{"id":83193,"date":"2022-12-16T11:58:15","date_gmt":"2022-12-16T10:58:15","guid":{"rendered":"https:\/\/ruggtek.com\/oldsite\/?p=83193"},"modified":"2022-12-16T11:58:15","modified_gmt":"2022-12-16T10:58:15","slug":"la-cybersecurite-dans-le-secteur-de-la-construction","status":"publish","type":"post","link":"https:\/\/www.ruggtek.com\/fr\/dealing-with-cybersecurity-in-the-construction-industry\/","title":{"rendered":"La cybers\u00e9curit\u00e9 dans le secteur de la construction"},"content":{"rendered":"[:en]\n\t\t<div id=\"fws_69e39f54e7369\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark \">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>As more and more industries continue to automate their systems and operations, the risk of <strong>cybersecurity attacks<\/strong> is increasing by the day. Although there are fewer incidences of cybersecurity attacks in the <strong>construction industry<\/strong> compared to other sectors, the risk of cybersecurity attacks happening in a construction company is still very high.<\/p>\n<p>Cybersecurity attacks can be unleashed in <strong>many forms<\/strong> and construction companies should have proper defense mechanisms in place to prevent or minimize any form of attacks. If there are no defense mechanisms in place, the hackers will easily gain access to <strong>confidential data<\/strong> regarding the company projects or employees\u2019 personal information and start asking for money to release the data.<\/p>\n<p><strong>Common cybersecurity attacks and how they can affect the construction industry<\/strong><\/p>\n<p>Cybersecurity attacks especially in the construction industry are fronted in different forms as the technology continues to advance. Some of the <strong>common threats that a cybersecurity attack<\/strong> can cause in the construction industry include;<\/p>\n<ol>\n<li><strong>Ransomware Attacks<\/strong><\/li>\n<\/ol>\n<p>Ransomware cybersecurity attack is the most common and the <strong>worst form of cybersecurity threat <\/strong>that can cripple all your important company systems. The hacker gets access to your company systems and they encrypt all the important data in the breached system making it difficult for the company to access it unless they pay for the encryption key that is in the hands of the hackers.<\/p>\n<p>For ransomware attacks, the hackers will often <strong>demand a large amount of money<\/strong> mostly in form of bitcoin so that they can offer the breached data system encryption key. When a construction company is faced with such a big cybersecurity threat, it can end up losing a lot of money to hackers and even lose crucial construction project data if they are unable to raise the required ransom.<\/p>\n<ol>\n<li><strong>Downtime and reduced productivity<\/strong><\/li>\n<\/ol>\n<p>Taking cognizant of the fact that the construction industry is one of the industries that heavily rely on <strong>proper time management<\/strong> in order to deliver projects as per the set timelines. Any cybersecurity attack in a <strong>construction company systems<\/strong> leads to an automatic downtime. When the company systems are no longer working, workers will lose the morale of working and this will result in low productivity.<\/p>\n<p>Before a construction company manages to solve the situation at hand, it might take some time and this may lead to missing the completion deadline for some projects. Any form of business disruption as a result of a <strong>cybersecurity attack ends<\/strong> up costing the construction company both time and financial resources. Any wasted time will mean that the project completion time will have to be extended thus, eating to the company\u2019s profit margins.<\/p>\n<ol>\n<li><strong>Negative reputation<\/strong><\/li>\n<\/ol>\n<p>If your construction company is faced with a <strong>cybersecurity attack and hackers manage<\/strong> to access sensitive data, the reputation and trust of the company are highly affected. Companies with negative reputation damage might find themselves stuck in never-ending lawsuits for intellectual property rights.<\/p>\n<p>Such actions may have a <strong>negative impact <\/strong>on the company&#8217;s business development plan. It will also have an impact on the type of clients who can work with the affected construction company in their future projects.<\/p>\n<ol>\n<li><strong>Sensitive data breach<\/strong><\/li>\n<\/ol>\n<p>If the cybersecurity attackers get hold of your sensitive bid data, they can release it to the public domain making your company less competitive. In any business, the confidentiality of business data is very important. Any successful <strong>data breach by cybersecurity hackers<\/strong> can ruin your business potential if they decide to damage your company data when their blackmailing efforts fail.<\/p>\n<p>Therefore, it\u2019s highly advisable for contractors and other professionals in the construction industry to prepare themselves adequately and have a <strong>clear strategy<\/strong> in place that outlines how they can respond to the ever-eminent cybersecurity attacks. If you are in the construction industry and your business has no practical procedures on how to handle <strong>cyber-attack<\/strong>, here are some of the measures that you can implement to keep your construction business and data safe.<\/p>\n<ul>\n<li><strong>Proper employee training<\/strong><\/li>\n<\/ul>\n<p>In most cases, companies in the construction industry often undermine the eminent threat of cybersecurity attacks because they assume that they are too small to be targeted. However, companies that fall under this category are <strong>the easiest targets of cyber hacking<\/strong>. Therefore, to prevent such incidences from happening to your construction company, it\u2019s very important to train your employees by equipping them with the necessary information on how to prevent <strong>cybersecurity threats by hackers<\/strong>.<\/p>\n<p>Employees working in construction industries should undergo mandatory training on cybersecurity so that they can understand what it is and how to prevent it. The training process can begin by letting the workers familiarize themselves with important cybersecurity terms such <strong>as antivirus, hackers, malware, email phishing<\/strong>, and having a <strong>backup<\/strong> for your data.<\/p>\n<p>When workers understand what hacking is all about, they will be more cautious when using the internet and other electronic devices. A simple procedure such as carrying out an antivirus scan on your computers can go a long way in identifying potential threats and block them before they can cause any harm to companies or personal data. Updating the antivirus database regularly can go a long way in foiling hackers\u2019 ill attempts.<\/p>\n<p>Also, having adequate knowledge of identifying phishing emails can prevent construction workers from opening suspicious links that are sent by impersonator hackers that can compromise data and systems security.<\/p>\n<ul>\n<li><strong>Use of well-secured industrial computers and portable tablets<\/strong><\/li>\n<\/ul>\n<p>Ruggedized industrial computers and tablets have become an integral part of construction industry automation. <strong>Modern rugged tablets<\/strong> are built with high-security features that help safeguard sensitive data against unauthorized access. Security devices with <strong>CAC card readers<\/strong>, scanners, password protected lock screens go a long way in preventing data theft by unauthorized persons.<\/p>\n<ul>\n<li><strong>Effective cybersecurity response plan<\/strong><\/li>\n<\/ul>\n<p>To be adequately prepared, any construction company must have an incident response plan in place. By doing so, you are able to figure out the kind of response that you will bring forward to handle the situation in case a real cybersecurity attack happens.<\/p>\n<p>When there is a proper <strong>cyberattack incident response plan<\/strong>, construction companies can minimize damage or prevent any attack and access to classified data and other crucial materials. You will also have one command center as you have already outlined the department or teams that will take up the response process thus avoiding confusion.<\/p>\n<p>Whether you have a small construction company or a big one, creating an incident response plan will simplify the process of handling <strong>cybersecurity threats<\/strong> by initiating a real-time well-coordinated response.<\/p>\n<p>With such effective security features, you can even be less worried if <strong>mobile tablets and computers<\/strong> get stolen on the construction sites or get into the wrong hands. When your construction company data is well protected, it will become easier to improve workers&#8217; confidence as well as the company&#8217;s reputation. <strong>Cyberattacks in the construction industry<\/strong> can be minimized if companies adopt the above-suggested approaches to not only safeguard their data but also have a practical response strategy in place in case a cybersecurity threat happens.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>[:es]\n\t\t<div id=\"fws_69e39f54e7837\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark \">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>A medida que m\u00e1s y m\u00e1s industrias contin\u00faan automatizando sus sistemas y operaciones, el riesgo de ataques de ciberseguridad aumenta d\u00eda a d\u00eda. Aunque hay menos incidencias de ataques de ciberseguridad en la industria de la construcci\u00f3n en comparaci\u00f3n con otros sectores, el riesgo de que ocurran ataques de ciberseguridad en una empresa de construcci\u00f3n sigue siendo muy alto.<\/p>\n<p>Los ataques de ciberseguridad se pueden desencadenar de muchas formas y las empresas de construcci\u00f3n deben contar con mecanismos de defensa adecuados para prevenir o minimizar cualquier forma de ataque. Si no existen mecanismos de defensa, los piratas inform\u00e1ticos obtendr\u00e1n f\u00e1cilmente acceso a datos confidenciales sobre los proyectos de la empresa o la informaci\u00f3n personal de los empleados y comenzar\u00e1n a pedir dinero para liberar los datos.<\/p>\n<p>Ataques comunes de ciberseguridad y c\u00f3mo pueden afectar a la industria de la construcci\u00f3n<\/p>\n<p>Los ataques de ciberseguridad, especialmente en la industria de la construcci\u00f3n, se enfrentan de diferentes formas a medida que la tecnolog\u00eda contin\u00faa avanzando. Algunas de las amenazas comunes que un ataque de seguridad cibern\u00e9tica puede causar en la industria de la construcci\u00f3n incluyen;<\/p>\n<h2>Ataques de ransomware<\/h2>\n<p>El ataque de ciberseguridad de ransomware es la forma m\u00e1s com\u00fan y la peor de amenazas de ciberseguridad que puede paralizar todos los sistemas importantes de su empresa. El pirata inform\u00e1tico obtiene acceso a los sistemas de su empresa y encripta todos los datos importantes en el sistema violado, lo que dificulta el acceso de la empresa a menos que pague por la clave de cifrado que est\u00e1 en manos de los piratas inform\u00e1ticos.<\/p>\n<p>Para los ataques de ransomware, los piratas inform\u00e1ticos a menudo exigen una gran cantidad de dinero, principalmente en forma de bitcoin, para poder ofrecer la clave de cifrado del sistema de datos violado. Cuando una empresa de construcci\u00f3n se enfrenta a una amenaza de seguridad cibern\u00e9tica tan grande, puede terminar perdiendo mucho dinero a manos de los piratas inform\u00e1ticos e incluso perder datos cruciales del proyecto de construcci\u00f3n si no pueden recaudar el rescate requerido.<\/p>\n<h2>Tiempo de inactividad y reducci\u00f3n de la productividad<\/h2>\n<p>Teniendo en cuenta el hecho de que la industria de la construcci\u00f3n es una de las industrias que dependen en gran medida de la gesti\u00f3n adecuada del tiempo para entregar proyectos seg\u00fan los plazos establecidos. Cualquier ataque de ciberseguridad en los sistemas de una empresa constructora provoca un tiempo de inactividad autom\u00e1tico. Cuando los sistemas de la empresa dejen de funcionar, los trabajadores perder\u00e1n la moral de trabajar y esto se traducir\u00e1 en una baja productividad.<\/p>\n<p>Antes de que una empresa constructora logre resolver la situaci\u00f3n en cuesti\u00f3n, puede pasar alg\u00fan tiempo y esto puede hacer que no se cumpla el plazo de finalizaci\u00f3n de algunos proyectos. Cualquier forma de interrupci\u00f3n del negocio como resultado de un ataque de ciberseguridad termina costando a la empresa constructora tanto tiempo como recursos financieros. Cualquier p\u00e9rdida de tiempo significar\u00e1 que el tiempo de finalizaci\u00f3n del proyecto deber\u00e1 extenderse, lo que reducir\u00e1 los m\u00e1rgenes de beneficio de la empresa.<\/p>\n<h2>Reputaci\u00f3n negativa<\/h2>\n<p>Si tu empresa constructora se enfrenta a un ataque de ciberseguridad y los hackers consiguen acceder a datos sensibles, la reputaci\u00f3n y la confianza de la empresa se ven muy afectadas. Las empresas con da\u00f1os negativos a la reputaci\u00f3n pueden verse atrapadas en juicios interminables por derechos de propiedad intelectual.<\/p>\n<p>Tales acciones pueden tener un impacto negativo en el plan de desarrollo comercial de la empresa. Tambi\u00e9n tendr\u00e1 un impacto en el tipo de clientes que pueden trabajar con la constructora afectada en sus proyectos futuros.<\/p>\n<h2>Violaci\u00f3n de datos confidenciales<\/h2>\n<p>Si los atacantes de seguridad cibern\u00e9tica se apoderan de sus datos confidenciales de ofertas, pueden liberarlos al dominio p\u00fablico, lo que hace que su empresa sea menos competitiva. En cualquier negocio, la confidencialidad de los datos comerciales es muy importante. Cualquier violaci\u00f3n de datos exitosa por parte de piratas inform\u00e1ticos puede arruinar el potencial de su negocio si deciden da\u00f1ar los datos de su empresa cuando fallan sus esfuerzos de chantaje.<\/p>\n<p>Por lo tanto, es muy recomendable que los contratistas y otros profesionales de la industria de la construcci\u00f3n se preparen adecuadamente y tengan una estrategia clara que describa c\u00f3mo pueden responder a los ataques de ciberseguridad cada vez m\u00e1s eminentes. Si est\u00e1 en la industria de la construcci\u00f3n y su negocio no tiene procedimientos pr\u00e1cticos sobre c\u00f3mo manejar un ataque cibern\u00e9tico, estas son algunas de las medidas que puede implementar para mantener seguros su negocio de construcci\u00f3n y sus datos.<\/p>\n<h2>Capacitaci\u00f3n adecuada de los empleados.<\/h2>\n<p>En la mayor\u00eda de los casos, las empresas de la industria de la construcci\u00f3n a menudo socavan la amenaza eminente de los ataques de ciberseguridad porque asumen que son demasiado peque\u00f1as para ser un objetivo. Sin embargo, las empresas que se incluyen en esta categor\u00eda son los objetivos m\u00e1s f\u00e1ciles de pirater\u00eda cibern\u00e9tica. Por lo tanto, para evitar que este tipo de incidentes le sucedan a su empresa constructora, es muy importante capacitar a sus empleados brind\u00e1ndoles la informaci\u00f3n necesaria sobre c\u00f3mo prevenir las amenazas de ciberseguridad por parte de los piratas inform\u00e1ticos.<\/p>\n<p>Los empleados que trabajan en las industrias de la construcci\u00f3n deben recibir capacitaci\u00f3n obligatoria sobre ciberseguridad para que puedan comprender qu\u00e9 es y c\u00f3mo prevenirla. El proceso de capacitaci\u00f3n puede comenzar permitiendo que los trabajadores se familiaricen con t\u00e9rminos importantes de ciberseguridad, como antivirus, piratas inform\u00e1ticos, malware, phishing de correo electr\u00f3nico y tener una copia de seguridad de sus datos.<\/p>\n<p>Cuando los trabajadores entiendan de qu\u00e9 se trata la pirater\u00eda, ser\u00e1n m\u00e1s cautelosos al usar Internet y otros dispositivos electr\u00f3nicos. Un procedimiento simple, como realizar un an\u00e1lisis antivirus en sus computadoras, puede ser de gran ayuda para identificar amenazas potenciales y bloquearlas antes de que puedan causar alg\u00fan da\u00f1o a las empresas o los datos personales. Actualizar la base de datos del antivirus con regularidad puede contribuir en gran medida a frustrar los malos intentos de los piratas inform\u00e1ticos.<\/p>\n<p>Adem\u00e1s, tener un conocimiento adecuado de la identificaci\u00f3n de correos electr\u00f3nicos de phishing puede evitar que los trabajadores de la construcci\u00f3n abran enlaces sospechosos enviados por piratas inform\u00e1ticos suplantadores que pueden comprometer la seguridad de los datos y los sistemas.<\/p>\n<p>Uso de computadoras industriales y tabletas port\u00e1tiles bien protegidas<\/p>\n<p>Las computadoras y tabletas industriales reforzadas se han convertido en una parte integral de la automatizaci\u00f3n de la industria de la construcci\u00f3n. Las tabletas resistentes modernas est\u00e1n dise\u00f1adas con caracter\u00edsticas de alta seguridad que ayudan a proteger los datos confidenciales contra el acceso no autorizado. Los dispositivos de seguridad con lectores de tarjetas CAC, esc\u00e1neres, pantallas de bloqueo protegidas con contrase\u00f1a contribuyen en gran medida a prevenir el robo de datos por parte de personas no autorizadas.<\/p>\n<h2>Plan de respuesta de ciberseguridad eficaz<\/h2>\n<p>Para estar adecuadamente preparada, cualquier empresa constructora debe contar con un plan de respuesta a incidentes. Al hacerlo, puede determinar el tipo de respuesta que presentar\u00e1 para manejar la situaci\u00f3n en caso de que ocurra un ataque de ciberseguridad real.<\/p>\n<p>Cuando existe un plan adecuado de respuesta a incidentes de ciberataques, las empresas constructoras pueden minimizar los da\u00f1os o prevenir cualquier ataque y acceso a datos clasificados y otros materiales cruciales. Tambi\u00e9n tendr\u00e1 un centro de comando, ya que ya describi\u00f3 el departamento o los equipos que se encargar\u00e1n del proceso de respuesta para evitar confusiones.<\/p>\n<p>Ya sea que tenga una empresa de construcci\u00f3n peque\u00f1a o grande, la creaci\u00f3n de un plan de respuesta a incidentes simplificar\u00e1 el proceso de manejo de las amenazas de seguridad cibern\u00e9tica al iniciar una respuesta bien coordinada en tiempo real.<\/p>\n<p>Con caracter\u00edsticas de seguridad tan efectivas, incluso puede estar menos preocupado si las tabletas m\u00f3viles y las computadoras son robadas en los sitios de construcci\u00f3n o caen en las manos equivocadas. Cuando los datos de su empresa constructora est\u00e1n bien protegidos, ser\u00e1 m\u00e1s f\u00e1cil mejorar la confianza de los trabajadores y la reputaci\u00f3n de la empresa. Los ataques cibern\u00e9ticos en la industria de la construcci\u00f3n se pueden minimizar si las empresas adoptan los enfoques sugeridos anteriormente para no solo proteger sus datos, sino tambi\u00e9n tener una estrategia de respuesta pr\u00e1ctica en caso de que ocurra una amenaza de seguridad cibern\u00e9tica.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>[:fr]\n\t\t<div id=\"fws_69e39f54e7bb2\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark \">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Alors que de plus en plus d&#8217;industries continuent d&#8217;automatiser leurs syst\u00e8mes et leurs op\u00e9rations, le risque d&#8217;attaques de cybers\u00e9curit\u00e9 augmente de jour en jour. Bien qu&#8217;il y ait moins d&#8217;incidences d&#8217;attaques de cybers\u00e9curit\u00e9 dans l&#8217;industrie de la construction par rapport \u00e0 d&#8217;autres secteurs, le risque d&#8217;attaques de cybers\u00e9curit\u00e9 dans une entreprise de construction est toujours tr\u00e8s \u00e9lev\u00e9.<\/p>\n<p>Les attaques de cybers\u00e9curit\u00e9 peuvent \u00eatre d\u00e9clench\u00e9es sous de nombreuses formes et les entreprises de construction doivent mettre en place des m\u00e9canismes de d\u00e9fense appropri\u00e9s pour pr\u00e9venir ou minimiser toute forme d&#8217;attaque. S&#8217;il n&#8217;y a pas de m\u00e9canismes de d\u00e9fense en place, les pirates auront facilement acc\u00e8s \u00e0 des donn\u00e9es confidentielles concernant les projets de l&#8217;entreprise ou les informations personnelles des employ\u00e9s et commenceront \u00e0 demander de l&#8217;argent pour divulguer les donn\u00e9es.<\/p>\n<h2>Attaques de cybers\u00e9curit\u00e9 courantes et comment elles peuvent affecter l&#8217;industrie de la construction<\/h2>\n<p>Les attaques de cybers\u00e9curit\u00e9, en particulier dans le secteur de la construction, se pr\u00e9sentent sous diff\u00e9rentes formes \u00e0 mesure que la technologie continue de progresser. Certaines des menaces courantes qu&#8217;une attaque de cybers\u00e9curit\u00e9 peut causer dans l&#8217;industrie de la construction comprennent\u00a0;<\/p>\n<h2>Attaques de ran\u00e7ongiciels<\/h2>\n<p>L&#8217;attaque de cybers\u00e9curit\u00e9 par ransomware est la forme la plus courante et la pire de menace de cybers\u00e9curit\u00e9 qui peut paralyser tous les syst\u00e8mes importants de votre entreprise. Le pirate a acc\u00e8s aux syst\u00e8mes de votre entreprise et crypte toutes les donn\u00e9es importantes du syst\u00e8me pirat\u00e9, ce qui rend difficile l&#8217;acc\u00e8s de l&#8217;entreprise \u00e0 moins qu&#8217;il ne paie pour la cl\u00e9 de cryptage qui est entre les mains des pirates.<\/p>\n<p>Pour les attaques de ran\u00e7ongiciels, les pirates demandent souvent une grosse somme d&#8217;argent, principalement sous forme de bitcoins, afin de pouvoir offrir la cl\u00e9 de cryptage du syst\u00e8me de donn\u00e9es pirat\u00e9e. Lorsqu&#8217;une entreprise de construction est confront\u00e9e \u00e0 une menace de cybers\u00e9curit\u00e9 aussi importante, elle peut finir par perdre beaucoup d&#8217;argent au profit des pirates et m\u00eame perdre des donn\u00e9es cruciales sur le projet de construction si elle n&#8217;est pas en mesure de lever la ran\u00e7on requise.<\/p>\n<p>Temps d&#8217;arr\u00eat et productivit\u00e9 r\u00e9duite<\/p>\n<p>Conscient du fait que l&#8217;industrie de la construction est l&#8217;une des industries qui s&#8217;appuient fortement sur une bonne gestion du temps afin de livrer des projets dans les d\u00e9lais impartis. Toute attaque de cybers\u00e9curit\u00e9 dans les syst\u00e8mes d&#8217;une entreprise de construction entra\u00eene un temps d&#8217;arr\u00eat automatique. Lorsque les syst\u00e8mes de l&#8217;entreprise ne fonctionnent plus, les travailleurs perdront le moral au travail et cela se traduira par une faible productivit\u00e9.<\/p>\n<p>Avant qu&#8217;une entreprise de construction ne parvienne \u00e0 r\u00e9soudre la situation actuelle, cela peut prendre un certain temps, ce qui peut entra\u00eener le d\u00e9passement du d\u00e9lai d&#8217;ach\u00e8vement de certains projets. Toute forme d&#8217;interruption des activit\u00e9s \u00e0 la suite d&#8217;une attaque de cybers\u00e9curit\u00e9 finit par co\u00fbter \u00e0 l&#8217;entreprise de construction \u00e0 la fois du temps et des ressources financi\u00e8res. Toute perte de temps signifiera que le temps d&#8217;ach\u00e8vement du projet devra \u00eatre prolong\u00e9, ce qui grignotera les marges b\u00e9n\u00e9ficiaires de l&#8217;entreprise.<\/p>\n<h2>R\u00e9putation n\u00e9gative<\/h2>\n<p>Si votre entreprise de construction est confront\u00e9e \u00e0 une attaque de cybers\u00e9curit\u00e9 et que des pirates parviennent \u00e0 acc\u00e9der \u00e0 des donn\u00e9es sensibles, la r\u00e9putation et la confiance de l&#8217;entreprise sont fortement affect\u00e9es. Les entreprises dont la r\u00e9putation est endommag\u00e9e pourraient se retrouver coinc\u00e9es dans des poursuites sans fin pour les droits de propri\u00e9t\u00e9 intellectuelle.<\/p>\n<p>De telles actions peuvent avoir un impact n\u00e9gatif sur le plan de d\u00e9veloppement des affaires de l&#8217;entreprise. Cela aura \u00e9galement un impact sur le type de clients qui peuvent travailler avec l&#8217;entreprise de construction concern\u00e9e dans leurs futurs projets.<\/p>\n<h2>Violation de donn\u00e9es sensibles<\/h2>\n<p>Si les attaquants de la cybers\u00e9curit\u00e9 s&#8217;emparent de vos donn\u00e9es d&#8217;appel d&#8217;offres sensibles, ils peuvent les publier dans le domaine public, ce qui rend votre entreprise moins comp\u00e9titive. Dans toute entreprise, la confidentialit\u00e9 des donn\u00e9es commerciales est tr\u00e8s importante. Toute violation de donn\u00e9es r\u00e9ussie par des pirates de la cybers\u00e9curit\u00e9 peut ruiner votre potentiel commercial s&#8217;ils d\u00e9cident d&#8217;endommager les donn\u00e9es de votre entreprise lorsque leurs efforts de chantage \u00e9chouent.<\/p>\n<p>Par cons\u00e9quent, il est fortement conseill\u00e9 aux entrepreneurs et autres professionnels de l&#8217;industrie de la construction de se pr\u00e9parer de mani\u00e8re ad\u00e9quate et d&#8217;avoir une strat\u00e9gie claire en place qui d\u00e9crit comment ils peuvent r\u00e9pondre aux attaques de cybers\u00e9curit\u00e9 toujours plus importantes. Si vous \u00eates dans l&#8217;industrie de la construction et que votre entreprise n&#8217;a pas de proc\u00e9dures pratiques sur la fa\u00e7on de g\u00e9rer les cyberattaques, voici quelques-unes des mesures que vous pouvez mettre en \u0153uvre pour assurer la s\u00e9curit\u00e9 de votre entreprise de construction et de vos donn\u00e9es.<\/p>\n<h2>Une bonne formation des employ\u00e9s<\/h2>\n<p>Dans la plupart des cas, les entreprises du secteur de la construction minimisent souvent la menace \u00e9minente des attaques de cybers\u00e9curit\u00e9 car elles supposent qu&#8217;elles sont trop petites pour \u00eatre cibl\u00e9es. Cependant, les entreprises qui entrent dans cette cat\u00e9gorie sont les cibles les plus faciles du cyberpiratage. Par cons\u00e9quent, pour \u00e9viter que de tels incidents ne se produisent dans votre entreprise de construction, il est tr\u00e8s important de former vos employ\u00e9s en leur fournissant les informations n\u00e9cessaires sur la mani\u00e8re de pr\u00e9venir les menaces de cybers\u00e9curit\u00e9 par des pirates.<\/p>\n<p>Les employ\u00e9s travaillant dans les industries de la construction devraient suivre une formation obligatoire sur la cybers\u00e9curit\u00e9 afin qu&#8217;ils puissent comprendre de quoi il s&#8217;agit et comment la pr\u00e9venir. Le processus de formation peut commencer par permettre aux travailleurs de se familiariser avec les termes importants de la cybers\u00e9curit\u00e9 tels que antivirus, pirates, logiciels malveillants, hame\u00e7onnage par e-mail et avoir un b sauvegarde de vos donn\u00e9es.<\/p>\n<p>Lorsque les travailleurs comprendront ce qu&#8217;est le piratage, ils seront plus prudents lorsqu&#8217;ils utiliseront Internet et d&#8217;autres appareils \u00e9lectroniques. Une proc\u00e9dure simple, telle que la r\u00e9alisation d&#8217;une analyse antivirus sur vos ordinateurs, peut grandement contribuer \u00e0 identifier les menaces potentielles et \u00e0 les bloquer avant qu&#8217;elles ne puissent nuire aux entreprises ou aux donn\u00e9es personnelles. La mise \u00e0 jour r\u00e9guli\u00e8re de la base de donn\u00e9es antivirus peut grandement contribuer \u00e0 d\u00e9jouer les mauvaises tentatives des pirates.<\/p>\n<p>De plus, avoir une connaissance ad\u00e9quate de l&#8217;identification des e-mails de phishing peut emp\u00eacher les travailleurs de la construction d&#8217;ouvrir des liens suspects qui sont envoy\u00e9s par des pirates imitateurs qui peuvent compromettre la s\u00e9curit\u00e9 des donn\u00e9es et des syst\u00e8mes.<\/p>\n<h3>Utilisation d&#8217;ordinateurs industriels et de tablettes portables bien s\u00e9curis\u00e9s<\/h3>\n<p>Les ordinateurs et tablettes industriels durcis font d\u00e9sormais partie int\u00e9grante de l&#8217;automatisation de l&#8217;industrie de la construction. Les tablettes robustes modernes sont con\u00e7ues avec des fonctionnalit\u00e9s de haute s\u00e9curit\u00e9 qui aident \u00e0 prot\u00e9ger les donn\u00e9es sensibles contre tout acc\u00e8s non autoris\u00e9. Les dispositifs de s\u00e9curit\u00e9 avec lecteurs de cartes CAC, scanners, \u00e9crans de verrouillage prot\u00e9g\u00e9s par mot de passe contribuent grandement \u00e0 emp\u00eacher le vol de donn\u00e9es par des personnes non autoris\u00e9es.<\/p>\n<h3>Plan de r\u00e9ponse efficace en mati\u00e8re de cybers\u00e9curit\u00e9<\/h3>\n<p>Pour \u00eatre ad\u00e9quatement pr\u00e9par\u00e9e, toute entreprise de construction doit avoir mis en place un plan d&#8217;intervention en cas d&#8217;incident. Ce faisant, vous \u00eates en mesure de d\u00e9terminer le type de r\u00e9ponse que vous proposerez pour g\u00e9rer la situation en cas de v\u00e9ritable attaque de cybers\u00e9curit\u00e9.<\/p>\n<p>Lorsqu&#8217;il existe un plan de r\u00e9ponse aux incidents de cyberattaque appropri\u00e9, les entreprises de construction peuvent minimiser les dommages ou emp\u00eacher toute attaque et l&#8217;acc\u00e8s aux donn\u00e9es classifi\u00e9es et \u00e0 d&#8217;autres mat\u00e9riaux cruciaux. Vous aurez \u00e9galement un centre de commandement car vous avez d\u00e9j\u00e0 d\u00e9crit le d\u00e9partement ou les \u00e9quipes qui prendront en charge le processus de r\u00e9ponse, \u00e9vitant ainsi toute confusion.<\/p>\n<p>Que vous ayez une petite ou une grande entreprise de construction, la cr\u00e9ation d&#8217;un plan de r\u00e9ponse aux incidents simplifiera le processus de gestion des menaces de cybers\u00e9curit\u00e9 en lan\u00e7ant une r\u00e9ponse bien coordonn\u00e9e en temps r\u00e9el.<\/p>\n<p>Avec des fonctionnalit\u00e9s de s\u00e9curit\u00e9 aussi efficaces, vous pouvez m\u00eame \u00eatre moins inquiet si des tablettes et des ordinateurs mobiles sont vol\u00e9s sur les chantiers de construction ou tombent entre de mauvaises mains. Lorsque les donn\u00e9es de votre entreprise de construction sont bien prot\u00e9g\u00e9es, il deviendra plus facile d&#8217;am\u00e9liorer la confiance des travailleurs ainsi que la r\u00e9putation de l&#8217;entreprise. Les cyberattaques dans le secteur de la construction peuvent \u00eatre minimis\u00e9es si les entreprises adoptent les approches sugg\u00e9r\u00e9es ci-dessus non seulement pour prot\u00e9ger leurs donn\u00e9es, mais \u00e9galement pour mettre en place une strat\u00e9gie de r\u00e9ponse pratique en cas de menace de cybers\u00e9curit\u00e9.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>[:]\n","protected":false},"excerpt":{"rendered":"<p>[:en][:es][:fr][:]<\/p>\n","protected":false},"author":92,"featured_media":83194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"wpupg_custom_link":[],"wpupg_custom_link_behaviour":[],"wpupg_custom_link_nofollow":[],"wpupg_custom_image":[],"wpupg_custom_image_id":[],"footnotes":""},"categories":[132],"tags":[],"class_list":{"0":"post-83193","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-informations"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Dealing With Cybersecurity in the Construction Industry | Ruggtek<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ruggtek.com\/fr\/la-cybersecurite-dans-le-secteur-de-la-construction\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dealing With Cybersecurity in the Construction Industry\" \/>\n<meta property=\"og:description\" content=\"[:en][:es][:fr][:]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ruggtek.com\/fr\/la-cybersecurite-dans-le-secteur-de-la-construction\/\" \/>\n<meta property=\"og:site_name\" content=\"Ruggtek\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ruggtek\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-16T10:58:15+00:00\" \/>\n<meta name=\"author\" content=\"Ruggtek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruggtek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/\"},\"author\":{\"name\":\"Ruggtek\",\"@id\":\"https:\/\/www.ruggtek.com\/#\/schema\/person\/de81bd38e0d0678f477565eaebc1379f\"},\"headline\":\"Dealing With Cybersecurity in the Construction Industry\",\"datePublished\":\"2022-12-16T10:58:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/\"},\"wordCount\":4293,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.ruggtek.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Useful Informations\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/\",\"url\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/\",\"name\":\"Dealing With Cybersecurity in the Construction Industry | Ruggtek\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruggtek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2022-12-16T10:58:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ruggtek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dealing With Cybersecurity in the Construction Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ruggtek.com\/#website\",\"url\":\"https:\/\/www.ruggtek.com\/\",\"name\":\"Ruggtek \u2013 Tablet Industriali Rugged\",\"description\":\"Rugged mobile computer\",\"publisher\":{\"@id\":\"https:\/\/www.ruggtek.com\/#organization\"},\"alternateName\":\"Ruggtek Rugged Devices\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ruggtek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ruggtek.com\/#organization\",\"name\":\"Ruggtek\",\"url\":\"https:\/\/www.ruggtek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ruggtek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ruggtek.com\/wp-content\/uploads\/2023\/11\/ruggtek.png\",\"contentUrl\":\"https:\/\/www.ruggtek.com\/wp-content\/uploads\/2023\/11\/ruggtek.png\",\"width\":800,\"height\":800,\"caption\":\"Ruggtek\"},\"image\":{\"@id\":\"https:\/\/www.ruggtek.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ruggtek\/\",\"https:\/\/www.instagram.com\/ruggtek\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ruggtek.com\/#\/schema\/person\/de81bd38e0d0678f477565eaebc1379f\",\"name\":\"Ruggtek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/15b3b479604b8f96747e838daf82a61e1158351ff0968904187bfb9a784aba6b?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15b3b479604b8f96747e838daf82a61e1158351ff0968904187bfb9a784aba6b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15b3b479604b8f96747e838daf82a61e1158351ff0968904187bfb9a784aba6b?s=96&d=mm&r=g\",\"caption\":\"Ruggtek\"},\"url\":\"https:\/\/www.ruggtek.com\/fr\/author\/skeruggtek\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9 dans l'industrie de la construction | Ruggtek","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ruggtek.com\/fr\/la-cybersecurite-dans-le-secteur-de-la-construction\/","og_locale":"fr_FR","og_type":"article","og_title":"Dealing With Cybersecurity in the Construction Industry","og_description":"[:en][:es][:fr][:]","og_url":"https:\/\/www.ruggtek.com\/fr\/la-cybersecurite-dans-le-secteur-de-la-construction\/","og_site_name":"Ruggtek","article_publisher":"https:\/\/www.facebook.com\/ruggtek\/","article_published_time":"2022-12-16T10:58:15+00:00","author":"Ruggtek","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Ruggtek","Dur\u00e9e de lecture estim\u00e9e":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#article","isPartOf":{"@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/"},"author":{"name":"Ruggtek","@id":"https:\/\/www.ruggtek.com\/#\/schema\/person\/de81bd38e0d0678f477565eaebc1379f"},"headline":"Dealing With Cybersecurity in the Construction Industry","datePublished":"2022-12-16T10:58:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/"},"wordCount":4293,"commentCount":0,"publisher":{"@id":"https:\/\/www.ruggtek.com\/#organization"},"image":{"@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage"},"thumbnailUrl":"","articleSection":["Useful Informations"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/","url":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/","name":"La cybers\u00e9curit\u00e9 dans l'industrie de la construction | Ruggtek","isPartOf":{"@id":"https:\/\/www.ruggtek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage"},"thumbnailUrl":"","datePublished":"2022-12-16T10:58:15+00:00","breadcrumb":{"@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.ruggtek.com\/dealing-with-cybersecurity-in-the-construction-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ruggtek.com\/"},{"@type":"ListItem","position":2,"name":"Dealing With Cybersecurity in the Construction Industry"}]},{"@type":"WebSite","@id":"https:\/\/www.ruggtek.com\/#website","url":"https:\/\/www.ruggtek.com\/","name":"Ruggtek - Tablettes industrielles durcies","description":"Ordinateur mobile robuste","publisher":{"@id":"https:\/\/www.ruggtek.com\/#organization"},"alternateName":"Ruggtek Rugged Devices","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ruggtek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ruggtek.com\/#organization","name":"Ruggtek","url":"https:\/\/www.ruggtek.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ruggtek.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.ruggtek.com\/wp-content\/uploads\/2023\/11\/ruggtek.png","contentUrl":"https:\/\/www.ruggtek.com\/wp-content\/uploads\/2023\/11\/ruggtek.png","width":800,"height":800,"caption":"Ruggtek"},"image":{"@id":"https:\/\/www.ruggtek.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ruggtek\/","https:\/\/www.instagram.com\/ruggtek\/"]},{"@type":"Person","@id":"https:\/\/www.ruggtek.com\/#\/schema\/person\/de81bd38e0d0678f477565eaebc1379f","name":"Ruggtek","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/15b3b479604b8f96747e838daf82a61e1158351ff0968904187bfb9a784aba6b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/15b3b479604b8f96747e838daf82a61e1158351ff0968904187bfb9a784aba6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15b3b479604b8f96747e838daf82a61e1158351ff0968904187bfb9a784aba6b?s=96&d=mm&r=g","caption":"Ruggtek"},"url":"https:\/\/www.ruggtek.com\/fr\/author\/skeruggtek\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/posts\/83193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/comments?post=83193"}],"version-history":[{"count":0,"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/posts\/83193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/media?parent=83193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/categories?post=83193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ruggtek.com\/fr\/wp-json\/wp\/v2\/tags?post=83193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}