{"id":43775,"date":"2013-03-12T00:00:00","date_gmt":"2013-03-12T00:00:00","guid":{"rendered":"https:\/\/www.colt.net\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/"},"modified":"2013-03-12T00:00:00","modified_gmt":"2013-03-12T00:00:00","slug":"pme-ne-prenez-pas-votre-securite-informatique-a-la-legere","status":"publish","type":"post","link":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/","title":{"rendered":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re!"},"content":{"rendered":"<p>Petites et Moyennes Entreprises, de nombreuses \u00e9tudes mettent en lumi\u00e8re le fait que vous \u00eates d\u00e9sormais la cible privil\u00e9gi\u00e9e des hackers. Souvent moins bien prot\u00e9g\u00e9es que les grands groupes pour des raisons budg\u00e9taires \u00e9videntes, vous apparaissez en effet comme des cibles bien tentantes et moins compliqu\u00e9es \u00e0 attaquer.<\/p>\n<p>Les risques sont nombreux et leurs cons\u00e9quences souvent lourdes\u00a0: du vol de donn\u00e9es confidentielles qui entra\u00eene une perte de client\u00e8le ou de comp\u00e9titivit\u00e9, \u00e0 la mise hors service de serveurs vitaux qui d\u00e9clenche une indisponibilit\u00e9 pr\u00e9judiciable et des co\u00fbts de r\u00e9paration \u00e9lev\u00e9s, en passant par des nuisances de type d\u00e9r\u00e9f\u00e9rencement sur les moteurs de recherche, d\u00e9gradation d\u2019image de marque, piratage de site, etc., chaque jour, de nouvelles menaces apparaissent, toujours plus pr\u00e9cises, dangereuses et mouvantes.<\/p>\n<p>Face \u00e0 cette mont\u00e9e en puissance du risque, vous \u00eates souvent livr\u00e9es \u00e0 vous-m\u00eame et d\u00e9sempar\u00e9es alors qu\u2019il est fondamental de renforcer la protection de vos r\u00e9seaux, syst\u00e8mes, donn\u00e9es, sites web et e-mails.<\/p>\n<p>Quels sont d\u00e8s lors les r\u00e9flexes \u00e0 avoir\u00a0?<\/p>\n<p>Tout d\u2019abord, faites-vous confiance\u00a0! Eduquez vos collaborateurs sur les bonnes pratiques \u00e0 avoir et sur les r\u00e8gles de base de la s\u00e9curit\u00e9. Sensibilisez les aux techniques de phishing (<i>technique utilis\u00e9e pour obtenir des renseignements personnels dans le but de perp\u00e9trer une usurpation d&#8217;identit\u00e9<\/i>), de scamming (<i>arnaque consistant \u00e0 obtenir d&#8217;une personne qu&#8217;elle effectue un virement depuis son compte bancaire<\/i>) et d\u2019ing\u00e9nierie sociale (<i>escroquerie bas\u00e9e sur un processus d&#8217;approche relationnel frauduleux visant \u00e0 obtenir d&#8217;autrui, un bien, un service ou des informations clefs<\/i>) qui pullulent et donne souvent acc\u00e8s \u00e0 votre syst\u00e8me d\u2019information. Mots de passe, mise \u00e0 jour des solutions de protection, encryption des donn\u00e9es, etc., il existe de nombreux moyens simples de booster sa s\u00e9curit\u00e9 en faisant appel au bon sens.<\/p>\n<p>Ensuite, faites-vous accompagner en confiant cette mission \u00e0 un sp\u00e9cialiste capable de mettre en \u0153uvre les bonnes r\u00e9ponses. Solutions de firewall manag\u00e9es et protection spoofing face aux attaques couches r\u00e9seaux (acc\u00e8s par protocoles ou adresses ind\u00e9sirables), analyse des signatures pour d\u00e9tecter vers, virus et chevaux de Troie, analyse des flux r\u00e9seaux \u00e0 destination du site en amont face aux attaques de sites par saturation ressources (dans le secteur du e-commerce notamment), protection antivirus et filtrage du trafic Web dans le Cloud avant d&#8217;arriver sur le r\u00e9seau de votre entreprise\u00a0: autant de solutions qui sont souvent assez simples \u00e0 concevoir et mettre en place quand elles le sont par un sp\u00e9cialiste.<\/p>\n<p>A la cl\u00e9, un b\u00e9n\u00e9fice majeur\u00a0: la s\u00e9r\u00e9nit\u00e9\u00a0! Vous sachant prot\u00e9g\u00e9es, vous pouvez rester concentr\u00e9es sur votre c\u0153ur de m\u00e9tier. Pour parfaire cette s\u00e9r\u00e9nit\u00e9, optez pour un prestataire offrant un support permanent, fonctionnant 24\u00a0h\/24 et 7\u00a0j\/7, pour suivre l\u2019\u00e9volution des menaces et r\u00e9pondre \u00e0 vos inqui\u00e9tudes \u00e9ventuelles.<\/p>\n<p>Si vous optez pour une externalisation de cette prestation en mode Cloud, vous profiterez d\u2019un autre b\u00e9n\u00e9fice ind\u00e9niable\u00a0: celui de profiter du meilleur de la technologie \u00e0 une fraction du co\u00fbt d\u2019un expert de la s\u00e9curit\u00e9 en interne. De plus, elle ne n\u00e9cessite l\u2019achat d\u2019aucun appareil, ni d\u2019un quelconque logiciel, ni m\u00eame de capacit\u00e9 exc\u00e9dentaire. Enfin, la mise en service de ces solutions est rapide et l\u00e9g\u00e8re, vous offrant simplicit\u00e9 d\u2019utilisation et flexibilit\u00e9.<\/p>\n<p>Depuis plus de 15 ans, Colt est un expert reconnu des solutions de s\u00e9curit\u00e9 manag\u00e9e. Certifi\u00e9 ISO\/IEC 27001, nous sommes en capacit\u00e9 de prot\u00e9ger vos informations sensibles et vos infrastructures en conformit\u00e9 avec les dispositions du Data Protection Act 1998.<\/p>\n<p>D\u00e9tendez-vous, nous nous occupons de tout.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Petites et Moyennes Entreprises, de nombreuses \u00e9tudes mettent en lumi\u00e8re le fait que vous \u00eates d\u00e9sormais la cible privil\u00e9gi\u00e9e des hackers. Souvent moins bien prot\u00e9g\u00e9es que les grands groupes pour des raisons budg\u00e9taires \u00e9videntes, vous apparaissez en effet comme des cibles bien tentantes et moins compliqu\u00e9es \u00e0 attaquer. Les risques sont nombreux et leurs cons\u00e9quences&#8230;<\/p>\n","protected":false},"author":112,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"colt_type":[],"colt_ind":[],"colt_products":[],"colt_solutions":[],"class_list":["post-43775","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! - Colt Technology Services<\/title>\n<meta name=\"description\" content=\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! Colt Technology Services\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! - Colt Technology Services\" \/>\n<meta property=\"og:description\" content=\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! Colt Technology Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/\" \/>\n<meta property=\"og:site_name\" content=\"Colt Technology Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-12T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2021\/01\/Brand-2021-Stock-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Make Do\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:site\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Make Do\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/\"},\"author\":{\"name\":\"Make Do\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57\"},\"headline\":\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re!\",\"datePublished\":\"2013-03-12T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/\"},\"wordCount\":655,\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"articleSection\":[\"Prot\u00e9ger\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/\",\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/\",\"name\":\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! - Colt Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/#website\"},\"datePublished\":\"2013-03-12T00:00:00+00:00\",\"description\":\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! Colt Technology Services\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacy.colt.net\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.colt.net\/#website\",\"url\":\"https:\/\/legacy.colt.net\/\",\"name\":\"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\",\"description\":\"Managed Network &amp; Voice Services Provider\",\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.colt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.colt.net\/#organization\",\"name\":\"Colt Technology Services\",\"url\":\"https:\/\/legacy.colt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"width\":195,\"height\":77,\"caption\":\"Colt Technology Services\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\",\"https:\/\/x.com\/colt_technology\",\"https:\/\/www.instagram.com\/colttechnologyservices\/\",\"https:\/\/www.linkedin.com\/company\/colt-technology-services\",\"https:\/\/www.youtube.com\/user\/ColtTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57\",\"name\":\"Make Do\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g\",\"caption\":\"Make Do\"},\"sameAs\":[\"https:\/\/makedo.net\"],\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/author\/makedo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! - Colt Technology Services","description":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! Colt Technology Services","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! - Colt Technology Services","og_description":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! Colt Technology Services","og_url":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/","og_site_name":"Colt Technology Services","article_publisher":"https:\/\/www.facebook.com\/ColtTechnologyServices\/","article_published_time":"2013-03-12T00:00:00+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2021\/01\/Brand-2021-Stock-3.jpg","type":"image\/jpeg"}],"author":"Make Do","twitter_card":"summary_large_image","twitter_creator":"@colt_technology","twitter_site":"@colt_technology","twitter_misc":{"Written by":"Make Do","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/#article","isPartOf":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/"},"author":{"name":"Make Do","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57"},"headline":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re!","datePublished":"2013-03-12T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/"},"wordCount":655,"publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"articleSection":["Prot\u00e9ger"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/","url":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/","name":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! - Colt Technology Services","isPartOf":{"@id":"https:\/\/legacy.colt.net\/#website"},"datePublished":"2013-03-12T00:00:00+00:00","description":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re! Colt Technology Services","breadcrumb":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.colt.net\/fr\/resources\/pme-ne-prenez-pas-votre-securite-informatique-a-la-legere\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.colt.net\/fr\/"},{"@type":"ListItem","position":2,"name":"PME, ne prenez pas votre s\u00e9curit\u00e9 informatique \u00e0 la l\u00e9g\u00e8re!"}]},{"@type":"WebSite","@id":"https:\/\/legacy.colt.net\/#website","url":"https:\/\/legacy.colt.net\/","name":"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e","description":"Managed Network &amp; Voice Services Provider","publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.colt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/legacy.colt.net\/#organization","name":"Colt Technology Services","url":"https:\/\/legacy.colt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","width":195,"height":77,"caption":"Colt Technology Services"},"image":{"@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ColtTechnologyServices\/","https:\/\/x.com\/colt_technology","https:\/\/www.instagram.com\/colttechnologyservices\/","https:\/\/www.linkedin.com\/company\/colt-technology-services","https:\/\/www.youtube.com\/user\/ColtTechnology"]},{"@type":"Person","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57","name":"Make Do","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g","caption":"Make Do"},"sameAs":["https:\/\/makedo.net"],"url":"https:\/\/legacy.colt.net\/fr\/resources\/author\/makedo\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/43775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/comments?post=43775"}],"version-history":[{"count":0,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/43775\/revisions"}],"wp:attachment":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/media?parent=43775"}],"wp:term":[{"taxonomy":"colt_type","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_type?post=43775"},{"taxonomy":"colt_ind","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_ind?post=43775"},{"taxonomy":"colt_products","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_products?post=43775"},{"taxonomy":"colt_solutions","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_solutions?post=43775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}