{"id":14007,"date":"2026-05-06T15:23:04","date_gmt":"2026-05-06T15:23:04","guid":{"rendered":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/"},"modified":"2026-05-06T15:23:04","modified_gmt":"2026-05-06T15:23:04","slug":"securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations","status":"publish","type":"post","link":"https:\/\/viqtor.eu\/en\/data-security-cyber-threats-current-situation-and-guidelines\/","title":{"rendered":"Data security, cyber threats: current situation and guidelines."},"content":{"rendered":"<p><strong>Legal Watch No. 69 \u2013 March 2024. <\/strong><\/p>\n<h4><strong><u>Data security, cyber threats: current situation and guidelines.<\/u><\/strong><\/h4>\n<p>Several organizations are publishing their reports on the state of the cybersecurity threat at the beginning of this year: an opportunity to take stock of the risks and advice for protecting personal data.<\/p>\n<p><strong>The European Union Agency for Cybersecurity (ENISA) has published its report on cybersecurity threats to 2030. <\/strong><\/p>\n<p>The report identifies threats related to software dependencies and disinformation campaigns, as well as those related to human error, as being of particular concern.<\/p>\n<p>Among the long-term threats, the agency points to skills shortages and failures of service providers, as well as the increase in AI-related threats.<\/p>\n<p><strong>The &quot;action against cybercrime&quot; initiative also shares its analysis of the state of the threat in France on the occasion of the publication of its annual activity report.&nbsp; <\/strong><\/p>\n<p>Phishing remains the primary threat: it is diversifying and becoming more sophisticated. The main forms of phishing involve traffic violations, child pornography, or fake tech support.<\/p>\n<p>Furthermore, scams involving fake bank advisors remain at a high constant level.<\/p>\n<p>Account hacking is another major threat, with consequences that can lead to identity theft and financial harm.<\/p>\n<p>Finally, ransomware attacks and malware (viruses) are significant and increasing causes of victim assistance requests.<\/p>\n<p><strong>On March 27, the CNIL published a report on security breaches over the past five years.<\/strong><\/p>\n<p>She notes that the private sector is responsible for approximately two-thirds of the declarations of violations to the CNIL, including 39 % from SMEs.<\/p>\n<p>The public sector, meanwhile, accounts for 22 % of the notifications.<\/p>\n<p>Regarding the distribution by activity, public administrations represent 18 % of the notifications.<\/p>\n<p>Specialized, scientific and technical activities are the most represented in the private sector, followed by financial and insurance activities.<\/p>\n<p>Activities related to human health also account for 12 % of the notifications.<\/p>\n<p><strong>In this context, and to take into account the new risks to data, the CNIL updated its data security guide at the end of March. <\/strong><\/p>\n<p>This new version restructures the guide into five parts: users, equipment, data control, incident preparedness, and finally a focus on particularly current issues.<\/p>\n<p>The CNIL introduces new fact sheets, notably on artificial intelligence (AI), mobile applications, cloud computing and application programming interfaces (APIs).<\/p>\n<p>The guide also includes fact sheets on risk analysis and encryption.<\/p>\n<p>At the end of the document, a checklist allows you to review the measures taken by the person in charge and to assess their level of security.<\/p>\n<p>Among the recommended protection measures, multi-factor authentication (MFA) is often cited, and increasingly recommended in order to protect databases from fraudulent access attempts.<\/p>\n<p><strong>The CNIL has just opened a public consultation on the compliance of solutions using the AMF with the GDPR. <\/strong><\/p>\n<p>A recent example confirms the need to clarify the context of AMF use: in Spain, a company was convicted in court for imposing AMF on its employees on their private phones when the law required it to provide them with company mobile phones for this purpose.<\/p>\n<p>In its recommendation, the CNIL addresses the determination of a legal basis, the minimization of data collected, retention periods and respect for the exercise of rights by the persons concerned.<\/p>\n<p>It provides practical examples of implementing privacy-respecting multi-factor authentication.<\/p>\n<h4><strong>&nbsp;<\/strong><\/h4>\n<h4><strong><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/france_1773227986806.jpg\" alt=\"\" width=\"145\" height=\"97\"><\/strong>&nbsp; &nbsp; &nbsp;&nbsp;<\/h4>\n<p><strong>The French Competition Authority imposed a fine of 250 million euros on Google on March 20 for failing to respect its commitments and for using press articles to train its AI system (Bard\/Gemini).&nbsp; <\/strong><\/p>\n<p>This decision, the 4th made on this case in four years, is part of the context of the adoption of the law of July 24, 2019 on neighboring rights which aims to put in place the conditions for a balanced negotiation between publishers, press agencies and digital platforms.<\/p>\n<p><strong>On April 8, the CNIL published recommendations for the use of AI in a manner that respects personal data. <\/strong><\/p>\n<p>Their aim is to provide concrete answers, illustrated with examples, to the legal and technical challenges related to the application of the GDPR to AI.<\/p>\n<p>The points addressed in these initial recommendations make it possible in particular to determine the applicable legal regime, the legal qualification of the actors, to carry out an impact analysis where appropriate, and to integrate data protection from the design stage of the system (privacy by design).<\/p>\n<h4><strong>&nbsp;<\/strong><\/h4>\n<h4><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/Europe_1773228014603.jpg\" alt=\"\" width=\"145\" height=\"97\"><\/h4>\n<h4><strong><em>European institutions and bodies<\/em><\/strong><\/h4>\n<p><strong>On March 11, the European Data Protection Supervisor (EDPS) found that the European Commission had breached several key data protection rules in its use of Microsoft 365. <\/strong><\/p>\n<p>In particular, &quot;the Commission has not provided appropriate safeguards to ensure that personal data transferred outside the EU\/EEA enjoys a level of protection essentially equivalent to that guaranteed in the EU\/EEA.<\/p>\n<p>Furthermore, in its contract with Microsoft, the Commission did not sufficiently specify what types of personal data should be collected and for what explicit and precise purposes when using Microsoft 365 (...).<\/p>\n<p>The EDPB imposed corrective measures on the Commission, including the suspension, from 9 December 2024, of all data flows resulting from its use of Microsoft 365 to Microsoft and its affiliates and subcontractors located in countries outside the EU\/EEA that are not covered by an adequacy decision.<\/p>\n<p>While this decision concerns European institutions, the EDPS&#039;s reasoning has a much broader scope and could have repercussions on the use of Microsoft 365 in EU member states.<\/p>\n<p><strong>On March 15, the European Ombudsman wrote to the European Commission to ask how it uses AI in its decision-making process. <\/strong><\/p>\n<p>The Ombudsman noted that &quot;while rapid developments in AI can improve the quality and efficiency of work, they pose major challenges in terms of accuracy, potential bias, explainability, and human control.&quot;<\/p>\n<p>She also stressed that public administrations must ensure that AI only assists human decision-making and does not replace it.<\/p>\n<p>The questions focus on the use of AI in three specific areas: analyzing public feedback, discovering potential breaches of EU competition rules, and handling complaints.<\/p>\n<p><strong>While the European Parliament has just voted on the AI regulation, the regulations concerning digital markets (DMA) and digital services (DSA) have entered into force and the Commission has already initiated several procedures under these two texts. <\/strong><\/p>\n<p>On March 25, it initiated DMA-based proceedings against Alphabet, Apple, and Meta.<\/p>\n<p>With regard to Apple and Alphabet, the Commission intends to determine whether the measures implemented in relation to their obligations relating to app stores are contrary to the Public Procurement Act, which requires gatekeepers to allow app developers to &quot;direct&quot; consumers free of charge to offers not listed in their app stores.<\/p>\n<p>With regard to Meta, the Commission has opened a procedure to determine whether the recently introduced &#039;pay or consent&#039; model for users in the EU complies with data protection law, which requires custodians to obtain users&#039; consent when they intend to combine or cross-use their personal data.<\/p>\n<p>This latest procedure comes in addition to the one initiated by the European Data Protection Board on the same subject.<\/p>\n<p>The Commission also opened a formal procedure under the DSA on March 14 to determine whether AliExpress had breached the Digital Services Act in areas related to risk management and mitigation, content moderation and internal complaints handling mechanism, transparency of advertising and recommendation systems, trader traceability and access to data for researchers.<\/p>\n<p>On the same date, she also sent a request for information to LinkedIn regarding potentially targeted advertising based on sensitive data.<\/p>\n<p><strong>On March 4, the European Commission hosted the very first &quot;high-level&quot; meeting on cross-border data flows. <\/strong><\/p>\n<p>The meeting brought together the Commissioner for Justice, the Chair of the EDPB, as well as ministers and heads of data protection authorities from 15 countries and territories for which the EU has adopted an adequacy decision.<\/p>\n<p>The objective is to promote enhanced cooperation between these participants in the area of data protection.<\/p>\n<p><strong>In a ruling dated March 7, the Court of Justice of the European Union (CJEU) confirmed that the TC string (\u201cTC string\u201d) used by advertisers to encode user preferences \u201ccontains information about an identifiable user and therefore constitutes personal data within the meaning of the GDPR. <\/strong><\/p>\n<p>When the information contained in a TC String is associated with an identifier, such as, among other things, the IP address of the user&#039;s device, this information can be used to create a profile of that user and identify them.&nbsp;<\/p>\n<p>Furthermore, IAB Europe must be considered a &quot;joint controller&quot; within the meaning of the GDPR. (...)<\/p>\n<p>The association appears to exert influence over data processing operations when user consent preferences are recorded in a TC string, and to determine, jointly with its members, both the purposes of these operations and the means that underpin them.\u00a0<\/p>\n<p><strong>The CJEU ruled on March 7 on appeal on a decision of the EU court, concerning the concept of personal data.<\/strong><\/p>\n<p>&nbsp;It considered that the identifiable nature is not linked to the fact that an &quot;average reader&quot; can identify a person but depends on the possession or not of &quot;additional factors... necessary for identification... [these factors] may be accessible to a person other than the controller (see C-582\/14, paragraphs 39 and 41)&quot;.<\/p>\n<p>The Tribunal also erred in arguing that the &quot;means reasonably likely&quot; to be used to identify a person concerned were limited.<\/p>\n<p>The court should have considered the costs and time required to identify the applicant to determine whether the latter could be identified by &quot;reasonable means&quot;.<\/p>\n<p>This decision concerned the application of the data protection regulation applicable to European institutions, whose definitions are identical to those of the GDPR.<\/p>\n<p><strong>On the Kaizener website you will find a series of tables listing the many European regulatory initiatives in the digital sector, as well as their state of implementation.&nbsp; <\/strong><\/p>\n<h4><strong><em>&nbsp;<\/em><\/strong><\/h4>\n<h4><strong><em>News from European member countries.<\/em><\/strong><\/h4>\n<p><strong>The Belgian Data Protection Authority published a decision on March 15 concerning the legal basis for the processing of data used for training AI models and the subsequent, separate use of these models for commercial purposes.&nbsp; <\/strong><\/p>\n<p>The APD considered that the controller could not claim a compatible use (Article 6(4) of the GDPR), because the objective of the training had not been clearly established from the outset.<\/p>\n<p>Further use also required its own legal basis.<\/p>\n<p>The data controller must also give its customers the right to object to the use of data for model training.<\/p>\n<p><strong>The Belgian Data Protection Authority also considered that a data controller had infringed Article 5(1) of the GDPR by not deleting the email account of a former employee in a timely manner. <\/strong><\/p>\n<p>The APD stated that the mailbox should be deactivated on the last working day and that the automatic reply should be deactivated within one month or three months in certain exceptions.<\/p>\n<p>In a similar context, the Italian Data Protection Authority (APD) considered that the data controller had violated the principle of data minimization because it did not deactivate the email account of a former employee, citing the need to redirect customers to another account.<\/p>\n<p>The data controller was fined 15,000 euros.<\/p>\n<p><strong>The Italian Data Protection Authority (APD) fined a subcontractor 800,000 euros for engaging a secondary subcontractor without prior authorization from the data controller and for late notification of a data breach to the data controller. <\/strong><\/p>\n<p><strong>It also fined five companies that were using facial recognition to monitor attendance in the workplace. <\/strong><\/p>\n<p>The authority found that the data protection measures were inadequate, that people had not received the required information, and that a less intrusive system could have been used.<\/p>\n<p><strong>The Italian Data Protection Authority (APD) also opened an investigation on March 8 against OpenAI, which announced the launch of a new AI model called &quot;Sora&quot;. <\/strong><\/p>\n<p>This model would be capable of creating dynamic, realistic, and imaginative scenes from a few text instructions.<\/p>\n<p>The APD has asked OpenAi to provide a number of clarifications in view of the implications that &quot;Sora&quot; could have on the processing of users&#039; personal data in the European Union and in Italy in particular.<\/p>\n<p><strong>On March 25, the Portuguese Data Protection Authority (APD) decided to order the Worldcoin Foundation to temporarily limit the collection of biometric data by &quot;Orb&quot; on national territory in order to safeguard the rights of citizens, especially minors. <\/strong><\/p>\n<p>The decision imposes an urgent interim measure on the Worldcoin Foundation, as the data controller, until the conclusion of its investigation process.<\/p>\n<p>Spain has taken a similar decision.<\/p>\n<p><strong>The Finnish Data Protection Authority (APD) has fined an IT retailer 856,000 euros for failing to determine the retention period for its customers&#039; data. <\/strong><\/p>\n<p>The APD also considered that <strong>The processing of personal data related to a single online purchase does not require the creation of a customer account. <\/strong><\/p>\n<p><strong>In Germany, a Berlin court ruled that the data controller cannot limit itself, in responding to an access request, to providing an abstract overview of the processing. <\/strong><\/p>\n<p>The official had cited disproportionate efforts.<\/p>\n<p>According to the court, these can only be invoked in very exceptional cases.<\/p>\n<p><strong>The Icelandic Data Protection Authority (APD) has fined Stj\u00f6rnuna ehf 10,059.92 euros (1,500,000 ISK). <\/strong>the operator of Subway in Iceland, for illegally monitoring its employees without adequately informing them.<\/p>\n<p><strong>In Austria, the Supreme Administrative Court ruled that an algorithm <\/strong>Determining the likelihood of hiring job applicants constitutes automated decision-making within the meaning of Article 22 of the GDPR, even if the result is used exclusively by a public body to provide job seekers with targeted employment advice.<\/p>\n<h4>&nbsp;<\/h4>\n<h4><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2614166247_1773228092802.jpg\" alt=\"\" width=\"150\" height=\"85\"><\/h4>\n<p><strong>The British government<\/strong> published in March a guide for the responsible acquisition and deployment of AI in the human resources and recruitment sector.<\/p>\n<p><strong>On March 21, the UN adopted a comprehensive resolution on AI. <\/strong><\/p>\n<p>The organization recognizes that AI can help accelerate the achievement of the 17 Sustainable Development Goals and stresses the urgency of &quot;reaching a global consensus on safe, secure and trustworthy artificial intelligence systems&quot;.<\/p>\n<p>The resolution encourages member states to adopt AI regulations and policies on various topics, including privacy protection.<\/p>\n<p>The Assembly called on all Member States and stakeholders &quot;to refrain from or cease using AI systems that cannot be operated in compliance with international human rights law or that present excessive risks to the enjoyment of human rights.&quot;<\/p>\n<p><strong>According to a Techcrunch article from March 26, a federal court in California has released several documents as part of a class action lawsuit filed by consumers against Meta. <\/strong><\/p>\n<p>In 2016, Facebook reportedly launched a secret project aimed at intercepting and decrypting network traffic between people using the Snapchat application and its servers.<\/p>\n<p>The goal was to understand user behavior and help Facebook compete with Snapchat.<\/p>\n<p><strong>The Justice Department and the FBI announced on March 25 that millions of Americans&#039; online accounts were caught in a Chinese hacking plot. <\/strong><\/p>\n<p>Seven Chinese nationals have been accused of carrying out a large-scale cyberattack campaign.<\/p>\n<p>The Justice Department said the hackers targeted American and foreign critics of China, businesses, and politicians.<\/p>\n<p><strong>On March 25, the Republican governor of Florida signed a bill banning access to social media for children under 14. <\/strong><\/p>\n<p>Minors aged 14 or 15 will need to obtain explicit parental consent to create an account.<\/p>\n<p>When the rules come into effect on July 1, 2024, companies such as Facebook, Instagram and TikTok will in principle be required to terminate existing accounts that do not meet these requirements and delete all corresponding personal data.<\/p>\n<p>This measure has been criticized and is expected to be challenged in court on the basis of constitutional rights to freedom of expression.<\/p>\n<p><strong>Meanwhile, the United States is considering banning TikTok nationwide. <\/strong><\/p>\n<p>On March 13, the House of Representatives passed the so-called &quot;Protecting Americans from Foreign Adversary Controlled Applications Act&quot;.<\/p>\n<p>If adopted by the Senate and enacted, TikTok will have to separate the video platform from its Chinese parent company ByteDance or remove Americans&#039; access to the application.<\/p>\n<p><strong>On March 18, at the third summit for democracy in Seoul, South Korea, Finland, Germany, Ireland, Japan, Poland and the Republic of Korea joined the United States in a joint statement on efforts to combat the proliferation and misuse of commercial spyware. <\/strong><\/p>\n<p>Countries commit to working within their national systems to establish strong safeguards to counter the proliferation and misuse of this surveillance technology.<\/p>\n<p><strong>In Kuwait, the Information and Communication Technologies Regulatory Authority (CITRA) has published a new law on the protection of personal data.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Legal Watch No. 69 \u2013 March 2024. Data security, cyber threats: current situation and guidelines. Several organizations are publishing their reports on the state of the cybersecurity threat at the beginning of this year: an opportunity to review the risks and advice for protecting personal data. The European Agency [\u2026]<\/p>","protected":false},"author":1,"featured_media":14003,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[],"class_list":["post-14007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-juridique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor<\/title>\n<meta name=\"description\" content=\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/viqtor.eu\/en\/data-security-cyber-threats-current-situation-and-guidelines\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor\" \/>\n<meta property=\"og:url\" content=\"https:\/\/viqtor.eu\/en\/data-security-cyber-threats-current-situation-and-guidelines\/\" \/>\n<meta property=\"og:site_name\" content=\"Viqtor\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-06T15:23:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/04\/widget-viqtor.png\" \/>\n<meta name=\"author\" content=\"Bruno\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/\"},\"author\":{\"name\":\"Bruno\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad\"},\"headline\":\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations.\",\"datePublished\":\"2026-05-06T15:23:04+00:00\",\"dateModified\":\"2026-05-06T15:23:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/\"},\"wordCount\":3510,\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg\",\"articleSection\":[\"Veille juridique\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/\",\"url\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/\",\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg\",\"datePublished\":\"2026-05-06T15:23:04+00:00\",\"dateModified\":\"2026-05-06T15:23:04+00:00\",\"description\":\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor\",\"breadcrumb\":{\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/viqtor.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/viqtor.eu\/#website\",\"url\":\"https:\/\/viqtor.eu\/\",\"name\":\"Viqtor\",\"description\":\"Faites du RGPD une opportunit\u00e9 pour votre entreprise.\",\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/viqtor.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/viqtor.eu\/#organization\",\"name\":\"viqtor.eu\",\"url\":\"https:\/\/viqtor.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"width\":108,\"height\":86,\"caption\":\"viqtor.eu\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad\",\"name\":\"Bruno\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g\",\"caption\":\"Bruno\"},\"sameAs\":[\"https:\/\/exciting-panini.13-37-234-21.plesk.page\"],\"url\":\"https:\/\/viqtor.eu\/en\/author\/mouad_zxum2ebi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor","description":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/viqtor.eu\/en\/data-security-cyber-threats-current-situation-and-guidelines\/","og_locale":"en_US","og_type":"article","og_title":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor","og_description":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor","og_url":"https:\/\/viqtor.eu\/en\/data-security-cyber-threats-current-situation-and-guidelines\/","og_site_name":"Viqtor","article_published_time":"2026-05-06T15:23:04+00:00","og_image":[{"url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/04\/widget-viqtor.png"}],"author":"Bruno","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#article","isPartOf":{"@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/"},"author":{"name":"Bruno","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad"},"headline":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations.","datePublished":"2026-05-06T15:23:04+00:00","dateModified":"2026-05-06T15:23:04+00:00","mainEntityOfPage":{"@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/"},"wordCount":3510,"publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"image":{"@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage"},"thumbnailUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg","articleSection":["Veille juridique"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/","url":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/","name":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor","isPartOf":{"@id":"https:\/\/viqtor.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage"},"image":{"@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage"},"thumbnailUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg","datePublished":"2026-05-06T15:23:04+00:00","dateModified":"2026-05-06T15:23:04+00:00","description":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations. - Viqtor","breadcrumb":{"@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#primaryimage","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2664438657_1773228152886.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/viqtor.eu\/securite-des-donnees-cybermenaces-etat-des-lieux-et-orientations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/viqtor.eu\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 des donn\u00e9es, cybermenaces : \u00e9tat des lieux et orientations."}]},{"@type":"WebSite","@id":"https:\/\/viqtor.eu\/#website","url":"https:\/\/viqtor.eu\/","name":"Viqtor","description":"Faites du RGPD une opportunit\u00e9 pour votre entreprise.","publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/viqtor.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/viqtor.eu\/#organization","name":"viqtor.eu","url":"https:\/\/viqtor.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","width":108,"height":86,"caption":"viqtor.eu"},"image":{"@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad","name":"Bruno","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g","caption":"Bruno"},"sameAs":["https:\/\/exciting-panini.13-37-234-21.plesk.page"],"url":"https:\/\/viqtor.eu\/en\/author\/mouad_zxum2ebi\/"}]}},"_links":{"self":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts\/14007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/comments?post=14007"}],"version-history":[{"count":0,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts\/14007\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media\/14003"}],"wp:attachment":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media?parent=14007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/categories?post=14007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/tags?post=14007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}