{"id":2761,"date":"2019-06-22T11:02:15","date_gmt":"2019-06-22T09:02:15","guid":{"rendered":"https:\/\/www.microsave.net\/fr\/?p=2761"},"modified":"2025-09-15T17:20:58","modified_gmt":"2025-09-15T11:50:58","slug":"comment-faire-face-a-la-cyber-criminalite-en-finance-digitale","status":"publish","type":"post","link":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/","title":{"rendered":"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale?"},"content":{"rendered":"<h3><strong>Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale?\u00a0<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p><em>Par Elizabeth Berthe, Rebecca Szantyr<br \/>\n<\/em><em>Contributeur, Cheikh Ndiaye<\/em><\/p>\n<p><span style=\"font-weight: 400\">La r\u00e9volution digitale a notamment facilit\u00e9 l\u2019interconnexion dans l\u2019\u00e9cosyst\u00e8me de la finance et l\u2019acc\u00e8s automatique aux donn\u00e9es via le Big Data ou la Blockchain. Gr\u00e2ce \u00e0 elle, nous pouvons faire nos op\u00e9rations bancaires \u00e0 distance ou via des comptes mobiles money. Nous pouvons aussi envoyer et recevoir de l\u2019argent via les soci\u00e9t\u00e9s de transferts d\u2019argent de fa\u00e7on spontan\u00e9e. Mais la multiplication des points d\u2019acc\u00e8s multiplie les vuln\u00e9rabilit\u00e9s : aussi rapide et efficace qu\u2019elle soit, l\u2019automatisation de toutes ces op\u00e9rations exige beaucoup plus de vigilance de la part des diff\u00e9rents acteurs de l\u2019\u00e9cosyst\u00e8me de la finance digitale.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Si la r\u00e9volution digitale a permis de consid\u00e9rablement accro\u00eetre le champs des possibles, elle a \u00e9galement chamboul\u00e9 les organisations des entreprises et ouvert l\u2019acc\u00e8s \u00e0 de nouvelles menaces. La cybercriminalit\u00e9 en fait partie. Les chiffres parlent d\u2019eux-m\u00eames:<\/span> <span style=\"font-weight: 400\">l\u2019<\/span><a href=\"https:\/\/digital4africa.com\/wp-content\/uploads\/2018\/04\/Africa-Cyber-Security-Report-2017.pdf\"><span style=\"font-weight: 400\">audit<\/span><\/a><span style=\"font-weight: 400\"> men\u00e9 par la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 kenyane Serianu montre qu\u2019en 2017, la cybercriminalit\u00e9 continentale a engendr\u00e9 de lourds pr\u00e9judices financiers: le Nig\u00e9ria a perdu 649 millions de dollars, le Kenya, 210 millions de dollars, la Tanzanie, 99 millions de dollars. \u00a0L\u2019Afrique de l\u2019Ouest n\u2019est pas \u00e9pargn\u00e9e, la banque NSIA en C\u00f4te d\u2019Ivoire avait \u00e9t\u00e9 victime de ses failles de s\u00e9curit\u00e9 en 2018, perdant pr\u00e8s de 1 000 000 000 FCFA d\u00fb \u00e0 un piratage informatique. Au S\u00e9n\u00e9gal, <\/span><a href=\"https:\/\/www.sikafinance.com\/marches\/marchessenegal-323-millions-fcfa-soutires-frauduleusement-a-ecobank_16410\"><span style=\"font-weight: 400\">apr\u00e8s Ecobank qui a perdu 323 millions de FCFA<\/span><\/a><span style=\"font-weight: 400\">, c\u2019est au tour de la <\/span><a href=\"https:\/\/www.sikafinance.com\/marches\/senegal-la-banque-de-dakar-visee-par-une-cyberattaque_16595\"><span style=\"font-weight: 400\">banque de Dakar<\/span><\/a><span style=\"font-weight: 400\"> d\u2019\u00eatre victime d\u2019une tentative de fraude informatique qu\u2019elle a pu neutralis\u00e9e. Au total, le continent a accus\u00e9 une perte de 3,5 milliards de dollars pour l\u2019ann\u00e9e 2017. Pour Serianu, ce ne serait pas des cas isol\u00e9s : \u00ab <\/span><i><span style=\"font-weight: 400\">Le nombre de menaces et les pertes de donn\u00e9es ont augment\u00e9, avec le constat clair que les cybercriminels africains deviennent de plus en plus performants et dangereux<\/span><\/i><span style=\"font-weight: 400\"> \u00bb.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2762 size-full\" src=\"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/cybercriminalite\u0301.jpeg\" alt=\"\" width=\"588\" height=\"562\" \/>Jean-Louis Perrier, Co-fondateur de <\/span><a href=\"https:\/\/suricateconcept.com\/\"><span style=\"font-weight: 400\">Suricate Solutions,<\/span><\/a><span style=\"font-weight: 400\"> une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e en cyber-s\u00e9curit\u00e9 pour l\u2019Afrique, indique que \u00a0200 millions d\u2019Africains ont acc\u00e8s \u00e0 des services financiers num\u00e9riques qui sont peu s\u00e9curis\u00e9s et sujets \u00e0 de nombreuses cyber-attaques<\/span><span style=\"font-weight: 400\">. <\/span><\/p>\n<p><span style=\"font-weight: 400\">En effet, les premiers secteurs \u00e0 \u00eatre victimes de ces attaques sont les banques et les institutions financi\u00e8res, le gouvernement ou les op\u00e9rateurs de t\u00e9l\u00e9phonie mobile.<\/span><b> \u00a0<\/b><a href=\"http:\/\/www.globalsecuritymag.fr\/7-Tendances-de-la-fraude-bancaire,20190531,87628.html\"><span style=\"font-weight: 400\">Les banques et autres institutions financi\u00e8res ont enregistr\u00e9 une croissance de 37% des attaques de prise de contr\u00f4le de comptes effectu\u00e9es depuis un ordinateur au cours du troisi\u00e8me et du quatri\u00e8me trimestre.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Les fintech ne sont pas en reste :<\/span><span style=\"font-weight: 400\"> Aujourd\u2019hui, 8,8 % des comptes de clients Fintech sont frauduleux contre 4,2 % pour les institutions financi\u00e8res traditionnelles.<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400\">Et pourtant encore peu de <\/span><a href=\"https:\/\/www.pwc.fr\/fr\/assets\/files\/pdf\/2016\/03\/pwc_livre_blanc01_business_forum2016_v2.pdf\"><span style=\"font-weight: 400\">dirigeants s\u2019investissent dans cette r\u00e9alit\u00e9.<\/span><\/a><span style=\"font-weight: 400\"> Mesurent-ils bien ce qu\u2019est la cyber-criminalit\u00e9?<br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400\">L\u2019accessibilit\u00e9 d\u2019Internet, le d\u00e9veloppement de la 3G\/4G, l\u2019anonymat sur le web, le manque de sensibilisation des acteurs en entreprise et des populations \u00e0 la cybers\u00e9curit\u00e9 ont facilit\u00e9 les infractions en ligne, mais aussi le SPAM par SMS par exemple. Il est grand temps d\u2019installer des solutions de s\u00e9curit\u00e9 afin d\u2019assurer la protection des utilisateurs contre ces tentatives de fraudes.<\/span><\/p>\n<p><b>Un panorama cybercriminel propre \u00e0 l&#8217;Afrique :<\/b><\/p>\n<p><span style=\"font-weight: 400\">Une nouvelle g\u00e9n\u00e9ration de cybercriminels ouest-africains a \u00e9merg\u00e9. Elle se compose de jeunes dipl\u00f4m\u00e9s sans emploi, regroup\u00e9s pour certains au sein de gangs virtuels, qui se vantent<\/span> <span style=\"font-weight: 400\">sur les r\u00e9seaux sociaux de leurs cyberbraquages, \u00e9changent leurs techniques d\u2019arnaques classiques et sophistiqu\u00e9es dans le monde r\u00e9el. La plupart d\u2019entre eux ont entre 19 \u00e0 39 ans.<\/span><\/p>\n<p><b>Comment les hackers peuvent-ils nous atteindre ?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Il est important de noter que les hackers ne sont pas motiv\u00e9s par les m\u00eames raisons. G\u00e9n\u00e9ralement, nous avons trois types de motivations qui sont :<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400\"> \u00a0\u00a0\u00a0\u00a0L\u2019espionnage ou la surveillance qui se fait surtout pour le vol ou la copie de donn\u00e9es industrielles entre concurrents et parfois entre Etats.<\/span><\/li>\n<li><span style=\"font-weight: 400\"> \u00a0\u00a0\u00a0\u00a0\u00a0La cyberguerre qui consiste \u00e0 pirater le syst\u00e8me d\u2019un gouvernement ou celui d\u2019un groupe de combattants extr\u00e9mistes pour les d\u00e9sarmer ou bien d\u00e9jouer leurs strat\u00e9gies en temps de guerre.<\/span><\/li>\n<li><span style=\"font-weight: 400\"> \u00a0\u00a0\u00a0\u00a0\u00a0Les demandeurs de ran\u00e7ons<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Les actions de ces derniers sont g\u00e9n\u00e9ralement directement li\u00e9es \u00e0 la finance et souvent \u00e0 la finance digitale et constituent environ plus 75% des attaques men\u00e9es par les hackers. <\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Les infractions sont multiples et diversifi\u00e9es : liens re\u00e7us par email, r\u00e9seaux sociaux, cl\u00e9s USB, micro-processeurs, kits d&#8217;exploitation. Ces derniers sont un bon moyen<\/span><span style=\"font-weight: 400\"> pour faire du cyber-espionnage, effectuer des fraudes bancaires (virements automatiques) ou pour voler des donn\u00e9es. Un ordinateur qui n\u2019est pas fr\u00e9quemment mis \u00e0 jour est vuln\u00e9rable et chaque vuln\u00e9rabilit\u00e9 est une opportunit\u00e9 servie sur un plateau pour ces hackers.<\/span><\/p>\n<p><b>Quelles sont les pistes de solutions pour prot\u00e9ger les donn\u00e9es et les consommateurs?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Bien qu\u2019il n\u2019existe pas un logiciel qui pourra vous garantir une s\u00e9curit\u00e9 \u00e0 100%, il existe de nombreuses solutions \u00e0 mettre en place afin de r\u00e9duire les risques de cyber-fraude. <\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><a href=\"https:\/\/suricateconcept.com\/\"><span style=\"font-weight: 400\">Suricate solutions<\/span><\/a><span style=\"font-weight: 400\"> a lanc\u00e9 en Afrique le premier centre de cybers\u00e9curit\u00e9 pour prot\u00e9ger les clients et les institutions de finance inclusive en Afrique de l\u2019Ouest. <\/span><span style=\"font-weight: 400\">La big data permet des analyses plus pouss\u00e9es pour identifier les attaques des cyber attaquants.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Mais chacun \u00e0 son \u00e9chelle peut aussi contribuer \u00e0 une meilleure s\u00e9curisation de ses sites internet. <\/span><a href=\"https:\/\/unctad.org\/meetings\/en\/Presentation\/dtl_uemoa2018p17_ayankey_fr.pdf\"><span style=\"font-weight: 400\">Commencez par<\/span><\/a><span style=\"font-weight: 400\"> :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Allouez un budget d\u00e9di\u00e9 \u00e0 la s\u00e9curit\u00e9 informatique, embauchez des personnes ayant des comp\u00e9tences en cyber-s\u00e9curit\u00e9<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">S\u00e9curisez vos sites internet en utilisant le https, <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Utilisez des logiciels authentiques, <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Faites leur mise \u00e0 jour r\u00e9guli\u00e8re et<\/span><a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/cyber-security-trends-report-africa-interactive-en.pdf\"><span style=\"font-weight: 400\"> contr\u00f4lez toutes les \u00e9ventuelles vuln\u00e9rabilit\u00e9s<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Analysez en temps r\u00e9el les fichiers et\/ou courriels re\u00e7us et v\u00e9rifiez bien leur provenance avant de toucher \u00e0 un quelconque lien se trouvant au sein du mail, <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Faites des sauvegardes de votre syst\u00e8me d\u2019information et <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Copiez les donn\u00e9es sur un serveur de secours.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Si vous \u00eates dirigeant d\u2019entreprise, organisez des formations du personnel r\u00e9guli\u00e8res sur les cybers risques.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Si beaucoup de chemin reste \u00e0 parcourir, y compris dans la protection des donn\u00e9es personnelles, la cybers\u00e9curit\u00e9 ne doit pas \u00eatre uniquement consid\u00e9r\u00e9e comme uniquement une gestion des risques mais \u00e9galement <a href=\"https:\/\/www.pwc.fr\/fr\/assets\/files\/pdf\/2016\/03\/pwc_livre_blanc01_business_forum2016_v2.pdf\">comme une opportunit\u00e9 de croissance.<\/a> En effet, <a href=\"https:\/\/www.microsave.net\/fr\/institut-helix\/formations-en-presentiel\/gerer-les-risques-et-prevenir-la-fraude-en-finance-digitale\/\">une bonne gestion des risques et de pr\u00e9vention de la fraude<\/a> vous fera gagner la confiance de vos clients, et se traduira par une augmentation du taux d\u2019activit\u00e9 et d\u2019utilisation de vos services.<\/span><\/p>\n<button class=\"simplefavorite-button\" data-postid=\"2761\" data-siteid=\"1\" data-groupid=\"1\" data-favoritecount=\"0\" style=\"box-shadow:none;-webkit-box-shadow:none;-moz-box-shadow:none;background-color:#ffffff;border-color:#5a5a5a;color:#ffffff;\"><i class='fa fa-bookmark-o unfavorite'><\/i><\/button>","protected":false},"excerpt":{"rendered":"<p>La r\u00e9volution digitale a notamment facilit\u00e9 l\u2019interconnexion dans l\u2019\u00e9cosyst\u00e8me de la finance et l\u2019acc\u00e8s automatique aux donn\u00e9es via le Big Data ou la Blockchain. Gr\u00e2ce \u00e0 elle, nous pouvons faire nos op\u00e9rations bancaires \u00e0 distance ou via des comptes mobiles money. Nous pouvons aussi envoyer et recevoir de l\u2019argent via les soci\u00e9t\u00e9s de transferts d\u2019argent de fa\u00e7on spontan\u00e9e. Mais la multiplication des points d\u2019acc\u00e8s multiplie les vuln\u00e9rabilit\u00e9s : aussi rapide et efficace qu\u2019elle soit, l\u2019automatisation de toutes ces op\u00e9rations exige beaucoup plus de vigilance de la part des diff\u00e9rents acteurs de l\u2019\u00e9cosyst\u00e8me de la finance digitale.<\/p>\n","protected":false},"author":1031,"featured_media":41490,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5451],"tags":[],"region":[5520],"class_list":["post-2761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","post_theme-transformation-digitale","post_theme-protection-des-donnees","resource_type-articles","region-afrique-de-louest-et-centrale"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale? - MicroSave Consulting (MSC)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale? - MicroSave Consulting (MSC)\" \/>\n<meta property=\"og:description\" content=\"La r\u00e9volution digitale a notamment facilit\u00e9 l\u2019interconnexion dans l\u2019\u00e9cosyst\u00e8me de la finance et l\u2019acc\u00e8s automatique aux donn\u00e9es via le Big Data ou la Blockchain. Gr\u00e2ce \u00e0 elle, nous pouvons faire nos op\u00e9rations bancaires \u00e0 distance ou via des comptes mobiles money. Nous pouvons aussi envoyer et recevoir de l\u2019argent via les soci\u00e9t\u00e9s de transferts d\u2019argent de fa\u00e7on spontan\u00e9e. Mais la multiplication des points d\u2019acc\u00e8s multiplie les vuln\u00e9rabilit\u00e9s : aussi rapide et efficace qu\u2019elle soit, l\u2019automatisation de toutes ces op\u00e9rations exige beaucoup plus de vigilance de la part des diff\u00e9rents acteurs de l\u2019\u00e9cosyst\u00e8me de la finance digitale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/\" \/>\n<meta property=\"og:site_name\" content=\"MicroSave Consulting (MSC)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MicroSaveConsultingFR\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-22T09:02:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-15T11:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"589\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rebecca Szantyr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MicroSaveFR\" \/>\n<meta name=\"twitter:site\" content=\"@MicroSaveFR\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rebecca Szantyr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/\"},\"author\":{\"name\":\"Rebecca Szantyr\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#\\\/schema\\\/person\\\/0434c54ec0112b2df6b94a87a3f4f0ba\"},\"headline\":\"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale?\",\"datePublished\":\"2019-06-22T09:02:15+00:00\",\"dateModified\":\"2025-09-15T11:50:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/\"},\"wordCount\":1141,\"publisher\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/\",\"url\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/\",\"name\":\"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale? - MicroSave Consulting (MSC)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg\",\"datePublished\":\"2019-06-22T09:02:15+00:00\",\"dateModified\":\"2025-09-15T11:50:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg\",\"width\":1280,\"height\":589},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/blog\\\/2019\\\/06\\\/22\\\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/\",\"name\":\"Microsave Consulting Fr\",\"description\":\"Consulting pour Services Financiers\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#organization\",\"name\":\"MSC CONSULTING\",\"url\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/MSC.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/MSC.jpg\",\"width\":360,\"height\":340,\"caption\":\"MSC CONSULTING\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/MicroSaveConsultingFR\",\"https:\\\/\\\/x.com\\\/MicroSaveFR\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC8NseooqQHxCWDoZ63T42ig\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/#\\\/schema\\\/person\\\/0434c54ec0112b2df6b94a87a3f4f0ba\",\"name\":\"Rebecca Szantyr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607a29c3263e8210eeabd43b5b34afc265d522a5fe25c350322c35b05485ca68?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607a29c3263e8210eeabd43b5b34afc265d522a5fe25c350322c35b05485ca68?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607a29c3263e8210eeabd43b5b34afc265d522a5fe25c350322c35b05485ca68?s=96&d=mm&r=g\",\"caption\":\"Rebecca Szantyr\"},\"description\":\"Rebecca Szantyr is a senior manager at MicroSave Consulting Francophone Africa.\",\"url\":\"https:\\\/\\\/www.microsave.net\\\/fr\\\/auteur\\\/rebecca-szantyr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale? - MicroSave Consulting (MSC)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/","og_locale":"en_US","og_type":"article","og_title":"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale? - MicroSave Consulting (MSC)","og_description":"La r\u00e9volution digitale a notamment facilit\u00e9 l\u2019interconnexion dans l\u2019\u00e9cosyst\u00e8me de la finance et l\u2019acc\u00e8s automatique aux donn\u00e9es via le Big Data ou la Blockchain. Gr\u00e2ce \u00e0 elle, nous pouvons faire nos op\u00e9rations bancaires \u00e0 distance ou via des comptes mobiles money. Nous pouvons aussi envoyer et recevoir de l\u2019argent via les soci\u00e9t\u00e9s de transferts d\u2019argent de fa\u00e7on spontan\u00e9e. Mais la multiplication des points d\u2019acc\u00e8s multiplie les vuln\u00e9rabilit\u00e9s : aussi rapide et efficace qu\u2019elle soit, l\u2019automatisation de toutes ces op\u00e9rations exige beaucoup plus de vigilance de la part des diff\u00e9rents acteurs de l\u2019\u00e9cosyst\u00e8me de la finance digitale.","og_url":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/","og_site_name":"MicroSave Consulting (MSC)","article_publisher":"https:\/\/www.facebook.com\/MicroSaveConsultingFR","article_published_time":"2019-06-22T09:02:15+00:00","article_modified_time":"2025-09-15T11:50:58+00:00","og_image":[{"width":1280,"height":589,"url":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg","type":"image\/jpeg"}],"author":"Rebecca Szantyr","twitter_card":"summary_large_image","twitter_creator":"@MicroSaveFR","twitter_site":"@MicroSaveFR","twitter_misc":{"Written by":"Rebecca Szantyr","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#article","isPartOf":{"@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/"},"author":{"name":"Rebecca Szantyr","@id":"https:\/\/www.microsave.net\/fr\/#\/schema\/person\/0434c54ec0112b2df6b94a87a3f4f0ba"},"headline":"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale?","datePublished":"2019-06-22T09:02:15+00:00","dateModified":"2025-09-15T11:50:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/"},"wordCount":1141,"publisher":{"@id":"https:\/\/www.microsave.net\/fr\/#organization"},"image":{"@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg","articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/","url":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/","name":"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale? - MicroSave Consulting (MSC)","isPartOf":{"@id":"https:\/\/www.microsave.net\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#primaryimage"},"image":{"@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg","datePublished":"2019-06-22T09:02:15+00:00","dateModified":"2025-09-15T11:50:58+00:00","breadcrumb":{"@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#primaryimage","url":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg","contentUrl":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2019\/06\/166-Comment-faire-face-a-la-cyber-criminalite-en-finance-digitale.jpg","width":1280,"height":589},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsave.net\/fr\/blog\/2019\/06\/22\/comment-faire-face-a-la-cyber-criminalite-en-finance-digitale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsave.net\/fr\/"},{"@type":"ListItem","position":2,"name":"Comment faire face \u00e0 la cyber-criminalit\u00e9 en finance digitale?"}]},{"@type":"WebSite","@id":"https:\/\/www.microsave.net\/fr\/#website","url":"https:\/\/www.microsave.net\/fr\/","name":"Microsave Consulting Fr","description":"Consulting pour Services Financiers","publisher":{"@id":"https:\/\/www.microsave.net\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsave.net\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsave.net\/fr\/#organization","name":"MSC CONSULTING","url":"https:\/\/www.microsave.net\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsave.net\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2022\/11\/MSC.jpg","contentUrl":"https:\/\/www.microsave.net\/fr\/wp-content\/uploads\/2022\/11\/MSC.jpg","width":360,"height":340,"caption":"MSC CONSULTING"},"image":{"@id":"https:\/\/www.microsave.net\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MicroSaveConsultingFR","https:\/\/x.com\/MicroSaveFR","https:\/\/www.youtube.com\/channel\/UC8NseooqQHxCWDoZ63T42ig"]},{"@type":"Person","@id":"https:\/\/www.microsave.net\/fr\/#\/schema\/person\/0434c54ec0112b2df6b94a87a3f4f0ba","name":"Rebecca Szantyr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607a29c3263e8210eeabd43b5b34afc265d522a5fe25c350322c35b05485ca68?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607a29c3263e8210eeabd43b5b34afc265d522a5fe25c350322c35b05485ca68?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607a29c3263e8210eeabd43b5b34afc265d522a5fe25c350322c35b05485ca68?s=96&d=mm&r=g","caption":"Rebecca Szantyr"},"description":"Rebecca Szantyr is a senior manager at MicroSave Consulting Francophone Africa.","url":"https:\/\/www.microsave.net\/fr\/auteur\/rebecca-szantyr\/"}]}},"_links":{"self":[{"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/posts\/2761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/users\/1031"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/comments?post=2761"}],"version-history":[{"count":6,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/posts\/2761\/revisions"}],"predecessor-version":[{"id":42845,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/posts\/2761\/revisions\/42845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/media\/41490"}],"wp:attachment":[{"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/media?parent=2761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/categories?post=2761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/tags?post=2761"},{"taxonomy":"region","embeddable":true,"href":"https:\/\/www.microsave.net\/fr\/wp-json\/wp\/v2\/region?post=2761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}