{"id":2045,"date":"2024-07-06T15:36:00","date_gmt":"2024-07-06T15:36:00","guid":{"rendered":"https:\/\/beslay-rime.com\/?p=2045"},"modified":"2025-01-17T16:59:45","modified_gmt":"2025-01-17T16:59:45","slug":"cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque","status":"publish","type":"post","link":"https:\/\/beslay-rime.com\/en\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/","title":{"rendered":"Cybersecurity in Healthcare Facilities: ANAP Releases an Action Plan"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Un plan d\u2019attaque pour mieux se d\u00e9fendre&nbsp;: c\u2019est que ce propose un <a href=\"https:\/\/anap.fr\/s\/article\/cybersecurite-en-etablissement-de-sante-plan-attaque-contre-les-attaques\">r\u00e9cent rapport de juin 2024<\/a> publi\u00e9 par l\u2019Agence nationale d\u2019appui \u00e0 la performance des \u00e9tablissements de sant\u00e9 et m\u00e9dico-sociaux [ANAP].<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Le risque cyber : un adversaire redoutable du secteur sanitaire<\/strong><\/p>\n\n\n\n<p>Le danger des cyberattaques r\u00e9side non seulement dans la compromission des donn\u00e9es sensibles des patients, dont en particulier les donn\u00e9es de sant\u00e9, mais aussi dans la perturbation des services essentiels. Une cyberattaque peut paralyser les op\u00e9rations quotidiennes, mettant ainsi en p\u00e9ril la continuit\u00e9 des soins et la s\u00e9curit\u00e9 des patients.<\/p>\n\n\n\n<p>Au premier rang des actes malveillants, se situent les attaques par phishing [hame\u00e7onnage] \u2013 avec une nette augmentation en 2022 compar\u00e9 \u00e0 2021. Le rapport rel\u00e8ve \u00e9galement des incidents li\u00e9s \u00e0 la compromission du SI, \u00e0 la ran\u00e7ongiciel et aux virus, entre autres.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Le risque cyber : un adversaire ma\u00eetrisable par le secteur sanitaire<\/strong><\/p>\n\n\n\n<p>Pour limiter les impacts des cyberattaques, il est avant tout n\u00e9cessaire de connaitre ses propres faiblesses&nbsp;: l\u2019analyse des risques est donc un pr\u00e9alable crucial. Le rapport rappelle notamment que l\u2019ANSSI [Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information] propose des exercices permettant notamment aux acteurs d\u2019identifier les failles de s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Le rapport de l&rsquo;ANAP propose en outre plusieurs mesures pour pallier les cyberattaques, qui s\u2019articulent autour de trois grands axes : l&rsquo;hygi\u00e8ne informatique, la r\u00e9ponse aux incidents et les forces \u00e0 mobiliser.<\/p>\n\n\n\n<ol start=\"1\">\n<li><strong>L\u2019hygi\u00e8ne informatique :<\/strong> Les \u00e9tablissements doivent adopter des pratiques de s\u00e9curit\u00e9 basiques, mais souvent n\u00e9glig\u00e9es. Cela inclut notamment la segmentation des r\u00e9seaux, la gestion des droits et des identit\u00e9s via l\u2019Active Directory (AD) \u2013 qui est d\u00e9crit comme \u00ab&nbsp;<em>un service de r\u00e9pertoire qui recense l\u2019ensemble des personnes autoris\u00e9es \u00e0 acc\u00e9der au syst\u00e8me d\u2019information<\/em>&nbsp;\u00bb, la gestion des habilitations, des mises \u00e0 jour des syst\u00e8mes informatiques ainsi que la sensibilisation au phishing.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<ol start=\"2\">\n<li><strong>La r\u00e9ponse aux incidents :<\/strong> Ici, les ma\u00eetres mots sont&nbsp;: r\u00e9activit\u00e9, connaissance du syst\u00e8me d\u2019information [SI] et mise en place d\u2019un centre op\u00e9rationnel de s\u00e9curit\u00e9 [SOC] \u2013 ce dernier permettant de surveiller les syst\u00e8mes en temps r\u00e9el, de d\u00e9tecter les menaces et d\u2019intervenir rapidement.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<ol start=\"3\">\n<li><strong>Les forces \u00e0 mobiliser :<\/strong> L\u2019ANAP souligne que \u00ab<em>&nbsp;les fonctions de DPO <\/em>[D\u00e9l\u00e9gu\u00e9 \u00e0 la protection des donn\u00e9es] <em>et de RSSI<\/em> [Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information] <em>ne doivent ni \u00eatre occup\u00e9es par la m\u00eame personne, ni \u00eatre subordonn\u00e9es \u00e0 la DSI <\/em>[Direction des syst\u00e8mes d\u2019information]<em>, cela pour pr\u00e9server leur ind\u00e9pendance <\/em>\u00bb, pour autant, ces acteurs doivent maintenir une collaboration \u00e9troite. &nbsp;L\u2019ANAP \u00e9voque \u00e9galement un autre acteur&nbsp;: l\u2019ambassadeur cybers\u00e9curit\u00e9, pr\u00e9sent\u00e9 comme \u00e9tant une personne d\u00e9pourvue de responsabilit\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 informatique mais qui promeut au sein des \u00e9quipes les bonnes pratiques, agissant ainsi comme le relai du RSSI, ayant \u00e9t\u00e9 pr\u00e9alablement form\u00e9 par ce dernier.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Le risque cyber : un adversaire appr\u00e9hend\u00e9 par la r\u00e8glementation<\/strong><\/p>\n\n\n\n<p>La protection des donn\u00e9es \u00e9tant au c\u0153ur des enjeux li\u00e9s \u00e0 la gestion des cyberattaques, l\u2019ANAP, se r\u00e9f\u00e9rant au RGPD [R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es] rappelle les imp\u00e9ratifs li\u00e9s notamment \u00e0&nbsp;:<\/p>\n\n\n\n<ul>\n<li>L\u2019h\u00e9bergement des donn\u00e9es de sant\u00e9 dans des environnements s\u00e9curis\u00e9s \u2013 les structures HDS [H\u00e9bergeurs de Donn\u00e9es de Sant\u00e9]<\/li>\n\n\n\n<li>La notification des violations dans un d\u00e9lai de 72h \u00e0 l\u2019autorit\u00e9 comp\u00e9tente &#8211; la CNIL [Commission nationale de l\u2019informatique et des libert\u00e9s]<\/li>\n\n\n\n<li>Au transfert de donn\u00e9es entre \u00e9tablissements\/professionnels via des messageries s\u00e9curis\u00e9es \u2013 les MSS [Messageries s\u00e9curit\u00e9 de sant\u00e9]<\/li>\n<\/ul>\n\n\n\n<p>Le rapport \u00e9voque \u00e9galement le r\u00f4le portail du CERT Sant\u00e9 \u2013 et l\u2019obligation d\u2019y signaler \u00ab&nbsp;<em>sans d\u00e9lai les incidents graves de cybers\u00e9curit\u00e9 qui concernent la s\u00e9curit\u00e9 des soins&nbsp;; l\u2019int\u00e9gralit\u00e9 ou la confidentialit\u00e9 des donn\u00e9es ou le fonctionnement normal d\u2019un \u00e9tablissement<\/em>&nbsp;\u00bb [pour rappel&nbsp;: cf. les articles L.1111-8-2 et D.1111-16-2 et suivants du code de la sant\u00e9 publique].<\/p>\n\n\n\n<p>Par ailleurs, il convient de relever que l\u2019ANAP aborde la directive NIS 2 [<em>Network and Information Security] <\/em>\u2013 dont les dispositions nationales doivent \u00eatre adopt\u00e9es et appliqu\u00e9es par les Etats membres en octobre 2024 &#8211; en ce qu\u2019elle impose notamment l\u2019utilisation d\u2019un syst\u00e8me d\u2019authentification forte \u00ab&nbsp;<em>pour l\u2019acc\u00e8s aux donn\u00e9es les plus sensibles comme le dossier patient informatis\u00e9 ou aux logiciels au c\u0153ur du syst\u00e8me d\u2019information hospitalier<\/em>&nbsp;\u00bb, selon le rapport.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Enfin, nous rappelons que les cyberattaques sont \u00e9galement appr\u00e9hend\u00e9es sur le plan p\u00e9nal et que les plaintes aff\u00e9rentes sont notamment g\u00e9r\u00e9es par des \u00e9quipes hypersp\u00e9cialis\u00e9es telles que la section cybercriminalit\u00e9 [J3] du Parquet de Paris et la brigade de lutte contre la cybercriminalit\u00e9 [BL2C]. \u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>R\u00e9dig\u00e9 par Lorena Gouden\u00e8ge<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Healthcare providers are by far the most targeted group by cybercriminals: in 2022, 78% of cyberattacks occurred in the healthcare sector.<\/p>","protected":false},"author":1,"featured_media":2094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE - Beslay Rime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beslay-rime.com\/en\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE - Beslay Rime\" \/>\n<meta property=\"og:description\" content=\"Les acteurs de la sant\u00e9 sont une cible tr\u00e8s majoritairement privil\u00e9gi\u00e9e pour les cybercriminels\u00a0: en 2022, 78% des cyberattaques ont eu lieu dans le secteur sanitaire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beslay-rime.com\/en\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\" \/>\n<meta property=\"og:site_name\" content=\"Beslay Rime\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-06T15:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T16:59:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png\" \/>\n\t<meta property=\"og:image:width\" content=\"388\" \/>\n\t<meta property=\"og:image:height\" content=\"386\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"beslay.apercu.website\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"beslay.apercu.website\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\"},\"author\":{\"name\":\"beslay.apercu.website\",\"@id\":\"https:\/\/beslay-rime.com\/#\/schema\/person\/5f328749e7a4e9d2b7aeba8f65d5cf7c\"},\"headline\":\"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE\",\"datePublished\":\"2024-07-06T15:36:00+00:00\",\"dateModified\":\"2025-01-17T16:59:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\"},\"wordCount\":868,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beslay-rime.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\",\"url\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\",\"name\":\"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE - Beslay Rime\",\"isPartOf\":{\"@id\":\"https:\/\/beslay-rime.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png\",\"datePublished\":\"2024-07-06T15:36:00+00:00\",\"dateModified\":\"2025-01-17T16:59:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage\",\"url\":\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png\",\"contentUrl\":\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png\",\"width\":388,\"height\":386},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/beslay-rime.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beslay-rime.com\/#website\",\"url\":\"https:\/\/beslay-rime.com\/\",\"name\":\"Beslay Rime\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/beslay-rime.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beslay-rime.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beslay-rime.com\/#organization\",\"name\":\"Beslay Rime\",\"url\":\"https:\/\/beslay-rime.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beslay-rime.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/04\/logo.svg\",\"contentUrl\":\"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/04\/logo.svg\",\"width\":106,\"height\":50,\"caption\":\"Beslay Rime\"},\"image\":{\"@id\":\"https:\/\/beslay-rime.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beslay-rime.com\/#\/schema\/person\/5f328749e7a4e9d2b7aeba8f65d5cf7c\",\"name\":\"beslay.apercu.website\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beslay-rime.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dfe5baeed18b0f03a397fb5582101944?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dfe5baeed18b0f03a397fb5582101944?s=96&d=mm&r=g\",\"caption\":\"beslay.apercu.website\"},\"sameAs\":[\"http:\/\/beslay.apercu.website\"],\"url\":\"https:\/\/beslay-rime.com\/en\/author\/beslay-apercu-website\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE - Beslay Rime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beslay-rime.com\/en\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/","og_locale":"en_US","og_type":"article","og_title":"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE - Beslay Rime","og_description":"Les acteurs de la sant\u00e9 sont une cible tr\u00e8s majoritairement privil\u00e9gi\u00e9e pour les cybercriminels\u00a0: en 2022, 78% des cyberattaques ont eu lieu dans le secteur sanitaire.","og_url":"https:\/\/beslay-rime.com\/en\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/","og_site_name":"Beslay Rime","article_published_time":"2024-07-06T15:36:00+00:00","article_modified_time":"2025-01-17T16:59:45+00:00","og_image":[{"width":388,"height":386,"url":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png","type":"image\/png"}],"author":"beslay.apercu.website","twitter_card":"summary_large_image","twitter_misc":{"Written by":"beslay.apercu.website","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#article","isPartOf":{"@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/"},"author":{"name":"beslay.apercu.website","@id":"https:\/\/beslay-rime.com\/#\/schema\/person\/5f328749e7a4e9d2b7aeba8f65d5cf7c"},"headline":"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE","datePublished":"2024-07-06T15:36:00+00:00","dateModified":"2025-01-17T16:59:45+00:00","mainEntityOfPage":{"@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/"},"wordCount":868,"commentCount":0,"publisher":{"@id":"https:\/\/beslay-rime.com\/#organization"},"image":{"@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage"},"thumbnailUrl":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/","url":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/","name":"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE - Beslay Rime","isPartOf":{"@id":"https:\/\/beslay-rime.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage"},"image":{"@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage"},"thumbnailUrl":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png","datePublished":"2024-07-06T15:36:00+00:00","dateModified":"2025-01-17T16:59:45+00:00","breadcrumb":{"@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#primaryimage","url":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png","contentUrl":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/07\/image-article-ANAP.png","width":388,"height":386},{"@type":"BreadcrumbList","@id":"https:\/\/beslay-rime.com\/cybersecurite-en-etablissements-de-sante-lanap-publie-un-plan-dattaque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/beslay-rime.com\/"},{"@type":"ListItem","position":2,"name":"CYBERSECURITE\u00a0EN ETABLISSEMENTS DE SANTE\u00a0: L\u2019ANAP PUBLIE UN PLAN D\u2019ATTAQUE"}]},{"@type":"WebSite","@id":"https:\/\/beslay-rime.com\/#website","url":"https:\/\/beslay-rime.com\/","name":"Beslay Rime","description":"","publisher":{"@id":"https:\/\/beslay-rime.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beslay-rime.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beslay-rime.com\/#organization","name":"Beslay Rime","url":"https:\/\/beslay-rime.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beslay-rime.com\/#\/schema\/logo\/image\/","url":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/04\/logo.svg","contentUrl":"https:\/\/beslay-rime.com\/wp-content\/uploads\/2024\/04\/logo.svg","width":106,"height":50,"caption":"Beslay Rime"},"image":{"@id":"https:\/\/beslay-rime.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beslay-rime.com\/#\/schema\/person\/5f328749e7a4e9d2b7aeba8f65d5cf7c","name":"beslay.apercu.website","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beslay-rime.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dfe5baeed18b0f03a397fb5582101944?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dfe5baeed18b0f03a397fb5582101944?s=96&d=mm&r=g","caption":"beslay.apercu.website"},"sameAs":["http:\/\/beslay.apercu.website"],"url":"https:\/\/beslay-rime.com\/en\/author\/beslay-apercu-website\/"}]}},"_links":{"self":[{"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/posts\/2045"}],"collection":[{"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/comments?post=2045"}],"version-history":[{"count":4,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/posts\/2045\/revisions"}],"predecessor-version":[{"id":2092,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/posts\/2045\/revisions\/2092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/media\/2094"}],"wp:attachment":[{"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/media?parent=2045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/categories?post=2045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beslay-rime.com\/en\/wp-json\/wp\/v2\/tags?post=2045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}