de crime en tant que service (CaaS ou crime as a service) via le dark web. Ces services permettent \u00e0 un utilisateur de demander \u00e0 un tiers d\u2019infiltrer ou de neutraliser un r\u00e9seau d\u00e9termin\u00e9.","breadcrumb":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#primaryimage","url":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","width":1200,"height":900,"caption":"Hackers robbing computer. people in black masks stealing data and money. Thiefs stealing confidential data documents from computer useful for anti phishing and internet viruses campaigns."},{"@type":"BreadcrumbList","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-un-probleme-plus-reel-que-jamais\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/piekblog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybercriminalit\u00e9, un probl\u00e8me plus r\u00e9el que jamais"}]},{"@type":"WebSite","@id":"https:\/\/piekblog.com\/fr\/#website","url":"https:\/\/piekblog.com\/fr\/","name":"PIEK","description":"Your knowledge provider for the electronics industry","publisher":{"@id":"https:\/\/piekblog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/piekblog.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/piekblog.com\/fr\/#organization","name":"PIEK International Education Centre (I.E.C.)","url":"https:\/\/piekblog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","width":300,"height":120,"caption":"PIEK International Education Centre (I.E.C.)"},"image":{"@id":"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PiekIEC","https:\/\/x.com\/PiekIEC","https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv","https:\/\/www.youtube.com\/c\/PIEKtraining"]},{"@type":"Person","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e","name":"Wendy Wings","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","caption":"Wendy Wings"},"url":"https:\/\/piekblog.com\/fr\/author\/wendy-wings\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/24172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/comments?post=24172"}],"version-history":[{"count":1,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/24172\/revisions"}],"predecessor-version":[{"id":24176,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/24172\/revisions\/24176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/media\/24167"}],"wp:attachment":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/media?parent=24172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/categories?post=24172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/tags?post=24172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}