{"id":3877,"date":"2026-04-15T08:00:00","date_gmt":"2026-04-15T08:00:00","guid":{"rendered":"https:\/\/www.novatice.com\/?p=3877"},"modified":"2026-04-15T13:40:03","modified_gmt":"2026-04-15T13:40:03","slug":"postes-informatiques-publics-un-maillon-faible","status":"publish","type":"post","link":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : les postes informatiques publics sont-ils le maillon faible des collectivit\u00e9s ?"},"content":{"rendered":"\n<div class=\"wp-block-uagb-image uagb-block-bcb8399b wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-1024x616.webp ,https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp 780w, https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-1024x616.webp\" alt=\"\" class=\"uag-image-3892\" width=\"800\" height=\"481\" title=\"Smart Slider Novatice\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u00c0 l\u2019\u00e8re du num\u00e9rique, les <strong>collectivit\u00e9s locales<\/strong> font face \u00e0 des menaces de cybers\u00e9curit\u00e9 de plus en plus sophistiqu\u00e9es. Les attaques ciblent souvent les administrations, les \u00e9coles et les services municipaux. Parmi les vuln\u00e9rabilit\u00e9s potentielles, les <strong>postes informatiques publics<\/strong> \u2013 pr\u00e9sents dans les m\u00e9diath\u00e8ques, CCAS ou maisons de quartier \u2013 repr\u00e9sentent un point particuli\u00e8rement sensible.<\/p>\n\n\n\n<p>Ces ordinateurs en libre-service sont utilis\u00e9s par un public vari\u00e9, parfois non initi\u00e9 aux bonnes pratiques de s\u00e9curit\u00e9. Les questions sont nombreuses : les collectivit\u00e9s sont-elles conscientes des risques ? Ces postes peuvent-ils r\u00e9ellement constituer le \u00ab\u202fmaillon faible\u202f\u00bb de la s\u00e9curit\u00e9 municipale ?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les postes publics : un acc\u00e8s ouvert mais sensible<\/h2>\n\n\n\n<p>Les postes informatiques publics permettent aux citoyens de r\u00e9aliser des d\u00e9marches en ligne, d\u2019acc\u00e9der \u00e0 Internet ou de consulter des ressources p\u00e9dagogiques. Cette accessibilit\u00e9 est essentielle pour l\u2019<strong>inclusion num\u00e9rique<\/strong>, mais elle pr\u00e9sente \u00e9galement des risques.<\/p>\n\n\n\n<p>Contrairement aux postes administratifs internes, ces ordinateurs sont utilis\u00e9s par des personnes dont la s\u00e9curit\u00e9 num\u00e9rique n\u2019est pas ma\u00eetris\u00e9e. Elles peuvent :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>visiter des sites dangereux ou infect\u00e9s<\/li>\n\n\n\n<li>t\u00e9l\u00e9charger des fichiers malveillants<\/li>\n\n\n\n<li>connecter des p\u00e9riph\u00e9riques non s\u00e9curis\u00e9s (cl\u00e9s USB, disques externes)<\/li>\n<\/ul>\n\n\n\n<p>Ces usages augmentent le risque d\u2019introduction de <strong>malwares, ransomwares ou virus<\/strong> sur le r\u00e9seau municipal. De plus, les postes publics peuvent \u00eatre cibl\u00e9s pour <strong>voler des identifiants ou des donn\u00e9es personnelles<\/strong> si les sessions ne sont pas correctement isol\u00e9es.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pourquoi ces postes sont un maillon faible ?<\/h2>\n\n\n\n<p>La principale faiblesse des postes publics tient \u00e0 leur <strong>ouverture et \u00e0 la diversit\u00e9 des utilisateurs<\/strong>. Contrairement aux postes internes, ils ne sont pas g\u00e9r\u00e9s individuellement par des agents form\u00e9s \u00e0 la cybers\u00e9curit\u00e9. Sans <strong>mesures de protection adapt\u00e9es<\/strong>, ils peuvent devenir des portes d\u2019entr\u00e9e pour des attaques sur le r\u00e9seau municipal.<\/p>\n\n\n\n<p>Par ailleurs, certains postes publics ne sont pas r\u00e9guli\u00e8rement mis \u00e0 jour ou disposent de configurations h\u00e9t\u00e9rog\u00e8nes. Les failles logicielles ou syst\u00e8mes non corrig\u00e9es peuvent alors \u00eatre exploit\u00e9es par des hackers.<\/p>\n\n\n\n<p>Enfin, l\u2019absence de contr\u00f4le sur les p\u00e9riph\u00e9riques ou l\u2019installation de logiciels rend ces postes particuli\u00e8rement vuln\u00e9rables. M\u00eame un utilisateur bien intentionn\u00e9 peut introduire involontairement un malware dans le syst\u00e8me.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les bonnes pratiques pour s\u00e9curiser les postes publics<\/h2>\n\n\n\n<p>Pour r\u00e9duire ces risques, les collectivit\u00e9s doivent adopter des mesures de cybers\u00e9curit\u00e9 adapt\u00e9es aux postes publics.<\/p>\n\n\n\n<p>Premi\u00e8rement, <strong>les sessions doivent \u00eatre temporaires et r\u00e9initialis\u00e9es apr\u00e8s chaque utilisation<\/strong>. Cette pratique efface les fichiers t\u00e9l\u00e9charg\u00e9s et supprime l\u2019historique, garantissant qu\u2019aucune donn\u00e9e personnelle n\u2019est conserv\u00e9e.<\/p>\n\n\n\n<p>Deuxi\u00e8mement, <strong>le verrouillage du syst\u00e8me et le contr\u00f4le des p\u00e9riph\u00e9riques<\/strong> sont indispensables. L\u2019acc\u00e8s aux param\u00e8tres et aux installations logicielles doit \u00eatre restreint, et l\u2019usage des cl\u00e9s USB ou autres p\u00e9riph\u00e9riques externes doit \u00eatre limit\u00e9.<\/p>\n\n\n\n<p>Troisi\u00e8mement, <strong>le filtrage web intelligent<\/strong> bloque les sites dangereux ou inappropri\u00e9s. Il prot\u00e8ge les utilisateurs et r\u00e9duit les risques d\u2019infection par des logiciels malveillants.<\/p>\n\n\n\n<p>Enfin, la <strong>mise \u00e0 jour r\u00e9guli\u00e8re des syst\u00e8mes et logiciels<\/strong> permet de corriger les failles connues. Associ\u00e9e \u00e0 une supervision centralis\u00e9e, cette pratique permet aux \u00e9quipes municipales de d\u00e9tecter rapidement toute activit\u00e9 suspecte.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">L\u2019\u00e9quilibre entre s\u00e9curit\u00e9 et accessibilit\u00e9<\/h2>\n\n\n\n<p>S\u00e9curiser les postes publics ne signifie pas limiter l\u2019acc\u00e8s aux citoyens. Au contraire, il s\u2019agit de <strong>prot\u00e9ger \u00e0 la fois les usagers et le r\u00e9seau municipal<\/strong>.<\/p>\n\n\n\n<p>Les postes doivent rester faciles \u00e0 utiliser et accessibles \u00e0 tous, y compris aux publics non initi\u00e9s au num\u00e9rique. Les collectivit\u00e9s peuvent accompagner cette s\u00e9curit\u00e9 par des <strong>tutoriels, affichages p\u00e9dagogiques ou m\u00e9diation num\u00e9rique<\/strong>, afin de sensibiliser les utilisateurs aux bonnes pratiques de cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les postes publics sont-ils vraiment le maillon faible ?<\/h2>\n\n\n\n<p>En l\u2019absence de mesures adapt\u00e9es, les <strong>postes informatiques publics peuvent repr\u00e9senter un maillon faible<\/strong> dans la cha\u00eene de cybers\u00e9curit\u00e9 des collectivit\u00e9s. Cependant, avec des pratiques simples et efficaces \u2013 sessions temporaires, filtrage web, verrouillage des syst\u00e8mes, mises \u00e0 jour r\u00e9guli\u00e8res \u2013 ces postes peuvent devenir <strong>des outils s\u00e9curis\u00e9s et fiables<\/strong>, conciliant accessibilit\u00e9 et protection.<\/p>\n\n\n\n<p>Les collectivit\u00e9s ont donc tout int\u00e9r\u00eat \u00e0 consid\u00e9rer la cybers\u00e9curit\u00e9 des postes publics <strong>comme une priorit\u00e9 strat\u00e9gique<\/strong>, non seulement pour prot\u00e9ger leurs r\u00e9seaux, mais aussi pour garantir la confiance des citoyens dans les services num\u00e9riques municipaux.<\/p>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-f98cfea7\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-ddb14f81 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/calendly.com\/novatice-technologies-neos\/novaticeneos-30mn?preview_source=et_cardu0026month=2025-11\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Programmer une d\u00e9mo <\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c0 l\u2019\u00e8re du num\u00e9rique, les collectivit\u00e9s locales font face \u00e0 des menaces de cybers\u00e9curit\u00e9 de plus en plus sophistiqu\u00e9es. Les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3892,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[19,21],"tags":[15,16,70,18],"class_list":["post-3877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-collectivites","tag-collectivites","tag-epn","tag-espaces-publics-numeriques","tag-numerique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Postes informatiques publics : un maillon faible ?<\/title>\n<meta name=\"description\" content=\"Les postes publics peuvent \u00eatre un maillon faible pour les collectivit\u00e9s. D\u00e9couvrez comment s\u00e9curiser l\u2019acc\u00e8s et prot\u00e9ger les donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Postes informatiques publics : un maillon faible ?\" \/>\n<meta property=\"og:description\" content=\"Les postes publics peuvent \u00eatre un maillon faible pour les collectivit\u00e9s. D\u00e9couvrez comment s\u00e9curiser l\u2019acc\u00e8s et prot\u00e9ger les donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/p\/Novatice-Technologies-61576737892959\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T13:40:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2250\" \/>\n\t<meta property=\"og:image:height\" content=\"1354\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin2008\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin2008\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/\"},\"author\":{\"name\":\"admin2008\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/person\\\/9ccc0cd3f16cba42dac6d88771daf473\"},\"headline\":\"Cybers\u00e9curit\u00e9 : les postes informatiques publics sont-ils le maillon faible des collectivit\u00e9s ?\",\"datePublished\":\"2026-04-15T08:00:00+00:00\",\"dateModified\":\"2026-04-15T13:40:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Smart-Slider-Novatice.webp\",\"keywords\":[\"collectivit\u00e9s\",\"EPN\",\"espaces publics num\u00e9riques\",\"num\u00e9rique\"],\"articleSection\":[\"Blog\",\"Collectivit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/\",\"name\":\"Postes informatiques publics : un maillon faible ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Smart-Slider-Novatice.webp\",\"datePublished\":\"2026-04-15T08:00:00+00:00\",\"dateModified\":\"2026-04-15T13:40:03+00:00\",\"description\":\"Les postes publics peuvent \u00eatre un maillon faible pour les collectivit\u00e9s. D\u00e9couvrez comment s\u00e9curiser l\u2019acc\u00e8s et prot\u00e9ger les donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Smart-Slider-Novatice.webp\",\"contentUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Smart-Slider-Novatice.webp\",\"width\":2250,\"height\":1354},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2026\\\/04\\\/15\\\/postes-informatiques-publics-un-maillon-faible\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.novatice.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 : les postes informatiques publics sont-ils le maillon faible des collectivit\u00e9s ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#website\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/\",\"name\":\"Novatice Technologies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.novatice.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#organization\",\"name\":\"Novatice Technologies\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cropped-ql23cg50jsojeppjktvm.webp\",\"contentUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cropped-ql23cg50jsojeppjktvm.webp\",\"width\":805,\"height\":263,\"caption\":\"Novatice Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/p\\\/Novatice-Technologies-61576737892959\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/authwall?trk=bf&trkInfo=AQGCN4eUDKjo1gAAAZnnhI3Ae7PAPStEyWBTtwu62FgytWDmpUnGa7lctUgjEbpLb4ON8I1NDFKKKUDQ5wih2Hriu4bADVrlCotkGuAwq3Q9_OZq_5Z8g708twdCADH2HOVLAH8=&original_referer&sessionRedirect=httpswww.linkedin.comcompanynovaticeoriginalSubdomainfr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/person\\\/9ccc0cd3f16cba42dac6d88771daf473\",\"name\":\"admin2008\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g\",\"caption\":\"admin2008\"},\"sameAs\":[\"http:\\\/\\\/preprod.novatice.com\"],\"url\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/author\\\/admin2008\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Postes informatiques publics : un maillon faible ?","description":"Les postes publics peuvent \u00eatre un maillon faible pour les collectivit\u00e9s. D\u00e9couvrez comment s\u00e9curiser l\u2019acc\u00e8s et prot\u00e9ger les donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/","og_locale":"fr_FR","og_type":"article","og_title":"Postes informatiques publics : un maillon faible ?","og_description":"Les postes publics peuvent \u00eatre un maillon faible pour les collectivit\u00e9s. D\u00e9couvrez comment s\u00e9curiser l\u2019acc\u00e8s et prot\u00e9ger les donn\u00e9es.","og_url":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/","article_publisher":"https:\/\/www.facebook.com\/p\/Novatice-Technologies-61576737892959\/","article_published_time":"2026-04-15T08:00:00+00:00","article_modified_time":"2026-04-15T13:40:03+00:00","og_image":[{"width":2250,"height":1354,"url":"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp","type":"image\/webp"}],"author":"admin2008","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin2008","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#article","isPartOf":{"@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/"},"author":{"name":"admin2008","@id":"https:\/\/www.novatice.com\/#\/schema\/person\/9ccc0cd3f16cba42dac6d88771daf473"},"headline":"Cybers\u00e9curit\u00e9 : les postes informatiques publics sont-ils le maillon faible des collectivit\u00e9s ?","datePublished":"2026-04-15T08:00:00+00:00","dateModified":"2026-04-15T13:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/"},"wordCount":793,"publisher":{"@id":"https:\/\/www.novatice.com\/#organization"},"image":{"@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#primaryimage"},"thumbnailUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp","keywords":["collectivit\u00e9s","EPN","espaces publics num\u00e9riques","num\u00e9rique"],"articleSection":["Blog","Collectivit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/","url":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/","name":"Postes informatiques publics : un maillon faible ?","isPartOf":{"@id":"https:\/\/www.novatice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#primaryimage"},"image":{"@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#primaryimage"},"thumbnailUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp","datePublished":"2026-04-15T08:00:00+00:00","dateModified":"2026-04-15T13:40:03+00:00","description":"Les postes publics peuvent \u00eatre un maillon faible pour les collectivit\u00e9s. D\u00e9couvrez comment s\u00e9curiser l\u2019acc\u00e8s et prot\u00e9ger les donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#primaryimage","url":"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp","contentUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp","width":2250,"height":1354},{"@type":"BreadcrumbList","@id":"https:\/\/www.novatice.com\/index.php\/2026\/04\/15\/postes-informatiques-publics-un-maillon-faible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.novatice.com\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 : les postes informatiques publics sont-ils le maillon faible des collectivit\u00e9s ?"}]},{"@type":"WebSite","@id":"https:\/\/www.novatice.com\/#website","url":"https:\/\/www.novatice.com\/","name":"Novatice Technologies","description":"","publisher":{"@id":"https:\/\/www.novatice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.novatice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.novatice.com\/#organization","name":"Novatice Technologies","url":"https:\/\/www.novatice.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.novatice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/11\/cropped-ql23cg50jsojeppjktvm.webp","contentUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/11\/cropped-ql23cg50jsojeppjktvm.webp","width":805,"height":263,"caption":"Novatice Technologies"},"image":{"@id":"https:\/\/www.novatice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/p\/Novatice-Technologies-61576737892959\/","https:\/\/www.linkedin.com\/authwall?trk=bf&trkInfo=AQGCN4eUDKjo1gAAAZnnhI3Ae7PAPStEyWBTtwu62FgytWDmpUnGa7lctUgjEbpLb4ON8I1NDFKKKUDQ5wih2Hriu4bADVrlCotkGuAwq3Q9_OZq_5Z8g708twdCADH2HOVLAH8=&original_referer&sessionRedirect=httpswww.linkedin.comcompanynovaticeoriginalSubdomainfr"]},{"@type":"Person","@id":"https:\/\/www.novatice.com\/#\/schema\/person\/9ccc0cd3f16cba42dac6d88771daf473","name":"admin2008","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g","caption":"admin2008"},"sameAs":["http:\/\/preprod.novatice.com"],"url":"https:\/\/www.novatice.com\/index.php\/author\/admin2008\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice.webp",2250,1354,false],"thumbnail":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-150x150.webp",150,150,true],"medium":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-300x181.webp",300,181,true],"medium_large":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-768x462.webp",768,462,true],"large":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-1024x616.webp",1024,616,true],"1536x1536":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-1536x924.webp",1536,924,true],"2048x2048":["https:\/\/www.novatice.com\/wp-content\/uploads\/2026\/03\/Smart-Slider-Novatice-2048x1232.webp",2048,1232,true]},"uagb_author_info":{"display_name":"admin2008","author_link":"https:\/\/www.novatice.com\/index.php\/author\/admin2008\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00c0 l\u2019\u00e8re du num\u00e9rique, les collectivit\u00e9s locales font face \u00e0 des menaces de cybers\u00e9curit\u00e9 de plus en plus sophistiqu\u00e9es. Les [&hellip;]","_links":{"self":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts\/3877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/comments?post=3877"}],"version-history":[{"count":3,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts\/3877\/revisions"}],"predecessor-version":[{"id":3894,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts\/3877\/revisions\/3894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/media\/3892"}],"wp:attachment":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/media?parent=3877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/categories?post=3877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/tags?post=3877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}