﻿{"id":21056,"date":"2017-09-12T00:30:15","date_gmt":"2017-09-11T22:30:15","guid":{"rendered":"https:\/\/valoxy.org\/blog\/?p=21056"},"modified":"2026-03-16T11:08:07","modified_gmt":"2026-03-16T10:08:07","slug":"le-ransomware","status":"publish","type":"post","link":"https:\/\/valoxy.org\/blog\/le-ransomware\/","title":{"rendered":"Le Ransomware"},"content":{"rendered":"<p>Le <strong>ransomware<\/strong> est un <strong>programme malveillant<\/strong> que les cybercriminels utilisent pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance et les rendre illisibles. Pour lever ce blocage, il faut payer une ran\u00e7on. Ces \u00ab logiciels de demande de ran\u00e7on \u00bb mettent les entreprises dans une situation difficile, et il est pr\u00e9f\u00e9rable de savoir d&rsquo;o\u00f9 ils proviennent afin de les \u00e9viter.<\/p>\n<p class=\"p1\"><span class=\"s1\">Valoxy, cabinet d\u2019expertise comptable dans les Hauts de France, <\/span> vous explique comment s\u2019en pr\u00e9munir.<\/p>\n<h4><strong>D&rsquo;o\u00f9 viennent ces logiciels ?<\/strong><\/h4>\n<p>Les ransomwares de type <strong>CryptoLocker<\/strong> et <strong>Locky<\/strong> peuvent s&rsquo;introduire dans un PC par l\u2019interm\u00e9diaire des courriels ou de sites internet infect\u00e9s. En effet, lorsqu\u2019on ouvre une pi\u00e8ce jointe dans un message, lorsqu\u2019on clique sur un lien suspect ou t\u00e9l\u00e9charge un fichier sur un site non s\u00e9curis\u00e9, on risque parfois d&rsquo;infecter son ordinateur avec un \u00ab\u00a0ran\u00e7ongiciel\u00a0\u00bb.<br \/>\nContrairement aux autres logiciels, le ransomware de type <strong>WannaCry<\/strong> ou <strong>Petya<\/strong> n&rsquo;a pas besoin d&rsquo;\u00eatre envoy\u00e9 par courriel pour bloquer les ordinateurs. Il se r\u00e9pand directement d&rsquo;ordinateur \u00e0 ordinateur sur des serveurs locaux en utilisant une faille informatique dans les syst\u00e8mes Windows.<\/p>\n<h4><strong>Les entreprises de plus en plus cibl\u00e9es<\/strong><\/h4>\n<p>Tout le monde peut \u00eatre touch\u00e9 !\u00a0 Mais les pirates visent de plus en plus les PME,\u00a0 car :<\/p>\n<ul>\n<li>elles ont tendance \u00e0 payer plus rapidement les ran\u00e7ons. Contrairement \u00e0 une grande entreprise, une mise \u00e0 l&rsquo;arr\u00eat prolong\u00e9e entra\u00eenerait des pertes bien plus difficiles \u00e0 surmonter.<\/li>\n<li>elles sont souvent moins pr\u00e9par\u00e9es avec des ressources informatiques plus limit\u00e9es (pas de sauvegardes de donn\u00e9es ou d\u2019externalisation de celles-ci).<\/li>\n<\/ul>\n<p>Au premier trimestre 2016, un logiciel de demande de ran\u00e7on s&rsquo;attaquait \u00e0 une entreprise quelque part dans le monde toutes les deux minutes. Au troisi\u00e8me trimestre, l\u2019estimation \u00e9tait pass\u00e9e \u00e0 quarante secondes, estime Kaspersky Lab.<\/p>\n<h4><strong>Comment se prot\u00e9ger des ransomwares ?<\/strong><\/h4>\n<h4>1- Ne pas ouvrir les pi\u00e8ces jointes dans des courriels provenant d&rsquo;exp\u00e9diteurs inconnus :<\/h4>\n<p>La plupart des ransomwares se propagent par les pi\u00e8ces jointes via les courriels. Pour inciter les personnes \u00e0 ouvrir la pi\u00e8ce jointe, les courriels sont intitul\u00e9s et libell\u00e9s comme s\u2019ils provenaient d\u2019un exp\u00e9diteur de confiance. (Tribunal, Administration fiscale, banque ou autre institution officielle).<br \/>\nLes pi\u00e8ces jointes contiennent des fichiers EXE, et des fichiers aux formats DOC et PDF.<\/p>\n<h4>2- Mettre \u00e0 jour r\u00e9guli\u00e8rement le logiciel antivirus, le syst\u00e8me d&rsquo;exploitation et autres programmes<\/h4>\n<p>Il faut v\u00e9rifier que tous les logiciels de l\u2019ordinateur sont \u00e0 jour, y compris le syst\u00e8me d\u2019exploitation. Microsoft publie r\u00e9guli\u00e8rement des patchs de s\u00e9curit\u00e9 pour r\u00e9parer les failles qui pourraient \u00eatre \u00e0 l&rsquo;origine des attaques.<\/p>\n<h4>3- R\u00e9aliser une sauvegarde externalis\u00e9e des fichiers<\/h4>\n<p>La sauvegarde externalis\u00e9e s&rsquo;effectue en dehors de l\u2019entreprise, ce qui repr\u00e9sente une alternative fiable, pratique et efficace. Cela permet aux entreprises de se prot\u00e9ger contre les ransomwares et de diminuer les risques li\u00e9s \u00e0 la perte de donn\u00e9es.<\/p>\n<p>Valoxy, par exemple, a fait le choix d\u2019une sauvegarde externalis\u00e9e en plus de la sauvegarde sur support physique.<br \/>\nEn confiant la sauvegarde externalis\u00e9e \u00e0 <strong>Valoxy Services<\/strong>, votre entreprise b\u00e9n\u00e9ficie de plusieurs avantages :<\/p>\n<ul>\n<li>D\u00c9L\u00c9GATION : Valoxy Services s\u2019occupe de toutes les op\u00e9rations de sauvegarde pour tout type d\u2019environnement Windows\/MAC\/Linux,<\/li>\n<li>AUTOMATISATION : La sauvegarde est enti\u00e8rement automatis\u00e9e,<\/li>\n<li>PROTECTION : Valoxy Services prot\u00e8ge les donn\u00e9es des incidents graves tels que l&rsquo;incendie, le vol, la demande de ran\u00e7on informatique (ransomware), les disques durs endommag\u00e9s,<\/li>\n<li>FACILIT\u00c9 : La restauration est facile et aussi simple que l\u2019utilisation d\u2019un explorateur de fichiers,<\/li>\n<li>SUPERVISION : Au quotidien, notre \u00e9quipe surveille le bon d\u00e9roulement des t\u00e2ches de sauvegarde depuis son centre de contr\u00f4le et de supervision et vous alerte en cas de dysfonctionnement,<\/li>\n<li>\u00c9CONOMIE : Le co\u00fbt global de l\u2019op\u00e9ration est souvent moindre que celui de l\u2019ensemble des supports de stockage.<\/li>\n<\/ul>\n<div class=\"encadre-style\"><\/p>\n<p class=\"p1\"><span class=\"s1\">Pour en savoir plus sur la s\u00e9curit\u00e9 informatique, retrouvez nos articles sur le blog Valoxy\u00a0:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\"><span class=\"s3\">Phishing: comment d\u00e9tecter un message malveillant?<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/petit-lexique-des-startuppeurs\/\"><span class=\"s3\">Petit lexique des startuppeurs<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s4\"><a href=\"https:\/\/valoxy.org\/blog\/creation-dentreprise-arnaques\/\"><span class=\"s3\">Cr\u00e9ation d\u2019entreprise, attention aux arnaques.<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s4\"><a href=\"https:\/\/valoxy.org\/blog\/escroqueries-en-tout-genre\/\"><span class=\"s3\">Escroqueries en tout genre<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/heartbleed-concerne-t-il-les-pme-04102014avala1\/\"><span class=\"s3\">Le \u00ab Heartbleed \u00bb concerne-t-il les PME ? En quoi ce bug informatique peut-il rendre vuln\u00e9rable votre syst\u00e8me informatique ?<\/span><\/a><\/span><\/li>\n<\/ul>\n<p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Le ransomware est un programme malveillant que les cybercriminels utilisent pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance et les rendre illisibles. Pour lever ce blocage, il faut payer une ran\u00e7on. Ces \u00ab logiciels de demande de ran\u00e7on&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21057,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,8],"tags":[],"class_list":["post-21056","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gestion","category-it-marketing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le Ransomware | Blog Valoxy - Expertise comptable<\/title>\n<meta name=\"description\" content=\"Le ransomware est un programme malveillant pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance. Valoxy vous explique comment s\u2019en pr\u00e9munir.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valoxy.org\/blog\/le-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le Ransomware | Blog Valoxy - Expertise comptable\" \/>\n<meta property=\"og:description\" content=\"Le ransomware est un programme malveillant pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance. Valoxy vous explique comment s\u2019en pr\u00e9munir.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valoxy.org\/blog\/le-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Valoxy - Expertise comptable\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Valoxy\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-11T22:30:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T10:08:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Expert-comptable Valoxy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Expert-comptable Valoxy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/\"},\"author\":{\"name\":\"Expert-comptable Valoxy\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a\"},\"headline\":\"Le Ransomware\",\"datePublished\":\"2017-09-11T22:30:15+00:00\",\"dateModified\":\"2026-03-16T10:08:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png\",\"articleSection\":[\"Gestion\",\"It-marketing\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/valoxy.org\/blog\/le-ransomware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/\",\"url\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/\",\"name\":\"Le Ransomware | Blog Valoxy - Expertise comptable\",\"isPartOf\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png\",\"datePublished\":\"2017-09-11T22:30:15+00:00\",\"dateModified\":\"2026-03-16T10:08:07+00:00\",\"description\":\"Le ransomware est un programme malveillant pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance. Valoxy vous explique comment s\u2019en pr\u00e9munir.\",\"breadcrumb\":{\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valoxy.org\/blog\/le-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage\",\"url\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png\",\"contentUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png\",\"width\":700,\"height\":525,\"caption\":\"ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valoxy.org\/blog\/le-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/valoxy.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valoxy.org\/blog\/#website\",\"url\":\"https:\/\/valoxy.org\/blog\/\",\"name\":\"Blog Valoxy\",\"description\":\"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise\",\"publisher\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#organization\"},\"alternateName\":\"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/valoxy.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/valoxy.org\/blog\/#organization\",\"name\":\"Blog Valoxy\",\"url\":\"https:\/\/valoxy.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png\",\"contentUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png\",\"width\":266,\"height\":100,\"caption\":\"Blog Valoxy\"},\"image\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Valoxy\",\"https:\/\/www.linkedin.com\/company\/valoxy\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a\",\"name\":\"Expert-comptable Valoxy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g\",\"caption\":\"Expert-comptable Valoxy\"},\"sameAs\":[\"https:\/\/valoxy.org\/blog\"],\"url\":\"https:\/\/valoxy.org\/blog\/author\/ceo-valoxy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le Ransomware | Blog Valoxy - Expertise comptable","description":"Le ransomware est un programme malveillant pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance. Valoxy vous explique comment s\u2019en pr\u00e9munir.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/valoxy.org\/blog\/le-ransomware\/","og_locale":"fr_FR","og_type":"article","og_title":"Le Ransomware | Blog Valoxy - Expertise comptable","og_description":"Le ransomware est un programme malveillant pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance. Valoxy vous explique comment s\u2019en pr\u00e9munir.","og_url":"https:\/\/valoxy.org\/blog\/le-ransomware\/","og_site_name":"Blog Valoxy - Expertise comptable","article_publisher":"https:\/\/www.facebook.com\/Valoxy","article_published_time":"2017-09-11T22:30:15+00:00","article_modified_time":"2026-03-16T10:08:07+00:00","og_image":[{"width":700,"height":525,"url":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png","type":"image\/png"}],"author":"Expert-comptable Valoxy","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Expert-comptable Valoxy","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#article","isPartOf":{"@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/"},"author":{"name":"Expert-comptable Valoxy","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a"},"headline":"Le Ransomware","datePublished":"2017-09-11T22:30:15+00:00","dateModified":"2026-03-16T10:08:07+00:00","mainEntityOfPage":{"@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/valoxy.org\/blog\/#organization"},"image":{"@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png","articleSection":["Gestion","It-marketing"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/valoxy.org\/blog\/le-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/","url":"https:\/\/valoxy.org\/blog\/le-ransomware\/","name":"Le Ransomware | Blog Valoxy - Expertise comptable","isPartOf":{"@id":"https:\/\/valoxy.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png","datePublished":"2017-09-11T22:30:15+00:00","dateModified":"2026-03-16T10:08:07+00:00","description":"Le ransomware est un programme malveillant pour chiffrer et verrouiller les donn\u00e9es d\u2019un ordinateur \u00e0 distance. Valoxy vous explique comment s\u2019en pr\u00e9munir.","breadcrumb":{"@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/valoxy.org\/blog\/le-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#primaryimage","url":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png","contentUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2017\/07\/ransomware-e1620204608644-1.png","width":700,"height":525,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/valoxy.org\/blog\/le-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/valoxy.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Le Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/valoxy.org\/blog\/#website","url":"https:\/\/valoxy.org\/blog\/","name":"Blog Valoxy","description":"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise","publisher":{"@id":"https:\/\/valoxy.org\/blog\/#organization"},"alternateName":"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/valoxy.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/valoxy.org\/blog\/#organization","name":"Blog Valoxy","url":"https:\/\/valoxy.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png","contentUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png","width":266,"height":100,"caption":"Blog Valoxy"},"image":{"@id":"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Valoxy","https:\/\/www.linkedin.com\/company\/valoxy"]},{"@type":"Person","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a","name":"Expert-comptable Valoxy","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g","caption":"Expert-comptable Valoxy"},"sameAs":["https:\/\/valoxy.org\/blog"],"url":"https:\/\/valoxy.org\/blog\/author\/ceo-valoxy\/"}]}},"_links":{"self":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts\/21056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/comments?post=21056"}],"version-history":[{"count":1,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts\/21056\/revisions"}],"predecessor-version":[{"id":67779,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts\/21056\/revisions\/67779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/media\/21057"}],"wp:attachment":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/media?parent=21056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/categories?post=21056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/tags?post=21056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}