﻿{"id":1719,"date":"2020-09-15T09:59:14","date_gmt":"2020-09-15T13:59:14","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1719"},"modified":"2020-09-15T10:00:25","modified_gmt":"2020-09-15T14:00:25","slug":"combien-se-vendent-des-donnees-personnelles","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/combien-se-vendent-des-donnees-personnelles\/","title":{"rendered":"Combien se vendent vos donn\u00e9es personnelles ?"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/11\/hacking-3112539__340.png\" alt=\"\" class=\"wp-image-1174\" width=\"221\" height=\"124\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/11\/hacking-3112539__340.png 604w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/11\/hacking-3112539__340-300x169.png 300w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><\/figure><\/div>\n\n\n\n<p style=\"background-color:#5a7410\" class=\"has-text-color has-background has-medium-font-size has-very-light-gray-color\">Pourquoi utiliser des mots de passe robustes ou phrases ?<br>Pourquoi les changer fr\u00e9quemment ?<br>Pourquoi en utiliser des diff\u00e9rents pour chaque application ?<br>Pourquoi utiliser une authentification \u00e0 multiples facteurs ?<br>Pourquoi \u00e9viter de consulter ses donn\u00e9es sensibles sur un r\u00e9seau WI-FI public ?<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Pour des r\u00e9ponses \u00e0 toutes ces question, <a href=\"https:\/\/www.clubic.com\/antivirus-securite-informatique\/virus-hacker-piratage\/anonyme-internet\/actualite-12157-donnees-personnelles-vous-seriez-surpris-en-decouvrant-leur-faible-prix-sur-le-dark-web.html\">consultez l&rsquo;article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pourquoi utiliser des mots de passe robustes ou phrases ?Pourquoi les changer fr\u00e9quemment ?Pourquoi en utiliser des diff\u00e9rents pour chaque application ?Pourquoi utiliser une authentification \u00e0 multiples facteurs ?Pourquoi \u00e9viter de consulter ses donn\u00e9es sensibles sur un r\u00e9seau WI-FI public ? Pour des r\u00e9ponses \u00e0 toutes ces question, consultez l&rsquo;article.<\/p>\n","protected":false},"author":4,"featured_media":394,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1719"}],"version-history":[{"count":5,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1719\/revisions"}],"predecessor-version":[{"id":1724,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1719\/revisions\/1724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/394"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}