{"version":"1.0","provider_name":"APOP","provider_url":"https:\/\/www.apop.qc.ca\/fr","author_name":"Roxanne R\u00e9gimbald","author_url":"https:\/\/www.apop.qc.ca\/fr\/author\/apop-rr\/","title":"Menaces informatiques&nbsp;: comment se prot\u00e9ger? - APOP","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\"><a href=\"https:\/\/www.apop.qc.ca\/fr\/activite\/menaces-informatiques\/\">Menaces informatiques&nbsp;: comment se prot\u00e9ger?<\/a><\/blockquote>\n<script type='text\/javascript'>\n<!--\/\/--><![CDATA[\/\/><!--\n\t\t\/*! This file is auto-generated *\/\n\t\t!function(d,l){\"use strict\";var e=!1,n=!1;if(l.querySelector)if(d.addEventListener)e=!0;if(d.wp=d.wp||{},!d.wp.receiveEmbedMessage)if(d.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var r,i,a,s=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),c=0;c<n.length;c++)n[c].style.display=\"none\";for(c=0;c<s.length;c++)if(r=s[c],e.source===r.contentWindow){if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(a=parseInt(t.value,10)))a=1e3;else if(~~a<200)a=200;r.height=a}if(\"link\"===t.message)if(i=l.createElement(\"a\"),a=l.createElement(\"a\"),i.href=r.getAttribute(\"src\"),a.href=t.value,o.test(a.protocol))if(a.host===i.host)if(l.activeElement===r)d.top.location.href=t.value}}},e)d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),d.addEventListener(\"load\",t,!1);function t(){if(!n){n=!0;for(var e,t,r=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),i=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),a=l.querySelectorAll(\"iframe.wp-embedded-content\"),s=0;s<a.length;s++){if(!(e=a[s]).getAttribute(\"data-secret\"))t=Math.random().toString(36).substr(2,10),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t);if(r||i)(t=e.cloneNode(!0)).removeAttribute(\"security\"),e.parentNode.replaceChild(t,e)}}}}(window,document);\n\/\/--><!]]>\n<\/script><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.apop.qc.ca\/fr\/activite\/menaces-informatiques\/embed\/\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Menaces informatiques&nbsp;: comment se prot\u00e9ger?\u00a0\u00bb &#8212; APOP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe>","thumbnail_url":"https:\/\/www.apop.qc.ca\/wp-content\/uploads\/2022\/02\/perfectionnement-02-02.jpg","thumbnail_width":1667,"thumbnail_height":1250,"description":"Cet atelier vise \u00e0 initier les participants et les participantes \u00e0 diff\u00e9rents dangers et \u00e0 diff\u00e9rentes menaces informatiques qui les guettent. Ils et elles seront appel\u00e9s \u00e0 bien comprendre ces menaces, \u00e0 s\u2019en prot\u00e9ger, \u00e0 adopter de bons comportements pour les \u00e9viter et \u00e0 r\u00e9agir efficacement dans l\u2019\u00e9ventualit\u00e9 d\u2019une attaque ou d\u2019une intrusion."}