{"id":2862,"date":"2021-03-02T06:55:00","date_gmt":"2021-03-02T06:55:00","guid":{"rendered":"http:\/\/catalystca.flywheelsites.com\/blog\/email-phishing-posing-catalyst-it\/"},"modified":"2024-07-10T08:08:02","modified_gmt":"2024-07-10T13:08:02","slug":"email-phishing-posing-catalyst-it","status":"publish","type":"post","link":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it","title":{"rendered":"Hame\u00e7onnage par e-mail &#8211; Les fraudeurs se faisant passer pour un catalyseur"},"content":{"rendered":"\n<p>Nous avons r\u00e9cemment appris l&#8217;existence d&#8217;une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.\n<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-attaques-de-phishing-deguisees-en-catalyst-ti\">Attaques de phishing d\u00e9guis\u00e9es en Catalyst TI<\/h2>\n\n\n\n<p>\nCe sch\u00e9ma particulier implique que l&#8217;escroc se fait passer pour un responsable des ressources humaines qui envoie des e-mails \u00e0 des individus sous pr\u00e9texte de recruter pour un poste chez Catalyst. Apr\u00e8s une discussion initiale sur l&#8217;emploi, l&#8217;escroc sugg\u00e8re que le candidat int\u00e9ress\u00e9 doit suivre une formation (dans ce cas, une formation Cisco) afin de recevoir une offre d&#8217;emploi finale. Ils proposent ensuite d&#8217;inscrire le candidat \u00e0 la formation, ce qui n\u00e9cessitera un paiement de 300 $.\n\nCes e-mails semblent tr\u00e8s authentiques &#8211; vous pourriez \u00eatre pardonn\u00e9 de croire qu&#8217;ils sont r\u00e9els.\n<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-les-meilleurs-conseils-pour-eviter-les-escroqueries-par-hameconnage\">Les meilleurs conseils pour \u00e9viter les escroqueries par hame\u00e7onnage<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-savoir-identifier-les-escroqueries-par-phishing\">Savoir identifier les escroqueries par phishing<\/h3>\n\n\n\n<p>\nL&#8217;hame\u00e7onnage peut vous parvenir sous diverses formes, par e-mails et m\u00eame par SMS. Pour cette raison, il est crucial que vous sachiez comment identifier un message de phishing \u00e0 partir d&#8217;un message authentique. L&#8217;une des formes les plus courantes utilis\u00e9es par les escrocs est un e-mail o\u00f9 ils utilisent un domaine de messagerie presque identique d&#8217;une entreprise officielle, en particulier des institutions financi\u00e8res, pour acc\u00e9der aux comptes bancaires des personnes et \u00e0 d&#8217;autres plateformes financi\u00e8res.\n\nLorsque vous voulez savoir comment identifier les escroqueries par hame\u00e7onnage, vous devez d&#8217;abord vous assurer de v\u00e9rifier la source des e-mails et messages entrants. Un bon exemple est, si vous recevez un message de votre \u00ab banque \u00bb, n&#8217;oubliez pas qu&#8217;elle ne vous demandera jamais d&#8217;envoyer votre mot de passe ou vos informations personnelles par e-mail. Lorsque vous voyez des d\u00e9tails comme celui-ci, il s&#8217;agit probablement d&#8217;une arnaque et il est pr\u00e9f\u00e9rable de supprimer l&#8217;e-mail imm\u00e9diatement.\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-soyez-prudent-lorsque-vous-cliquez-sur-des-liens\">Soyez prudent lorsque vous cliquez sur des liens<\/h3>\n\n\n\n<p>\nLes liens suspects, que ce soit dans les e-mails, les messages sur les r\u00e9seaux sociaux ou m\u00eame les SMS, ne doivent pas \u00eatre cliqu\u00e9s. Assurez-vous de v\u00e9rifier son authenticit\u00e9 avant de cliquer dessus. Aujourd&#8217;hui, de nombreux liens contiennent des virus qui peuvent s&#8217;infiltrer dans votre syst\u00e8me \u00e0 votre insu, alors soyez prudent !\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-soyez-prudent-avec-les-offres-en-ligne\">Soyez prudent avec les offres en ligne<\/h3>\n\n\n\n<p>\nN&#8217;oubliez pas que de nombreuses offres en ligne sont si tentantes. Cependant, il est facile de se laisser influencer par des e-mails et des publicit\u00e9s persuasifs. C&#8217;est pourquoi vous devez \u00eatre \u00e0 l&#8217;aff\u00fbt des offres trop belles pour \u00eatre vraies et toujours tout lire avant de conclure un accord.\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-evitez-de-visiter-des-sites-web-moins-connus\">\u00c9vitez de visiter des sites Web moins connus<\/h3>\n\n\n\n<p>\nLes escrocs mettent en place des sites Web pour attirer les visiteurs et les acheteurs sans m\u00e9fiance. Si vous recevez une invitation \u00e0 acheter sur le site d&#8217;une entreprise dont vous n&#8217;avez jamais entendu parler, arr\u00eatez-vous et r\u00e9fl\u00e9chissez-y \u00e0 deux fois. De cette fa\u00e7on, vous pouvez efficacement \u00e9viter d&#8217;\u00eatre victime d&#8217;astuces de phishing qui pourraient vous faire perdre beaucoup d&#8217;argent.\n<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-comment-signaler-une-attaque-de-phishing-en-australie\">Comment signaler une attaque de phishing en Australie<\/h2>\n\n\n\n<p>Le gouvernement australien a un site officiel qui parle des escroqueries par hame\u00e7onnage par e-mail,\u00a0<a href=\"https:\/\/www.cyber.gov.au\/threats\/types-threats\/phishing\" target=\"_blank\" rel=\"noreferrer noopener\">ici.<\/a>\u00a0Vous pouvez \u00e9galement signaler les attaques sur le site\u00a0<a href=\"https:\/\/www.scamwatch.gov.au\/get-help\/where-to-get-help\">Web ACCC Scamwatch du gouvernement.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nous avons r\u00e9cemment appris l&#8217;existence d&#8217;une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT. Attaques de phishing d\u00e9guis\u00e9es en Catalyst&#8230; [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it\">Read More&#8230;<span class=\"screen-reader-text\"> from Hame\u00e7onnage par e-mail &#8211; Les fraudeurs se faisant passer pour un catalyseur<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2672,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-2862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hame\u00e7onnage par e-mail - Les fraudeurs se faisant passer pour un catalyseur | Catalyst IT Canada<\/title>\n<meta name=\"description\" content=\"Nous avons r\u00e9cemment appris l&#039;existence d&#039;une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hame\u00e7onnage par e-mail - Les fraudeurs se faisant passer pour un catalyseur\" \/>\n<meta property=\"og:description\" content=\"Nous avons r\u00e9cemment appris l&#039;existence d&#039;une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it\" \/>\n<meta property=\"og:site_name\" content=\"Catalyst IT Canada\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T06:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T13:08:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2021\/12\/email-phishing-shutterstock_593626601.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Catalyst Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Catalyst Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it\"},\"author\":{\"name\":\"Catalyst Admin\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/person\\\/f7ad7193ea970755cd61d097785b2b0a\"},\"headline\":\"Hame\u00e7onnage par e-mail &#8211; Les fraudeurs se faisant passer pour un catalyseur\",\"datePublished\":\"2021-03-02T06:55:00+00:00\",\"dateModified\":\"2024-07-10T13:08:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/email-phishing-shutterstock_593626601.jpeg\",\"articleSection\":[\"Non classifi\u00e9(e)\"],\"inLanguage\":\"fr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it\",\"name\":\"Hame\u00e7onnage par e-mail - Les fraudeurs se faisant passer pour un catalyseur | Catalyst IT Canada\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/email-phishing-shutterstock_593626601.jpeg\",\"datePublished\":\"2021-03-02T06:55:00+00:00\",\"dateModified\":\"2024-07-10T13:08:02+00:00\",\"description\":\"Nous avons r\u00e9cemment appris l'existence d'une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#breadcrumb\"},\"inLanguage\":\"fr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#primaryimage\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/email-phishing-shutterstock_593626601.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/email-phishing-shutterstock_593626601.jpeg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/email-phishing-posing-catalyst-it#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hame\u00e7onnage par e-mail &#8211; Les fraudeurs se faisant passer pour un catalyseur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/\",\"name\":\"Catalyst IT Canada\",\"description\":\"Open Source Software Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#organization\",\"name\":\"Catalyst IT Canada Ltd\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/catalyst-expert-open-source-solutions.png\",\"contentUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/catalyst-expert-open-source-solutions.png\",\"width\":400,\"height\":126,\"caption\":\"Catalyst IT Canada Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/person\\\/f7ad7193ea970755cd61d097785b2b0a\",\"name\":\"Catalyst Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g\",\"caption\":\"Catalyst Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hame\u00e7onnage par e-mail - Les fraudeurs se faisant passer pour un catalyseur | Catalyst IT Canada","description":"Nous avons r\u00e9cemment appris l'existence d'une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it","og_locale":"fr_FR","og_type":"article","og_title":"Hame\u00e7onnage par e-mail - Les fraudeurs se faisant passer pour un catalyseur","og_description":"Nous avons r\u00e9cemment appris l'existence d'une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.","og_url":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it","og_site_name":"Catalyst IT Canada","article_published_time":"2021-03-02T06:55:00+00:00","article_modified_time":"2024-07-10T13:08:02+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2021\/12\/email-phishing-shutterstock_593626601.jpeg","type":"image\/jpeg"}],"author":"Catalyst Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Catalyst Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#article","isPartOf":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it"},"author":{"name":"Catalyst Admin","@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/person\/f7ad7193ea970755cd61d097785b2b0a"},"headline":"Hame\u00e7onnage par e-mail &#8211; Les fraudeurs se faisant passer pour un catalyseur","datePublished":"2021-03-02T06:55:00+00:00","dateModified":"2024-07-10T13:08:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it"},"wordCount":575,"publisher":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#organization"},"image":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#primaryimage"},"thumbnailUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2021\/12\/email-phishing-shutterstock_593626601.jpeg","articleSection":["Non classifi\u00e9(e)"],"inLanguage":"fr"},{"@type":"WebPage","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it","url":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it","name":"Hame\u00e7onnage par e-mail - Les fraudeurs se faisant passer pour un catalyseur | Catalyst IT Canada","isPartOf":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#primaryimage"},"image":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#primaryimage"},"thumbnailUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2021\/12\/email-phishing-shutterstock_593626601.jpeg","datePublished":"2021-03-02T06:55:00+00:00","dateModified":"2024-07-10T13:08:02+00:00","description":"Nous avons r\u00e9cemment appris l'existence d'une activit\u00e9 de phishing par e-mail, o\u00f9 les cybercriminels se font passer pour Catalyst IT.","breadcrumb":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#breadcrumb"},"inLanguage":"fr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it"]}]},{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#primaryimage","url":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2021\/12\/email-phishing-shutterstock_593626601.jpeg","contentUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2021\/12\/email-phishing-shutterstock_593626601.jpeg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/email-phishing-posing-catalyst-it#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.catalyst-ca.net\/fr"},{"@type":"ListItem","position":2,"name":"Hame\u00e7onnage par e-mail &#8211; Les fraudeurs se faisant passer pour un catalyseur"}]},{"@type":"WebSite","@id":"https:\/\/www.catalyst-ca.net\/fr\/#website","url":"https:\/\/www.catalyst-ca.net\/fr\/","name":"Catalyst IT Canada","description":"Open Source Software Services","publisher":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.catalyst-ca.net\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr"},{"@type":"Organization","@id":"https:\/\/www.catalyst-ca.net\/fr\/#organization","name":"Catalyst IT Canada Ltd","url":"https:\/\/www.catalyst-ca.net\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2022\/03\/catalyst-expert-open-source-solutions.png","contentUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2022\/03\/catalyst-expert-open-source-solutions.png","width":400,"height":126,"caption":"Catalyst IT Canada Ltd"},"image":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/person\/f7ad7193ea970755cd61d097785b2b0a","name":"Catalyst Admin","image":{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/secure.gravatar.com\/avatar\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g","caption":"Catalyst Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/posts\/2862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/comments?post=2862"}],"version-history":[{"count":0,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/posts\/2862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/media\/2672"}],"wp:attachment":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/media?parent=2862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/categories?post=2862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/tags?post=2862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}