{"id":3442,"date":"2022-06-27T12:45:31","date_gmt":"2022-06-27T12:45:31","guid":{"rendered":"https:\/\/locaterisk.com\/?page_id=3442"},"modified":"2022-06-29T10:39:37","modified_gmt":"2022-06-29T10:39:37","slug":"it-sicherheit-energieversorgung","status":"publish","type":"page","link":"https:\/\/locaterisk.com\/fr\/it-sicherheit-energieversorgung\/","title":{"rendered":"S\u00e9curit\u00e9 informatique Fournisseurs d'\u00e9nergie"},"content":{"rendered":"<h1 class=\"blog-title wp-block-heading\" id=\"case-study-mit-it-monitoring-in-richtung-sichere-stadt\">Fournisseurs d'\u00e9nergie : comment garder en permanence un \u0153il sur la s\u00e9curit\u00e9 informatique de votre bureau<\/h1>\n\n\n\n<p>La responsabilit\u00e9 est immense. En tant qu'op\u00e9rateurs d'infrastructures critiques , les entreprises d'approvisionnement en \u00e9nergie sont expos\u00e9es quasi en permanence \u00e0 des tentatives d'attaque. En r\u00e8gle g\u00e9n\u00e9rale, les r\u00e9seaux des processus d'approvisionnement sont physiquement s\u00e9par\u00e9s de l'administration pour des raisons de s\u00e9curit\u00e9. Mais m\u00eame si seules l'administration et les donn\u00e9es des clients sont touch\u00e9es, les dommages se chiffrent rapidement en millions. En tant que mesure pr\u00e9ventive, les moniteurs de s\u00e9curit\u00e9 informatique fournissent la transparence n\u00e9cessaire \u00e0 la surface d'attaque informatique externe. Ils recensent en permanence les points faibles \u00e9ventuels et aident \u00e0 minimiser rapidement les risques.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-1024x437.png\" alt=\"\" class=\"wp-image-3456\" width=\"840\" height=\"359\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-1024x437.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-300x128.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-768x328.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-18x8.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png 1080w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure><\/div>\n\n<h3 style=\"text-align: left;\">La s\u00e9curit\u00e9 informatique d'un point de vue externe : les groupes \u00e9nerg\u00e9tiques en Allemagne<\/h3>\n<p><strong>Un besoin d'action consid\u00e9rable en mati\u00e8re de s\u00e9curit\u00e9 informatique<br \/><\/strong><span class=\"s1\">L'approvisionnement \u00e9nerg\u00e9tique n\u00e9cessite un fonctionnement sans faille de l'informatique. Il est d'autant plus pr\u00e9occupant de constater que les menaces de ransomware et les risques tout au long de la cha\u00eene d'approvisionnement des produits et services informatiques dans le secteur de l'\u00e9nergie ont augment\u00e9 de mani\u00e8re drastique ces derni\u00e8res ann\u00e9es. Avec la loi sur la s\u00e9curit\u00e9 informatique 2.0, le gouvernement f\u00e9d\u00e9ral oblige tous les op\u00e9rateurs d'infrastructures critiques (CRITIS) \u00e0 prendre des mesures de s\u00e9curit\u00e9 \u00e9tendues pour leur syst\u00e8me informatiques. La fr\u00e9quence \u00e9lev\u00e9 des attaques agressives place en outre les entreprises devant la t\u00e2che de mettre \u00e0 disposition suffisamment de ressources. En effet, seules l'analyse et l'optimisation continues des syst\u00e8mes de s\u00e9curit\u00e9 et des mesures de protection garantissent la continuit\u00e9 de l'activit\u00e9 attendue par la soci\u00e9t\u00e9.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Notre analyse de 14 groupes \u00e9nerg\u00e9tiques a r\u00e9v\u00e9l\u00e9 qu'il y avait encore beaucoup \u00e0 faire en mati\u00e8re de s\u00e9curit\u00e9 informatique. La collecte de donn\u00e9es s'est faite par la saisie et le traitement d'informations provenant de sources accessibles au public.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h3 style=\"text-align: left;\">Les r\u00e9sultats\u00a0<\/h3>\n<p><strong>Envoi de courrier prot\u00e9g\u00e9<\/strong><br \/>86 % des groupes \u00e9nerg\u00e9tiques contr\u00f4l\u00e9s envoyaient des e-mails partiellement non prot\u00e9g\u00e9s (sans inscription SPF), ce qui facilite les attaques de spam et de phishing par falsification des e-mails pour les pirates.<\/p>\n<p><strong>Accessibilit\u00e9 des interfaces du syst\u00e8me<\/strong><br \/><span style=\"font-weight: 400;\">79 % ne prot\u00e8gent pas correctement tous les syst\u00e8mes de base de donn\u00e9es de l'entreprise contre les cyber-attaques. <\/span>Les syst\u00e8mes accessibles de l'ext\u00e9rieur et non s\u00e9curis\u00e9s facilitent l'acc\u00e8s des pirates aux donn\u00e9es sensibles.<\/p>\n<p><strong>S\u00e9curit\u00e9 de la transmission des donn\u00e9es<br \/><\/strong>En outre, 100 % permettaient la transmission de donn\u00e9es avec un cryptage de transport obsol\u00e8te, ce qui favorise le vol de donn\u00e9es.<\/p>\n<p><strong>Applications obsol\u00e8tes<br \/><\/strong>Dans 79 % des cas, au moins une application pr\u00e9sentant une faille de s\u00e9curit\u00e9 potentielle de haute criticit\u00e9 a \u00e9t\u00e9 trouv\u00e9e. Les applications ne disposant pas de mises \u00e0 jour de s\u00e9curit\u00e9 sont une porte d'entr\u00e9e bienvenue pour les attaquants.<\/p>\n<p><strong>Conformit\u00e9 au RGPD<br \/><\/strong>100% des groupes \u00e9nerg\u00e9tiques utilisaient des cookies de suivi sans l'autorisation de l'utilisateur. Dans ces cas, des avertissements et des amendes peuvent \u00eatre inflig\u00e9s.<\/p>\n<p>\u00a0<\/p>\n<h3>Obtenez un aper\u00e7u de la surface d'attaque informatique externe de votre entreprise<\/h3>\n<p>Les responsables informatiques font de leur mieux pour garantir la s\u00e9curit\u00e9 de leurs syst\u00e8mes informatiques. Mais comment d\u00e9montrer en permanence l'\u00e9tat actuel de la performance de s\u00e9curit\u00e9 ? Avec l'analyse de la s\u00e9curit\u00e9 informatique de LocateRisk, c'est simple et rapide. Venez vous en convaincre par vous-m\u00eame : Les organisations int\u00e9ress\u00e9es peuvent obtenir gratuitement une \u00e9valuation de la s\u00e9curit\u00e9 de leur environnement informatique, y compris un aper\u00e7u de 30 minutes de l'analyse d\u00e9taill\u00e9e, en appelant le : T\u00e9l. 06151 6290246 ou par e-mail \u00e0 : <a href=\"mailto:em@LocateRisk.com\">em@LocateRisk.com<\/a><\/p>\n<h3>\u00c9tude de cas entreprise de logistique \u00e9nerg\u00e9tique<\/h3>\n<p>Lire maintenant : <a href=\"https:\/\/locaterisk.com\/fr\/casestudy-energielogistik\/\">R\u00e9pondre aux exigences KRITIS gr\u00e2ce \u00e0 une surveillance continue<\/a>\u00a0<\/p>\n<p>\u00a0<\/p>\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-sicherheit-energieversorgung\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>J'ai fait le <a href=\"https:\/\/locaterisk.com\/fr\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">politique de confidentialit\u00e9.<\/a> lu<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Fixer un rendez-vous pour une d\u00e9mo en direct<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Energieversorger: So behalten Sie die IT-Sicherheit Ihrer Office-IT jederzeit im Blick Die Verantwortung ist immens. Als KRITIS-Betreiber sind Enregieversorgungsunternehmen quasi permanent Angriffsversuchen ausgesetzt. In der Regel sind die Netze der Versorgungsprozesse aus Sicherheitsgr\u00fcnden physisch von der Verwaltung getrennt. Doch selbst wenn es NUR die Administration und Kundendaten trifft, geht der Schaden schnell in die Millionen. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3456,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3442","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit Energieversorger - LocateRisk<\/title>\n<meta name=\"description\" content=\"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/it-sicherheit-energieversorgung\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit Energieversorger - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/it-sicherheit-energieversorgung\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T10:39:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"461\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/\",\"name\":\"IT-Sicherheit Energieversorger - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\",\"datePublished\":\"2022-06-27T12:45:31+00:00\",\"dateModified\":\"2022-06-29T10:39:37+00:00\",\"description\":\"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\",\"width\":1080,\"height\":461,\"caption\":\"Photo by Nikola Johnny Mirkovic\\\/Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheit Energieversorger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 informatique des fournisseurs d'\u00e9nergie - LocateRisk","description":"La s\u00e9curit\u00e9 informatique est une priorit\u00e9 absolue pour les fournisseurs d'\u00e9nergie. D\u00e9couvrez votre situation en mati\u00e8re de s\u00e9curit\u00e9 informatique et ce que vous pouvez faire pour minimiser les cyber-risques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/it-sicherheit-energieversorgung\/","og_locale":"fr_FR","og_type":"article","og_title":"IT-Sicherheit Energieversorger - LocateRisk","og_description":"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.","og_url":"https:\/\/locaterisk.com\/fr\/it-sicherheit-energieversorgung\/","og_site_name":"LocateRisk","article_modified_time":"2022-06-29T10:39:37+00:00","og_image":[{"width":1080,"height":461,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/","url":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/","name":"S\u00e9curit\u00e9 informatique des fournisseurs d'\u00e9nergie - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","datePublished":"2022-06-27T12:45:31+00:00","dateModified":"2022-06-29T10:39:37+00:00","description":"La s\u00e9curit\u00e9 informatique est une priorit\u00e9 absolue pour les fournisseurs d'\u00e9nergie. D\u00e9couvrez votre situation en mati\u00e8re de s\u00e9curit\u00e9 informatique et ce que vous pouvez faire pour minimiser les cyber-risques.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","width":1080,"height":461,"caption":"Photo by Nikola Johnny Mirkovic\/Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheit Energieversorger"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/3442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=3442"}],"version-history":[{"count":48,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/3442\/revisions"}],"predecessor-version":[{"id":3653,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/3442\/revisions\/3653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/3456"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=3442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}