{"id":78818,"date":"2020-06-19T13:59:27","date_gmt":"2020-06-19T11:59:27","guid":{"rendered":"https:\/\/blog.wildix.com\/?p=78818"},"modified":"2020-06-19T13:59:27","modified_gmt":"2020-06-19T11:59:27","slug":"comment-gerer-les-attaques-dos-dans-la-voip","status":"publish","type":"post","link":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/","title":{"rendered":"Comment g\u00e9rer les attaques DoS dans la VoIP"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=\u00a0\u00bb37256&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][vc_column_text]<span style=\"font-weight: 400;\">Chaque industrie <\/span><span style=\"font-weight: 400;\">a un mal \u00e0 soigner<\/span><span style=\"font-weight: 400;\"> &#8211; une menace identifi\u00e9e mais pour laquelle il n\u2019existe pas de cure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En mati\u00e8re de cybers\u00e9curit\u00e9, ce probl\u00e8me est sans aucun doute l&rsquo;attaque par Denial of Service (DoS).<\/span><br \/>\n<!--more--><\/p>\n<h2><b>Qu&rsquo;est-ce que le DoS ?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Souvent abr\u00e9g\u00e9 en DoS ou DDoS (\u00ab\u00a0Distributed Denial of Service\u00a0\u00bb), ce mal de t\u00eate num\u00e9rique <\/span><a href=\"https:\/\/www.technologyreview.com\/s\/613331\/the-first-ddos-attack-was-20-years-ago-this-is-what-weve-learned-since\/\"><span style=\"font-weight: 400;\">a frapp\u00e9 pour la premi\u00e8re fois en 1999<\/span><\/a><span style=\"font-weight: 400;\"> et s\u00e9vit depuis dans le monde de l&rsquo;informatique.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Les attaques par DoS proviennent d&rsquo;un ordinateur \u00ab\u00a0de contr\u00f4le\u00a0\u00bb, qui oblige les autres ordinateurs \u00e0 envoyer des donn\u00e9es \u00e0 un serveur web, g\u00e9n\u00e9rant ainsi une telle activit\u00e9 que le syst\u00e8me ne peut plus traiter les utilisateurs authentiques.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">C&rsquo;est comme si les gens allaient au cin\u00e9ma, faisaient la queue pour acheter des billets pour un spectacle et qu\u2019ils \u00e9taient soudain pris en embuscade par une foule immense se jetant sur eux ; l&rsquo;augmentation du trafic emp\u00eacherait les clients qui faisaient la queue auparavant d&rsquo;atteindre le guichet.<\/span><\/p>\n<h2><b>Risques pour la VoIP<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">En tant que concept, le DoS est probablement assez abstrait. Mais ses r\u00e9sultats sont absolument r\u00e9els. <\/span><a href=\"https:\/\/techhq.com\/2019\/03\/ddos-attacks-cost-us-businesses-10bn-per-year\/\"><span style=\"font-weight: 400;\">Selon une \u00e9tude<\/span><\/a><span style=\"font-weight: 400;\">, les attaques du DoS ont touch\u00e9 jusqu&rsquo;\u00e0 92 % des entreprises nord-am\u00e9ricaines, emp\u00eachant l&rsquo;acc\u00e8s aux sites web de 30 minutes \u00e0 plus de quatre heures. Consid\u00e9r\u00e9s annuellement, ces attaques entra\u00eenent une perte moyenne de plus de 200 000 dollars par entreprise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Et bien que la VoIP ne soit pas techniquement un site web, elle <\/span><b>est toujours vuln\u00e9rable aux attaques par DoS.<\/b><span style=\"font-weight: 400;\"> Tout comme les ordinateurs attaqu\u00e9s peuvent surcharger un serveur avec des donn\u00e9es inutiles, <\/span><b>ils peuvent aussi facilement arr\u00eater un syst\u00e8me VoIP avec un essaim d&rsquo;appels, de messages et d&rsquo;autres demandes d&rsquo;acc\u00e8s.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Il ne s&rsquo;agit pas seulement d&rsquo;une th\u00e9orie : <\/span><a href=\"https:\/\/securityintelligence.com\/hello-youve-been-compromised-upward-attack-trend-targeting-voip-protocol-sip\/\"><span style=\"font-weight: 400;\">le DDoS est commun\u00e9ment cit\u00e9 comme une vuln\u00e9rabilit\u00e9 dans le domaine de la VoIP<\/span><\/a><span style=\"font-weight: 400;\"> et, en pratique, il a \u00e9t\u00e9 utilis\u00e9 pour perturber les communications t\u00e9l\u00e9phoniques lors de cyber-attaques de grande envergure. <\/span><a href=\"https:\/\/www.techrepublic.com\/article\/major-ddos-attacks-increased-967-this-year\/\"><span style=\"font-weight: 400;\">Si l&rsquo;on consid\u00e8re que les attaques de DoS haut d\u00e9bit ont augment\u00e9 de 967 % au cours du premier trimestre 2019<\/span><\/a><span style=\"font-weight: 400;\">, on comprend ais\u00e9ment pourquoi vous devriez prendre ce risque de s\u00e9curit\u00e9 au s\u00e9rieux.<\/span><\/p>\n<h2>La solution<\/h2>\n<p><span style=\"font-weight: 400;\">La meilleure mesure pr\u00e9ventive contre les attaques par DoS est avant tout de les emp\u00eacher de se produire : vous voulez que votre PBX soit accessible, mais vous voulez aussi que votre syst\u00e8me ignore les tentatives d&rsquo;acc\u00e8s excessives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En th\u00e9orie, cela pourrait \u00eatre suffisant avec un pare-feu. L&rsquo;essentiel, cependant, est que la protection ne peut se limiter \u00e0 demander un enregistrement. Apr\u00e8s tout, si votre syst\u00e8me tente de v\u00e9rifier l&rsquo;\u00e9tat d&rsquo;une demande, il continue \u00e0 consacrer ses ressources de traitement \u00e0 ce trafic, donnant au responsable de la DoS ce qu&rsquo;il veut.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pour \u00eatre efficace, un pare-feu devrait au contraire cesser compl\u00e8tement de traiter un exc\u00e8s de demandes suspectes. De cette fa\u00e7on, le syst\u00e8me ne perd pas de temps avec l&rsquo;enregistrement ; il filtre simplement le mauvais trafic et remet les vrais utilisateurs en premi\u00e8re ligne.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Avec Wildix, cette forme de protection DoS est int\u00e9gr\u00e9e dans toutes les parties du syst\u00e8me PBX, du SIP au web. Elle est \u00e9galement r\u00e9gl\u00e9e automatiquement, imm\u00e9diatement apr\u00e8s l&rsquo;installation, dans le cadre de sa promesse de \u00ab\u00a0planification s\u00e9curis\u00e9e\u00a0\u00bb.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mais en fin de compte, il est peu probable que les attaques par DoS disparaissent bient\u00f4t &#8211; ce qui signifie qu&rsquo;il est encore plus important de prot\u00e9ger vos syst\u00e8mes contre de telles attaques.<\/span><\/p>\n<p><span style=\"font-size: 1rem;\"><span style=\"font-weight: 400;\">Si vous souhaitez en savoir plus sur ces sujets, <a href=\"https:\/\/www.wildix.com\/fr\/wildix-magazine\/\">cliquez ici pour obtenir votre exemplaire gratuit du Wildix Magazine directement sur votre bureau<\/a> !<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/span><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_single_image image=\u00a0\u00bb37256&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][vc_column_text]Chaque industrie a un mal \u00e0 soigner &#8211; une menace identifi\u00e9e mais pour laquelle il n\u2019existe pas de cure. En mati\u00e8re de cybers\u00e9curit\u00e9, ce probl\u00e8me est sans aucun doute l&rsquo;attaque par Denial of Service (DoS).<\/p>\n","protected":false},"author":563,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[53],"tags":[],"class_list":["post-78818","post","type-post","status-publish","format-standard","hentry","category-blog-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment g\u00e9rer les attaques DoS dans la VoIP | Wildix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment g\u00e9rer les attaques DoS dans la VoIP | Wildix\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_single_image image=\u00a0\u00bb37256&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][vc_column_text]Chaque industrie a un mal \u00e0 soigner &#8211; une menace identifi\u00e9e mais pour laquelle il n\u2019existe pas de cure. En mati\u00e8re de cybers\u00e9curit\u00e9, ce probl\u00e8me est sans aucun doute l&rsquo;attaque par Denial of Service (DoS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/\" \/>\n<meta property=\"og:site_name\" content=\"Wildix Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wildix.pbx\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T11:59:27+00:00\" \/>\n<meta name=\"author\" content=\"Austen Read-McFarland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@WildixSrl\" \/>\n<meta name=\"twitter:site\" content=\"@WildixSrl\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Austen Read-McFarland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/\"},\"author\":{\"name\":\"Austen Read-McFarland\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#\\\/schema\\\/person\\\/899417d475c0519b2d90ae4cdcd60f99\"},\"headline\":\"Comment g\u00e9rer les attaques DoS dans la VoIP\",\"datePublished\":\"2020-06-19T11:59:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/\"},\"wordCount\":676,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#organization\"},\"articleSection\":[\"Blog @fr\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/\",\"url\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/\",\"name\":\"Comment g\u00e9rer les attaques DoS dans la VoIP | Wildix\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#website\"},\"datePublished\":\"2020-06-19T11:59:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/comment-gerer-les-attaques-dos-dans-la-voip\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.wildix.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog @fr\",\"item\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/category\\\/blog-fr\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Comment g\u00e9rer les attaques DoS dans la VoIP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.wildix.com\\\/\",\"name\":\"Wildix Blog\",\"description\":\"Parlons VoIP, Communication unifi\u00e9e et WebRTC\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.wildix.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#organization\",\"name\":\"Wildix\",\"url\":\"https:\\\/\\\/blog.wildix.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.wildix.com\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/LOGO-WILDIX-BLU-small-e1733323375170.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.wildix.com\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/LOGO-WILDIX-BLU-small-e1733323375170.jpg\",\"width\":473,\"height\":192,\"caption\":\"Wildix\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wildix.pbx\",\"https:\\\/\\\/x.com\\\/WildixSrl\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wildix-srl\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/WildixPBX\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.wildix.com\\\/#\\\/schema\\\/person\\\/899417d475c0519b2d90ae4cdcd60f99\",\"name\":\"Austen Read-McFarland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g\",\"caption\":\"Austen Read-McFarland\"},\"url\":\"https:\\\/\\\/blog.wildix.com\\\/fr\\\/author\\\/austen-read-mcfarland\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment g\u00e9rer les attaques DoS dans la VoIP | Wildix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment g\u00e9rer les attaques DoS dans la VoIP | Wildix","og_description":"[vc_row][vc_column][vc_single_image image=\u00a0\u00bb37256&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][vc_column_text]Chaque industrie a un mal \u00e0 soigner &#8211; une menace identifi\u00e9e mais pour laquelle il n\u2019existe pas de cure. En mati\u00e8re de cybers\u00e9curit\u00e9, ce probl\u00e8me est sans aucun doute l&rsquo;attaque par Denial of Service (DoS).","og_url":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/","og_site_name":"Wildix Blog","article_publisher":"https:\/\/www.facebook.com\/wildix.pbx","article_published_time":"2020-06-19T11:59:27+00:00","author":"Austen Read-McFarland","twitter_card":"summary_large_image","twitter_creator":"@WildixSrl","twitter_site":"@WildixSrl","twitter_misc":{"\u00c9crit par":"Austen Read-McFarland","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/#article","isPartOf":{"@id":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/"},"author":{"name":"Austen Read-McFarland","@id":"https:\/\/blog.wildix.com\/#\/schema\/person\/899417d475c0519b2d90ae4cdcd60f99"},"headline":"Comment g\u00e9rer les attaques DoS dans la VoIP","datePublished":"2020-06-19T11:59:27+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/"},"wordCount":676,"commentCount":0,"publisher":{"@id":"https:\/\/blog.wildix.com\/#organization"},"articleSection":["Blog @fr"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/","url":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/","name":"Comment g\u00e9rer les attaques DoS dans la VoIP | Wildix","isPartOf":{"@id":"https:\/\/blog.wildix.com\/#website"},"datePublished":"2020-06-19T11:59:27+00:00","breadcrumb":{"@id":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wildix.com\/fr\/comment-gerer-les-attaques-dos-dans-la-voip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wildix.com\/"},{"@type":"ListItem","position":2,"name":"Blog @fr","item":"https:\/\/blog.wildix.com\/fr\/category\/blog-fr\/"},{"@type":"ListItem","position":3,"name":"Comment g\u00e9rer les attaques DoS dans la VoIP"}]},{"@type":"WebSite","@id":"https:\/\/blog.wildix.com\/#website","url":"https:\/\/blog.wildix.com\/","name":"Wildix Blog","description":"Parlons VoIP, Communication unifi\u00e9e et WebRTC","publisher":{"@id":"https:\/\/blog.wildix.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wildix.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.wildix.com\/#organization","name":"Wildix","url":"https:\/\/blog.wildix.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.wildix.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2015\/05\/LOGO-WILDIX-BLU-small-e1733323375170.jpg","contentUrl":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2015\/05\/LOGO-WILDIX-BLU-small-e1733323375170.jpg","width":473,"height":192,"caption":"Wildix"},"image":{"@id":"https:\/\/blog.wildix.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wildix.pbx","https:\/\/x.com\/WildixSrl","https:\/\/www.linkedin.com\/company\/wildix-srl","https:\/\/www.youtube.com\/user\/WildixPBX"]},{"@type":"Person","@id":"https:\/\/blog.wildix.com\/#\/schema\/person\/899417d475c0519b2d90ae4cdcd60f99","name":"Austen Read-McFarland","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g","caption":"Austen Read-McFarland"},"url":"https:\/\/blog.wildix.com\/fr\/author\/austen-read-mcfarland\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/posts\/78818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/comments?post=78818"}],"version-history":[{"count":0,"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/posts\/78818\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/media?parent=78818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/categories?post=78818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wildix.com\/fr\/wp-json\/wp\/v2\/tags?post=78818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}