{"id":51521,"date":"2025-11-06T12:21:08","date_gmt":"2025-11-06T19:21:08","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=51521"},"modified":"2026-03-07T16:27:06","modified_gmt":"2026-03-07T23:27:06","slug":"principales-conclusions-les-priorites-federales-en-matiere-de-cybersecurite-evoluent-vers-une-nouvelle-strategie-de-securite-2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/","title":{"rendered":"Principales conclusions : \u00c9tat des lieux des principes fondamentaux de l&#039;hygi\u00e8ne num\u00e9rique"},"content":{"rendered":"<section class=\"bs-section bs-section-4b500e99ef8cdebaf3ddaa6a36e7fb461e386ddc bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\">\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-d4f201cab41f0341a7cbb32888b9ef9b39ce8318 bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Infographies<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Principales conclusions : \u00c9tat des lieux des principes fondamentaux de l&#039;hygi\u00e8ne num\u00e9rique<\/h1>\n\n\n<p>Cette infographie d\u00e9taille comment, malgr\u00e9 les restrictions budg\u00e9taires f\u00e9d\u00e9rales en mati\u00e8re de cybers\u00e9curit\u00e9, comme celle de la CISA, de nombreuses organisations peinent encore \u00e0 ma\u00eetriser les fondamentaux, m\u00eame avec des investissements records dans ce domaine. Consultez le guide pour d\u00e9couvrir les principaux enseignements de notre rapport de recherche.,<a href=\"https:\/\/swimlane.com\/fr\/ressources\/rapports\/ressources\/rapports\/fondamentaux-de-la-cybersecurite\/\"> Des failles dans les fondations : pourquoi la s\u00e9curit\u00e9 de base \u00e9choue encore. <\/a>Cela illustre comment des lacunes critiques en mati\u00e8re de correctifs, de contr\u00f4le d&#039;acc\u00e8s et de supervision des fournisseurs peuvent transformer m\u00eame des erreurs mineures dans les fondamentaux de la cybers\u00e9curit\u00e9 en incidents de s\u00e9curit\u00e9 majeurs.<\/p>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column  col-sm-0 col-md-12   bs-column-5c965a622edf4209812894e81416a84e7ad33ed8 bs-column---default\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div class=\"wppdfemb-frame-container-1\" style=\"-webkit-overflow-scrolling:auto;\">\n\t\t\t<iframe class=\"pdfembed-iframe nonfullscreen wppdf-emb-iframe-1\"\n\t\t\t\tsrc=\"https:\/\/swimlane.com\/fr\/?pdfemb-data=eyJwZGZJRCI6NTE1MzAsInVybCI6Imh0dHBzOlwvXC9zd2ltbGFuZS5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcL0luZm9ncmFwaGljLVN0YXRlLW9mLUN5YmVyLUh5Z2llbmVsbmsucGRmIiwiVHJwQ29udGVudFJlc3RyaWN0aW9uIjp7InJlc3RyaWN0aW9uX3R5cGUiOiJleGNsdWRlIiwic2VsZWN0ZWRfbGFuZ3VhZ2VzIjpbXSwicGFuZWxfb3BlbiI6dHJ1ZX0sImluZGV4IjoxLCJ3bV90ZXh0IjoiIn0\"\n\t\t\t\t\t\t\t\tdata-pdf-id=\"51530\"\n\t\t\t\tdata-pdf-index=\"1\"\n\t\t\t\tstyle=\"border:none;width:100%;max-width:100%;height:100vh;\"\n\t\t\t\tscrolling=\"yes\">\n\t\t\t<\/iframe>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-aa6eb5dfda60c91b965e7c072905992179763573 bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Vous pourriez \u00e9galement \u00eatre int\u00e9ress\u00e9 par<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-b43fa869b558d43fa93bdd41503b8820f2f54817 bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f873bf5c7bb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/datasheets\/swimlane-turbine-platform-overview\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Turbine-Overview-1.jpg' class='img-fluid' alt='Turbine de couloir de nage ' title='Style OG 2025 - Pr\u00e9sentation de la turbine OG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Fiche de donn\u00e9es<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Aper\u00e7u de la plateforme Swimlane Turbine<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f873bf5e3c0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/reports\/cyber-fundamentals\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Cyber-Security-Fundamentals.png' class='img-fluid' alt='Fissures dans la recherche de la Fondation Cyber Fundamentals' title='Principes fondamentaux de la cybers\u00e9curit\u00e9 OG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Rapport<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Des failles dans les fondations\u00a0: pourquoi la s\u00e9curit\u00e9 de base \u00e9choue encore.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f873bf5f91e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/e-books\/ai-automation-beyond-soar\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Extend-Beyond-SOAR.png' class='img-fluid' alt='matrice de pr\u00e9paration \u00e0 l&#039;automatisation' title='OG Extend Beyond SOAR'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Livre \u00e9lectronique<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Allez au-del\u00e0 de SOAR\u00a0: entrez dans le futur gr\u00e2ce \u00e0 l\u2019automatisation par l\u2019IA.\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":52180,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"State of Cyber Hygiene: Key Findings & Insights","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[114],"resource-topic":[133],"resource-industry":[],"blog-category":[],"class_list":["post-51521","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-infographics","resource-topic-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Key Findings: The State of Cyber Hygiene Fundamentals<\/title>\n<meta name=\"description\" content=\"This infographic reveals key insights from our latest research report, showing how small gaps in cyber hygiene can lead to major security incidents.\" \/>\n<meta name=\"robots\" content=\"index, nofollow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/ressources\/infographies\/principes-fondamentaux-de-la-cyberhygiene-principaux-resultats\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Findings: The State of Cyber Hygiene Fundamentals\" \/>\n<meta property=\"og:description\" content=\"This infographic reveals key insights from our latest research report, showing how small gaps in cyber hygiene can lead to major security incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/ressources\/infographies\/principes-fondamentaux-de-la-cyberhygiene-principaux-resultats\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-07T23:27:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"This infographic reveals key insights from our latest research report, showing how small gaps in cyber hygiene can lead to major security incidents.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/\",\"name\":\"Key Findings: The State of Cyber Hygiene Fundamentals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp\",\"datePublished\":\"2025-11-06T19:21:08+00:00\",\"dateModified\":\"2026-03-07T23:27:06+00:00\",\"description\":\"This infographic reveals key insights from our latest research report, showing how small gaps in cyber hygiene can lead to major security incidents.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp\",\"width\":1200,\"height\":630,\"caption\":\"Infographic: Key findings on the State of Cyber Hygiene Fundamentals and foundational security posture.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/infographics\\\/cyber-hygiene-fundamentals-key-findings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Findings: The State of Cyber Hygiene Fundamentals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Principales conclusions : \u00c9tat des lieux des principes fondamentaux de l&#039;hygi\u00e8ne num\u00e9rique","description":"Cette infographie r\u00e9v\u00e8le les principaux enseignements de notre dernier rapport de recherche, montrant comment de petites lacunes en mati\u00e8re de cybers\u00e9curit\u00e9 peuvent conduire \u00e0 des incidents de s\u00e9curit\u00e9 majeurs.","robots":{"index":"index","follow":"nofollow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/ressources\/infographies\/principes-fondamentaux-de-la-cyberhygiene-principaux-resultats\/","og_locale":"fr_FR","og_type":"article","og_title":"Key Findings: The State of Cyber Hygiene Fundamentals","og_description":"This infographic reveals key insights from our latest research report, showing how small gaps in cyber hygiene can lead to major security incidents.","og_url":"https:\/\/swimlane.com\/fr\/ressources\/infographies\/principes-fondamentaux-de-la-cyberhygiene-principaux-resultats\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-07T23:27:06+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_description":"This infographic reveals key insights from our latest research report, showing how small gaps in cyber hygiene can lead to major security incidents.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/","url":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/","name":"Principales conclusions : \u00c9tat des lieux des principes fondamentaux de l&#039;hygi\u00e8ne num\u00e9rique","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp","datePublished":"2025-11-06T19:21:08+00:00","dateModified":"2026-03-07T23:27:06+00:00","description":"Cette infographie r\u00e9v\u00e8le les principaux enseignements de notre dernier rapport de recherche, montrant comment de petites lacunes en mati\u00e8re de cybers\u00e9curit\u00e9 peuvent conduire \u00e0 des incidents de s\u00e9curit\u00e9 majeurs.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Hygiene-Fundamentals-InfogrpahicsKey-Findings-The-State-of-Cyber-Hygiene-Fundamentals.webp","width":1200,"height":630,"caption":"Infographic: Key findings on the State of Cyber Hygiene Fundamentals and foundational security posture."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/resources\/infographics\/cyber-hygiene-fundamentals-key-findings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Key Findings: The State of Cyber Hygiene Fundamentals"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/51521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":2,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/51521\/revisions"}],"predecessor-version":[{"id":54673,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/51521\/revisions\/54673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/52180"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=51521"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=51521"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=51521"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=51521"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=51521"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=51521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}