{"id":2789,"date":"2017-06-15T08:00:25","date_gmt":"2017-06-15T12:00:25","guid":{"rendered":"http:\/\/alanaldanaabogados.com\/blog\/?p=165"},"modified":"2017-06-15T08:00:25","modified_gmt":"2017-06-15T12:00:25","slug":"cabinets-davocats-specialises-dans-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/venfort.com\/fr\/ciberseguridad-bufetes-abogados\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : prot\u00e9ger les cabinets juridiques \u00e0 l'\u00e8re num\u00e9rique"},"content":{"rendered":"<p>S'il est un endroit o\u00f9 la cybers\u00e9curit\u00e9 est n\u00e9cessaire, en dehors des institutions gouvernementales, lorsque des informations confidentielles sont stock\u00e9es, c'est bien dans un cabinet d'avocats. Les donn\u00e9es personnelles, les t\u00e9moignages, les documents officiels ou les informations bancaires des clients sont parmi les \u00e9l\u00e9ments les plus convoit\u00e9s et donc vuln\u00e9rables aux cyberattaques.<\/p>\n<p>Les informations trait\u00e9es par un cabinet juridique, m\u00eame s'il s'agit d'un petit cabinet, sont d'une grande valeur. Non seulement pour le professionnel du droit, mais aussi pour le client et m\u00eame pour la concurrence. La publication d'informations confidentielles \u00e0 des fins diverses, l'extorsion ou le fait de nuire l\u00e9galement \u00e0 la d\u00e9fense dans une affaire juridique particuli\u00e8re peuvent \u00eatre quelques-unes des raisons d'une cyberattaque.<\/p>\n<p>Bien que l'\u00e8re num\u00e9rique facilite dans de nombreux cas le travail des professionnels et permette de stocker davantage d'informations de mani\u00e8re syst\u00e9matis\u00e9e dans des bases de donn\u00e9es, des courriers \u00e9lectroniques ou des nuages num\u00e9riques, elle pr\u00e9sente \u00e9galement des risques auxquels il faut faire face.<\/p>\n<p>On le voit, le nombre de personnes impliqu\u00e9es et les graves r\u00e9percussions qui peuvent r\u00e9sulter d'une violation de donn\u00e9es exigent un syst\u00e8me de cybers\u00e9curit\u00e9 efficace, capable de d\u00e9tecter et d'enrayer toute menace latente. Outre l'exposition de la vie priv\u00e9e des clients, la compromission des affaires juridiques repr\u00e9sent\u00e9es par le cabinet et la violation de l'\u00e9thique du cabinet, une violation de donn\u00e9es peut entra\u00eener des amendes ou des cons\u00e9quences qui compromettent l'int\u00e9grit\u00e9 du cabinet d'avocats.<\/p>\n<p>L'investissement dans un syst\u00e8me de s\u00e9curit\u00e9 qui peut \u00eatre constamment mis \u00e0 jour est une condition pr\u00e9alable au fonctionnement efficace et s\u00fbr d'un cabinet juridique. De m\u00eame, son application doit comprendre la mise en \u0153uvre de politiques claires pour tous les employ\u00e9s qui traitent des donn\u00e9es confidentielles.<\/p>\n<h2>Mesures de cybers\u00e9curit\u00e9 - comment r\u00e9duire la menace ?<\/h2>\n<p>La s\u00e9curit\u00e9 d\u00e9pend de mains expertes. Par cons\u00e9quent, la premi\u00e8re mesure \u00e0 prendre est de faire appel aux services d'une \u00e9quipe informatique qualifi\u00e9e pour installer un syst\u00e8me ad\u00e9quat et surveiller les menaces \u00e9ventuelles. Les sp\u00e9cialistes de l'informatique sont les seuls professionnels comp\u00e9tents pour assurer la s\u00e9curit\u00e9 des informations et du r\u00e9seau interne du cabinet juridique. Cet investissement \u00e0 long terme permettra de pr\u00e9venir les risques et de pr\u00e9server la r\u00e9putation et la fiabilit\u00e9 du cabinet.<\/p>\n<p>Bien que la s\u00e9curit\u00e9 parfaite n'existe pas, il est possible de r\u00e9duire la vuln\u00e9rabilit\u00e9. Cela d\u00e9pend de la nature de chaque cabinet juridique, c'est-\u00e0-dire du nombre d'employ\u00e9s, du type de stockage d'informations le plus appropri\u00e9, de la plateforme \u00e0 utiliser et des politiques de s\u00e9curit\u00e9 qui r\u00e9gissent l'entreprise.<\/p>\n<h3>Les recommandations suivantes contribueront \u00e0 la protection des informations trait\u00e9es par le cabinet juridique :<\/h3>\n<p><strong>Investir dans un syst\u00e8me de cybers\u00e9curit\u00e9 adapt\u00e9 aux besoins de l'entreprise.<\/strong>. Consulter des sp\u00e9cialistes des technologies de l'information sur les avantages et les inconv\u00e9nients du logiciel achet\u00e9 en charge de la cybers\u00e9curit\u00e9.<\/p>\n<p><strong>N'oubliez pas que la s\u00e9curit\u00e9 du cabinet juridique d\u00e9pend de l'entreprise et de ses employ\u00e9s.<\/strong>. Les forces de l'ordre n'ont aucun r\u00f4le \u00e0 jouer dans la pr\u00e9vention de ce type de crime et ne pourraient intervenir qu'apr\u00e8s coup pour soutenir la recherche des auteurs de la cyber-attaque.<\/p>\n<p><strong>Si possible, le bureau doit disposer d'un serveur priv\u00e9 local.<\/strong> o\u00f9 les informations sont h\u00e9berg\u00e9es. De m\u00eame, il est essentiel que le r\u00e9seau interne dispose de toutes les politiques n\u00e9cessaires en mati\u00e8re de s\u00e9curit\u00e9 informatique et de protection de la vie priv\u00e9e pour emp\u00eacher l'intrusion et le vol d'informations priv\u00e9es sur les clients ou les affaires juridiques.<\/p>\n<p><strong>Sauvegarde de toutes les informations confidentielles<\/strong> Les donn\u00e9es sont stock\u00e9es dans un espace s\u00e9par\u00e9 sur le serveur priv\u00e9 local.<\/p>\n<p><strong>Il n'est en aucun cas recommand\u00e9 de stocker ce type d'informations sur des appareils mobiles.<\/strong> susceptibles de faire l'objet de cyberattaques. \u00c0 d\u00e9faut, il est conseill\u00e9 d'utiliser des appareils crypt\u00e9s (propres \u00e0 l'entreprise) dot\u00e9s de mesures de protection sp\u00e9ciales.<\/p>\n<h3>En plus de faire attention \u00e0 l'utilisation des appareils mobiles, n'oubliez pas :<\/h3>\n<p><strong>Concevoir un protocole d'urgence avec les professionnels des technologies de l'information.<\/strong>, Le logiciel doit \u00eatre utilis\u00e9 lorsque la s\u00e9curit\u00e9 du logiciel est viol\u00e9e. Dans ce cas, il est important de d\u00e9signer des personnes pour agir afin de stopper l'attaque. Et de restaurer le syst\u00e8me en prot\u00e9geant un maximum d'informations.<\/p>\n<p><strong>\u00c9valuer fr\u00e9quemment l'utilisation et le potentiel du logiciel choisi.<\/strong> menaces. Parfois, ces outils n\u00e9cessitent des mises \u00e0 jour ou des ajustements pour accro\u00eetre leurs capacit\u00e9s.<\/p>\n<p><strong>Maintenir les niveaux d'acc\u00e8s aux informations confidentielles<\/strong>, en fonction des comp\u00e9tences du personnel travaillant dans le cabinet d'avocats. Cette action permet de limiter l'acc\u00e8s aux donn\u00e9es si elles ne doivent pas \u00eatre utilis\u00e9es par tous les professionnels.<\/p>\n<p><strong>Informer et former le personnel travaillant dans le cabinet juridique sur les mesures de s\u00e9curit\u00e9.<\/strong> \u00e0 prendre pour prot\u00e9ger les donn\u00e9es confidentielles. Lors de l'embauche d'avocats, le cabinet juridique devrait assurer une formation dans ce domaine. Cela permet de r\u00e9duire les cibles des cyber-attaques. De m\u00eame, il est important que la formation soit constamment mise \u00e0 jour, au cas o\u00f9 des changements seraient apport\u00e9s au syst\u00e8me.<\/p>\n<p><strong>L'utilisation des r\u00e9seaux sociaux de l'entreprise, le cas \u00e9ch\u00e9ant,<\/strong> doivent \u00eatre confi\u00e9s \u00e0 des experts en la mati\u00e8re. Ils doivent \u00e9galement \u00eatre inform\u00e9s des politiques de s\u00e9curit\u00e9 de l'entreprise. En outre, il est important qu'aucune information confidentielle ne soit diffus\u00e9e par le biais de ces canaux num\u00e9riques. <a href=\"http:\/\/alanaldanaabogados.com\/blog\/redes-sociales-posicionarse-abogados\/#.WTWLtJI19dg\">Voici quelques suggestions<\/a> pour le traitement ad\u00e9quat des services num\u00e9riques.<\/p>\n<h3>Enfin...<\/h3>\n<p><strong>R\u00e9pondez aux questions suivantes<\/strong> pour l'article \u00abCybers\u00e9curit\u00e9 et bonnes pratiques pour les avocats\u00bb. Elles peuvent \u00eatre d'une grande utilit\u00e9 pour renforcer la s\u00e9curit\u00e9 du syst\u00e8me :<\/p>\n<ul>\n<li>Depuis combien de temps l'entreprise existe-t-elle ?<\/li>\n<li>Quel type de plateforme h\u00e9bergera les donn\u00e9es du cabinet d'avocats ?<\/li>\n<li>Qui a ou devrait avoir acc\u00e8s \u00e0 ces plateformes, et comment s'assurer que seul le personnel autoris\u00e9 a acc\u00e8s aux informations crypt\u00e9es ?<\/li>\n<li>Comment les performances du syst\u00e8me en mati\u00e8re de s\u00e9curit\u00e9 sont-elles \u00e9valu\u00e9es ou v\u00e9rifi\u00e9es ?<\/li>\n<li>En cas de probl\u00e8me dans le syst\u00e8me, quelle \u00e9quipe informatique fournira l'assistance n\u00e9cessaire pour r\u00e9soudre la situation ?<\/li>\n<li>Les informations confidentielles d\u00e9tenues par l'entreprise sont-elles sauvegard\u00e9es ?<\/li>\n<li>O\u00f9 se trouvent les serveurs priv\u00e9s de l'entreprise et le personnel autoris\u00e9 y a-t-il acc\u00e8s ?<\/li>\n<li>Existe-t-il un protocole d'urgence et qui est form\u00e9 pour le mettre en \u0153uvre ?<\/li>\n<\/ul>\n<p>Pour une liste compl\u00e8te de ces questions permettant de v\u00e9rifier l'\u00e9tat de s\u00e9curit\u00e9 du syst\u00e8me, veuillez consulter directement <a href=\"http:\/\/abovethelaw.com\/2016\/11\/cybersecurity-and-best-practices-for-lawyers\/?rf=1\">l'article ici<\/a>.<\/p>\n<p><strong>Sources consult\u00e9es<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/nubbius.com\/blog\/ciberseguridad-en-los-despachos-de-abogados\">Nubbius.com<\/a><\/li>\n<li><a href=\"https:\/\/eldocumentalistaudiovisual.com\/2017\/02\/08\/ciberseguridad-en-despachos-de-abogados\/\">ElDocumentalistaAudiovisual.com<\/a><\/li>\n<li><a href=\"http:\/\/abovethelaw.com\/2016\/11\/cybersecurity-and-best-practices-for-lawyers\/?rf=1\">AboveTheLaw.Com<\/a><\/li>\n<li><a href=\"http:\/\/marketingparaabogados.eu\/silvia-barrera-despachos-ciberataque\/\">MarketingForLawyers.eu<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Si hay un lugar donde se requiere la ciberseguridad, aparte de las instituciones gubernamentales, donde se almacena informaci\u00f3n confidencial es en un bufete de abogados. Datos personales, testimonios, documentos oficiales o informaci\u00f3n bancaria de los clientes son algunos de los elementos m\u00e1s codiciados y por lo tanto, vulnerables ante un ciberataque. La informaci\u00f3n manejada por [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2790,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","omw_enable_modal_window":"enable","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[35],"tags":[89,55,493],"class_list":["post-2789","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-bufete","tag-ciberseguridad","tag-industria-legal","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad: resguardar a los bufetes de abogados en la era digital<\/title>\n<meta name=\"description\" content=\"Agrupamos en este art\u00edculo las mejores recomendaciones para apoyar la ciberseguridad de la informaci\u00f3n manejada por un bufete de abogados.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/venfort.com\/fr\/cabinets-davocats-specialises-dans-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad: resguardar a los bufetes de abogados en la era digital\" \/>\n<meta property=\"og:description\" content=\"Agrupamos en este art\u00edculo las mejores recomendaciones para apoyar la ciberseguridad de la informaci\u00f3n manejada por un bufete de abogados.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/venfort.com\/fr\/cabinets-davocats-specialises-dans-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Venfort\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/venfortyabogados\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-15T12:00:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/venfort.com\/wp-content\/uploads\/2017\/06\/ciberseguridad-bufetes-abogados.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"VENFORT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Venfortabogados\" \/>\n<meta name=\"twitter:site\" content=\"@Venfortabogados\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"VENFORT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/\"},\"author\":{\"name\":\"VENFORT\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/person\\\/6c0e1de9015eb56bbbf307df50c9872e\"},\"headline\":\"Ciberseguridad: resguardar a los bufetes de abogados en la era digital\",\"datePublished\":\"2017-06-15T12:00:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/\"},\"wordCount\":1136,\"publisher\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/ciberseguridad-bufetes-abogados.jpg\",\"keywords\":[\"Bufete\",\"ciberseguridad\",\"Industria Legal\"],\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/\",\"url\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/\",\"name\":\"Ciberseguridad: resguardar a los bufetes de abogados en la era digital\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/ciberseguridad-bufetes-abogados.jpg\",\"datePublished\":\"2017-06-15T12:00:25+00:00\",\"description\":\"Agrupamos en este art\u00edculo las mejores recomendaciones para apoyar la ciberseguridad de la informaci\u00f3n manejada por un bufete de abogados.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#primaryimage\",\"url\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/ciberseguridad-bufetes-abogados.jpg\",\"contentUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/ciberseguridad-bufetes-abogados.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ciberseguridad-bufetes-abogados\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/venfort.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad: resguardar a los bufetes de abogados en la era digital\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#website\",\"url\":\"https:\\\/\\\/venfort.com\\\/\",\"name\":\"Venfort\",\"description\":\"Firma de Abogados | Derecho Penal Econ\u00f3mico, Derecho Penal Internacional, Derecho de Empresas, Derecho Financiero, Derecho Administrativo, Derecho Civil y Sucesiones Internacionales\",\"publisher\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#organization\"},\"alternateName\":\"VENFORT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/venfort.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#organization\",\"name\":\"Venfort Abogados\",\"alternateName\":\"VENFORT\",\"url\":\"https:\\\/\\\/venfort.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Logo_Venfort_Horizontal_Color.png\",\"contentUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Logo_Venfort_Horizontal_Color.png\",\"width\":1000,\"height\":237,\"caption\":\"Venfort Abogados\"},\"image\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/venfortyabogados\",\"https:\\\/\\\/x.com\\\/Venfortabogados\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/venfort-aldana-abogados\",\"https:\\\/\\\/www.instagram.com\\\/venfortabogados\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/person\\\/6c0e1de9015eb56bbbf307df50c9872e\",\"name\":\"VENFORT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g\",\"caption\":\"VENFORT\"},\"url\":\"https:\\\/\\\/venfort.com\\\/fr\\\/author\\\/venfortadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : prot\u00e9ger les cabinets juridiques \u00e0 l'\u00e8re num\u00e9rique","description":"Dans cet article, nous regroupons les meilleures recommandations pour soutenir la cybers\u00e9curit\u00e9 des informations trait\u00e9es par un cabinet d'avocats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/venfort.com\/fr\/cabinets-davocats-specialises-dans-la-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Ciberseguridad: resguardar a los bufetes de abogados en la era digital","og_description":"Agrupamos en este art\u00edculo las mejores recomendaciones para apoyar la ciberseguridad de la informaci\u00f3n manejada por un bufete de abogados.","og_url":"https:\/\/venfort.com\/fr\/cabinets-davocats-specialises-dans-la-cybersecurite\/","og_site_name":"Venfort","article_publisher":"https:\/\/www.facebook.com\/venfortyabogados","article_published_time":"2017-06-15T12:00:25+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/venfort.com\/wp-content\/uploads\/2017\/06\/ciberseguridad-bufetes-abogados.jpg","type":"image\/jpeg"}],"author":"VENFORT","twitter_card":"summary_large_image","twitter_creator":"@Venfortabogados","twitter_site":"@Venfortabogados","twitter_misc":{"\u00c9crit par":"VENFORT","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#article","isPartOf":{"@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/"},"author":{"name":"VENFORT","@id":"https:\/\/venfort.com\/#\/schema\/person\/6c0e1de9015eb56bbbf307df50c9872e"},"headline":"Ciberseguridad: resguardar a los bufetes de abogados en la era digital","datePublished":"2017-06-15T12:00:25+00:00","mainEntityOfPage":{"@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/"},"wordCount":1136,"publisher":{"@id":"https:\/\/venfort.com\/#organization"},"image":{"@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#primaryimage"},"thumbnailUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2017\/06\/ciberseguridad-bufetes-abogados.jpg","keywords":["Bufete","ciberseguridad","Industria Legal"],"articleSection":["Seguridad"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/","url":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/","name":"Cybers\u00e9curit\u00e9 : prot\u00e9ger les cabinets juridiques \u00e0 l'\u00e8re num\u00e9rique","isPartOf":{"@id":"https:\/\/venfort.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#primaryimage"},"image":{"@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#primaryimage"},"thumbnailUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2017\/06\/ciberseguridad-bufetes-abogados.jpg","datePublished":"2017-06-15T12:00:25+00:00","description":"Dans cet article, nous regroupons les meilleures recommandations pour soutenir la cybers\u00e9curit\u00e9 des informations trait\u00e9es par un cabinet d'avocats.","breadcrumb":{"@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#primaryimage","url":"https:\/\/venfort.com\/wp-content\/uploads\/2017\/06\/ciberseguridad-bufetes-abogados.jpg","contentUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2017\/06\/ciberseguridad-bufetes-abogados.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/venfort.com\/ciberseguridad-bufetes-abogados\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/venfort.com\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad: resguardar a los bufetes de abogados en la era digital"}]},{"@type":"WebSite","@id":"https:\/\/venfort.com\/#website","url":"https:\/\/venfort.com\/","name":"Venfort","description":"Cabinet : Droit p\u00e9nal \u00e9conomique, droit p\u00e9nal international, droit des soci\u00e9t\u00e9s, droit financier, droit administratif, droit civil et droit des successions internationales","publisher":{"@id":"https:\/\/venfort.com\/#organization"},"alternateName":"VENFORT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/venfort.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/venfort.com\/#organization","name":"Avocats de Venfort","alternateName":"VENFORT","url":"https:\/\/venfort.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/venfort.com\/#\/schema\/logo\/image\/","url":"https:\/\/venfort.com\/wp-content\/uploads\/2026\/03\/Logo_Venfort_Horizontal_Color.png","contentUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2026\/03\/Logo_Venfort_Horizontal_Color.png","width":1000,"height":237,"caption":"Venfort Abogados"},"image":{"@id":"https:\/\/venfort.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/venfortyabogados","https:\/\/x.com\/Venfortabogados","https:\/\/www.linkedin.com\/company\/venfort-aldana-abogados","https:\/\/www.instagram.com\/venfortabogados"]},{"@type":"Person","@id":"https:\/\/venfort.com\/#\/schema\/person\/6c0e1de9015eb56bbbf307df50c9872e","name":"VENFORT","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g","caption":"VENFORT"},"url":"https:\/\/venfort.com\/fr\/author\/venfortadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/posts\/2789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/comments?post=2789"}],"version-history":[{"count":0,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/posts\/2789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/media\/2790"}],"wp:attachment":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/media?parent=2789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/categories?post=2789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/tags?post=2789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}