{"id":643,"date":"2019-05-30T22:34:46","date_gmt":"2019-05-30T20:34:46","guid":{"rendered":"http:\/\/142.44.138.36\/~seclouf\/643\/"},"modified":"2019-05-30T22:34:46","modified_gmt":"2019-05-30T20:34:46","slug":"643","status":"publish","type":"post","link":"https:\/\/se-cloud-experts.com\/en\/643\/","title":{"rendered":""},"content":{"rendered":"<p>The question is always asked but rarely, users realize the true implication of the answer.<br \/>\n<!--more--><\/p>\n<hr \/>\n<p>The <strong>Cloud<\/strong> is as safe as you can make it.<\/p>\n<p>The <strong>users<\/strong> themselves are the main <strong>security risk<\/strong>.<br \/>\nLack of knowledge on the best practice, tendency to trust employees, colleagues or even strangers, bad habits or simply habits are all things that make the web, and by this, the cloud, less secure.<\/p>\n<hr \/>\n<p><span style=\"font-weight: 400;\">Let&#8217;s review some numbers :<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; 95% of all cyber-security incident involved <strong>human errors<\/strong> &#8211; <\/span><a href=\"http:\/\/fr.slideshare.net\/ibmsecurity\/2014-cyber-security-intelligence-index\"><span style=\"font-weight: 400;\">IBM<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Up to 45% of users will fall to the most sophisticated <strong>phishing<\/strong> attempts &#8211; <\/span><a href=\"http:\/\/services.google.com\/fh\/files\/blogs\/google_hijacking_study_2014.pdf\"><span style=\"font-weight: 400;\">Google<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; 70% of <strong>passwords<\/strong> are <strong>used on multiple sites<\/strong> &#8211; <\/span><a href=\"http:\/\/www.lightbluetouchpaper.org\/2011\/02\/09\/measuring-password-re-use-empirically\/\"><span style=\"font-weight: 400;\">Cambridge<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">And the list goes on&#8230;<\/span><\/p>\n<hr \/>\n<p>As you can see below, IT <strong>experts<\/strong> and <strong>nonexperts<\/strong> have huge <strong>differences<\/strong> in what they see as &#8220;secure&#8221;:<\/p>\n<p>&#8230;<\/p>\n<p><a href=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2477\" src=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png\" alt=\"Beutler_Google_Security-practices-v6\" width=\"660\" height=\"486\" \/><\/a><\/p>\n<hr \/>\n<p><span style=\"font-weight: 400;\">We all have <strong>bad habits<\/strong> and major <strong>misconceptions<\/strong> about <strong>security<\/strong>.<\/span><\/p>\n<p>&#8230;<\/p>\n<p><a href=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Passwords-myths.png\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2476\" src=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Passwords-myths.png\" alt=\"Passwords myths\" width=\"740\" height=\"601\" \/><\/a><\/p>\n<hr \/>\n<p><span style=\"font-weight: 400;\">And we are facing professionals that make a living out of exploiting every loophole with very sophisticated tools.<br \/>\n<\/span><\/p>\n<p>&#8230;<\/p>\n<p><a href=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Phishing-Horizontal-1sur2.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2475\" src=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Phishing-Horizontal-1sur2.jpg\" alt=\"Phishing - Horizontal 1sur2\" width=\"1057\" height=\"787\" \/><\/a><\/p>\n<p><a href=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Phishing-Horizontal-2sur2.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2478\" src=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Phishing-Horizontal-2sur2.jpg\" alt=\"Phishing - Horizontal 2sur2\" width=\"1043\" height=\"787\" \/><\/a><\/p>\n<hr \/>\n<p>Sure, we could all <strong>store<\/strong> what is important in unreachable vaults.<br \/>\nBut could information be both <strong>accessible<\/strong> AND <strong>secure<\/strong> ?<br \/>\n&#8211;<br \/>\nIn subsequent posts, we will show you many <strong>tips and tricks<\/strong> to become better in this complex environment.<br \/>\nBut first, let&#8217;s all be aware of our weaknesses.<\/p>\n<hr \/>\n<p><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/se-cloud-experts.com\/en\/newsfeed\/\">Click here<\/a><\/span>\u00a0to go back to the newsfeed page<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The question is always asked but rarely, users realize the true implication of the answer.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"inline_featured_image":false},"categories":[1],"tags":[],"topics":[30],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/se-cloud-experts.com\/en\/643\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- GEO-MENTOR\" \/>\n<meta property=\"og:description\" content=\"The question is always asked but rarely, users realize the true implication of the answer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/se-cloud-experts.com\/en\/643\/\" \/>\n<meta property=\"og:site_name\" content=\"GEO-MENTOR\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-30T20:34:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Communication SECloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/se-cloud-experts.com\/#website\",\"url\":\"https:\/\/se-cloud-experts.com\/\",\"name\":\"GEO-MENTOR\",\"description\":\"Sp\u00e9cialiste des solutions Google pour entreprises\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/se-cloud-experts.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/se-cloud-experts.com\/en\/643\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png\",\"contentUrl\":\"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/se-cloud-experts.com\/en\/643\/#webpage\",\"url\":\"https:\/\/se-cloud-experts.com\/en\/643\/\",\"name\":\"- GEO-MENTOR\",\"isPartOf\":{\"@id\":\"https:\/\/se-cloud-experts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/se-cloud-experts.com\/en\/643\/#primaryimage\"},\"datePublished\":\"2019-05-30T20:34:46+00:00\",\"dateModified\":\"2019-05-30T20:34:46+00:00\",\"author\":{\"@id\":\"https:\/\/se-cloud-experts.com\/#\/schema\/person\/6c07ab40c538f72860e695e9e8167505\"},\"breadcrumb\":{\"@id\":\"https:\/\/se-cloud-experts.com\/en\/643\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/se-cloud-experts.com\/en\/643\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/se-cloud-experts.com\/en\/643\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\",\"item\":\"https:\/\/se-cloud-experts.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/se-cloud-experts.com\/#\/schema\/person\/6c07ab40c538f72860e695e9e8167505\",\"name\":\"Communication SECloud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/se-cloud-experts.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe8ca52d41bbf866b18f52d27ea82bd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe8ca52d41bbf866b18f52d27ea82bd4?s=96&d=mm&r=g\",\"caption\":\"Communication SECloud\"},\"url\":\"https:\/\/se-cloud-experts.com\/en\/author\/communicationsecloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/se-cloud-experts.com\/en\/643\/","og_locale":"en_US","og_type":"article","og_title":"- GEO-MENTOR","og_description":"The question is always asked but rarely, users realize the true implication of the answer.","og_url":"https:\/\/se-cloud-experts.com\/en\/643\/","og_site_name":"GEO-MENTOR","article_published_time":"2019-05-30T20:34:46+00:00","og_image":[{"url":"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Communication SECloud","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/se-cloud-experts.com\/#website","url":"https:\/\/se-cloud-experts.com\/","name":"GEO-MENTOR","description":"Sp\u00e9cialiste des solutions Google pour entreprises","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/se-cloud-experts.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/se-cloud-experts.com\/en\/643\/#primaryimage","inLanguage":"en-US","url":"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png","contentUrl":"https:\/\/se-cloud-experts.com\/wp\/wp-content\/uploads\/2016\/02\/Beutler_Google_Security-practices-v6.png"},{"@type":"WebPage","@id":"https:\/\/se-cloud-experts.com\/en\/643\/#webpage","url":"https:\/\/se-cloud-experts.com\/en\/643\/","name":"- GEO-MENTOR","isPartOf":{"@id":"https:\/\/se-cloud-experts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/se-cloud-experts.com\/en\/643\/#primaryimage"},"datePublished":"2019-05-30T20:34:46+00:00","dateModified":"2019-05-30T20:34:46+00:00","author":{"@id":"https:\/\/se-cloud-experts.com\/#\/schema\/person\/6c07ab40c538f72860e695e9e8167505"},"breadcrumb":{"@id":"https:\/\/se-cloud-experts.com\/en\/643\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/se-cloud-experts.com\/en\/643\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/se-cloud-experts.com\/en\/643\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"","item":"https:\/\/se-cloud-experts.com\/en\/"},{"@type":"ListItem","position":2,"name":""}]},{"@type":"Person","@id":"https:\/\/se-cloud-experts.com\/#\/schema\/person\/6c07ab40c538f72860e695e9e8167505","name":"Communication SECloud","image":{"@type":"ImageObject","@id":"https:\/\/se-cloud-experts.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/fe8ca52d41bbf866b18f52d27ea82bd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe8ca52d41bbf866b18f52d27ea82bd4?s=96&d=mm&r=g","caption":"Communication SECloud"},"url":"https:\/\/se-cloud-experts.com\/en\/author\/communicationsecloud\/"}]}},"_links":{"self":[{"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/posts\/643"}],"collection":[{"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/comments?post=643"}],"version-history":[{"count":1,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/posts\/643\/revisions"}],"predecessor-version":[{"id":1722,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/posts\/643\/revisions\/1722"}],"wp:attachment":[{"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/media?parent=643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/categories?post=643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/tags?post=643"},{"taxonomy":"topics","embeddable":true,"href":"https:\/\/se-cloud-experts.com\/en\/wp-json\/wp\/v2\/topics?post=643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}