{"id":3424,"date":"2016-11-15T10:21:45","date_gmt":"2016-11-15T09:21:45","guid":{"rendered":"http:\/\/amg-informatique.fr\/w2\/?p=3424"},"modified":"2016-11-15T10:42:08","modified_gmt":"2016-11-15T09:42:08","slug":"guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques","status":"publish","type":"post","link":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques"},"content":{"rendered":"<p>T\u00e9l\u00e9chargez le <a href=\"http:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques.pdf\" target=\"_blank\">guide des bonnes pratiques de l\u2019informatique<\/a> \u00e9dit\u00e9e par L\u2019ANSSI (Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information) et la CGPME pr\u00e9sentant douze r\u00e8gles essentielles pour la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information des petites et moyennes entreprises.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00e9l\u00e9chargez le guide des bonnes pratiques de l\u2019informatique \u00e9dit\u00e9e par L\u2019ANSSI (Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information) et la CGPME pr\u00e9sentant douze r\u00e8gles essentielles pour la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information des petites et moyennes entreprises.<\/p>\n","protected":false},"author":7,"featured_media":3422,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[73],"tags":[],"class_list":["post-3424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-materiel-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9<\/title>\n<meta name=\"description\" content=\"Toutes les actualit\u00e9s d&#039;AMG INFORMATIQUE \u00e0 Dijon et au Creusot\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"og:description\" content=\"Toutes les actualit\u00e9s d&#039;AMG INFORMATIQUE \u00e0 Dijon et au Creusot\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/\" \/>\n<meta property=\"og:site_name\" content=\"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-15T09:21:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-15T09:42:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1743\" \/>\n\t<meta property=\"og:image:height\" content=\"1501\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"AMG INFORMATIQUE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:site\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"AMG INFORMATIQUE\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/\"},\"author\":{\"name\":\"AMG INFORMATIQUE\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/abd28354df3fdad4a59d904d88579540\"},\"headline\":\"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques\",\"datePublished\":\"2016-11-15T09:21:45+00:00\",\"dateModified\":\"2016-11-15T09:42:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/\"},\"wordCount\":62,\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/guide_cgpme_bonnes_pratiques-1.jpg\",\"articleSection\":[\"Mat\u00e9riel informatique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/guide_cgpme_bonnes_pratiques-1.jpg\",\"datePublished\":\"2016-11-15T09:21:45+00:00\",\"dateModified\":\"2016-11-15T09:42:08+00:00\",\"description\":\"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/guide_cgpme_bonnes_pratiques-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/guide_cgpme_bonnes_pratiques-1.jpg\",\"width\":1743,\"height\":1501},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"name\":\"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9\",\"description\":\"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\",\"name\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"width\":2139,\"height\":747,\"caption\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AMG.INFORMATIQUE\\\/\",\"https:\\\/\\\/x.com\\\/AMGINFORMATIQUE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/amg-informatique\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/abd28354df3fdad4a59d904d88579540\",\"name\":\"AMG INFORMATIQUE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"caption\":\"AMG INFORMATIQUE\"},\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/author\\\/amg-informatique\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","og_description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","og_url":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/","og_site_name":"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","article_publisher":"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","article_published_time":"2016-11-15T09:21:45+00:00","article_modified_time":"2016-11-15T09:42:08+00:00","og_image":[{"width":1743,"height":1501,"url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques-1.jpg","type":"image\/jpeg"}],"author":"AMG INFORMATIQUE","twitter_card":"summary_large_image","twitter_creator":"@AMGINFORMATIQUE","twitter_site":"@AMGINFORMATIQUE","twitter_misc":{"\u00c9crit par":"AMG INFORMATIQUE"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#article","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/"},"author":{"name":"AMG INFORMATIQUE","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/abd28354df3fdad4a59d904d88579540"},"headline":"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques","datePublished":"2016-11-15T09:21:45+00:00","dateModified":"2016-11-15T09:42:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/"},"wordCount":62,"publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques-1.jpg","articleSection":["Mat\u00e9riel informatique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/","url":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/","name":"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#primaryimage"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques-1.jpg","datePublished":"2016-11-15T09:21:45+00:00","dateModified":"2016-11-15T09:42:08+00:00","description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","breadcrumb":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#primaryimage","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques-1.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/guide_cgpme_bonnes_pratiques-1.jpg","width":1743,"height":1501},{"@type":"BreadcrumbList","@id":"https:\/\/www.amg-informatique.fr\/w2\/guide-des-bonnes-pratiques-de-linformatique-12-regles-essentielles-pour-securiser-vos-equipements-numeriques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.amg-informatique.fr\/w2\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 : 12 r\u00e8gles essentielles pour s\u00e9curiser vos \u00e9quipements num\u00e9riques"}]},{"@type":"WebSite","@id":"https:\/\/www.amg-informatique.fr\/w2\/#website","url":"https:\/\/www.amg-informatique.fr\/w2\/","name":"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9","description":"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)","publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amg-informatique.fr\/w2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization","name":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9","url":"https:\/\/www.amg-informatique.fr\/w2\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","width":2139,"height":747,"caption":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","https:\/\/x.com\/AMGINFORMATIQUE","https:\/\/www.linkedin.com\/company\/amg-informatique\/"]},{"@type":"Person","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/abd28354df3fdad4a59d904d88579540","name":"AMG INFORMATIQUE","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","caption":"AMG INFORMATIQUE"},"url":"https:\/\/www.amg-informatique.fr\/w2\/author\/amg-informatique\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/3424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/comments?post=3424"}],"version-history":[{"count":7,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/3424\/revisions"}],"predecessor-version":[{"id":3435,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/3424\/revisions\/3435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media\/3422"}],"wp:attachment":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media?parent=3424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/categories?post=3424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/tags?post=3424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}