{"id":862,"date":"2025-03-03T12:20:04","date_gmt":"2025-03-03T17:20:04","guid":{"rendered":"https:\/\/elearning.flightstartsolutions.com\/index.php\/courses\/les-hotels-sont-ils-vulnerables\/"},"modified":"2025-03-21T07:06:24","modified_gmt":"2025-03-21T12:06:24","slug":"les-hotels-sont-ils-vulnerables","status":"publish","type":"lp_course","link":"https:\/\/elearning.flightstartsolutions.com\/index.php\/courses\/les-hotels-sont-ils-vulnerables\/","title":{"rendered":"Les h\u00f4tels sont-ils vuln\u00e9rables ?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h2>Description du cours<\/h2>\n<p><strong>Pourquoi les h\u00f4tels sont-ils vuln\u00e9rables aux violations de donn\u00e9es ?<\/strong><\/p>\n<p>Les h\u00f4tels sont constamment la cible de violations de donn\u00e9es. Cela est d\u00fb en grande partie \u00e0 l&#8217;acc\u00e8s Wi-Fi que nous acceptons pour \u00eatre connect\u00e9s. Des actions telles que l&#8217;acc\u00e8s en ligne \u00e0 distance aux donn\u00e9es des entreprises, les paiements par carte de cr\u00e9dit et autres \u00e9changes d&#8217;informations augmentent la vuln\u00e9rabilit\u00e9.<\/p>\n<p><strong>Des syst\u00e8mes de s\u00e9curit\u00e9 surcharg\u00e9s<\/strong><\/p>\n<p>Les cam\u00e9ras de vid\u00e9osurveillance, les syst\u00e8mes d&#8217;alarme incendie et de fum\u00e9e, les contr\u00f4les d&#8217;acc\u00e8s, les alarmes anti-intrusion et autres deviennent souvent ing\u00e9rables si votre \u00e9quipe informatique est inefficace ou inexp\u00e9riment\u00e9e. Les pirates informatiques peuvent facilement s&#8217;introduire dans un syst\u00e8me de s\u00e9curit\u00e9 centralis\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Description du cours Pourquoi les h\u00f4tels sont-ils vuln\u00e9rables aux violations de donn\u00e9es ? Les h\u00f4tels sont constamment la cible de violations de donn\u00e9es. Cela est d\u00fb en grande partie \u00e0 l&#8217;acc\u00e8s Wi-Fi que nous acceptons pour \u00eatre connect\u00e9s. Des actions telles que l&#8217;acc\u00e8s en ligne \u00e0 distance aux donn\u00e9es&#8230;<\/p>\n","protected":false},"author":1,"featured_media":863,"comment_status":"open","ping_status":"closed","template":"","course_category":[26],"course_tag":[],"class_list":["post-862","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-gratuit","course"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/lp_course\/862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=862"}],"version-history":[{"count":2,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/lp_course\/862\/revisions"}],"predecessor-version":[{"id":895,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/lp_course\/862\/revisions\/895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/863"}],"wp:attachment":[{"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=862"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/course_category?post=862"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/elearning.flightstartsolutions.com\/index.php\/wp-json\/wp\/v2\/course_tag?post=862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}