{"version":"1.0","provider_name":"Sage Advice Maroc","provider_url":"https:\/\/www.sage.com\/fr-ma\/blog","author_name":"C\u00e9dric Suire","author_url":"https:\/\/www.sage.com\/fr-ma\/blog\/author\/cedricsuire1\/","title":"Cyber-risques : comment prot\u00e9ger votre entreprise de la fraude aux fournisseurs ?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"unh8enj64j\"><a href=\"https:\/\/www.sage.com\/fr-ma\/blog\/fraude-fournisseurs-proteger-entreprises\/\">Cyber-risques : comment prot\u00e9ger votre entreprise de la fraude aux fournisseurs ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.sage.com\/fr-ma\/blog\/fraude-fournisseurs-proteger-entreprises\/embed\/#?secret=unh8enj64j\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cyber-risques : comment prot\u00e9ger votre entreprise de la fraude aux fournisseurs ?\u00a0\u00bb &#8212; Sage Advice Maroc\" data-secret=\"unh8enj64j\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.sage.com\/fr-ma\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.sage.com\/fr-ma\/blog\/wp-content\/uploads\/sites\/23\/2020\/06\/GAP-PERSONNEL_2017_X3_BB_241017_0588.31005.jpg","thumbnail_width":1912,"thumbnail_height":1275,"description":"La fraude aux fournisseurs demeure, encore aujourd\u2019hui, la technique pr\u00e9f\u00e9r\u00e9e des pirates pour duper les entreprises. Une escroquerie toujours en vogue, qui plus est sur fond de d\u00e9sorganisation des entreprises et le recours massif au t\u00e9l\u00e9travail. Nous vous pr\u00e9sentons donc les mesures \u00e0 prendre pour mettre en place des outils de s\u00e9curit\u00e9 informatique. Vous avez [&hellip;]"}