{"id":9430,"date":"2017-10-05T13:01:05","date_gmt":"2017-10-05T20:01:05","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=9430"},"modified":"2026-03-05T05:34:26","modified_gmt":"2026-03-05T13:34:26","slug":"was-the-equifax-breach-preventable","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/was-the-equifax-breach-preventable\/","title":{"rendered":"La faille d'Equifax aurait-elle pu \u00eatre \u00e9vit\u00e9e ?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><i>Par Michael Hall, responsable de la s\u00e9curit\u00e9 de l'information<\/i><\/p>\n<p>Founded in 1899, Equifax is the oldest of the three largest credit agencies along with the other two being Experian and TransUnion. These companies offer credit and demographic data and services to businesses. They also sell credit monitoring and fraud-prevention services directly to consumers. Consumer information is gathered by these companies even for individuals who never sign up for their services.<\/p>\n<h2>The Big Breach<\/h2>\n<p>On September 7, 2017 Equifax disclosed their systems had been hacked. The breach, which affected more than 169 million customers worldwide, included access to personal and financial data such as names, addresses, social security numbers, birthdates, driver&#8217;s license numbers, credit card numbers and other documents with personal identifying information.<br \/>\nAll of this stolen data can be sold on the dark web, an area of the World Wide Web which can be accessed using special software. The dark web allows users to remain anonymous and untraceable. For this reason, it has become a conduit for criminals to buy and sell stolen personal information.<br \/>\nThough the attack began in mid-May, the breach was not observed by Equifax until July 29, 2017, according to Equifax then CEO Richard Smith (resigned September 26, 2017). The hackers exploited a weakness in Apache Struts, web-application software widely used in enterprise computer systems. Apache says a patch to fix the vulnerability was issued on March 7 2017, months before the hack. Apache stated, \u201cThe Equifax data compromise was due to their failure to install the security updates provided in a timely manner.\u201d<br \/>\nAccording to a report by <a href=\"https:\/\/www.wired.com\/story\/equifax-breach-no-excuse\/\" target=\"_blank\" rel=\"noopener noreferrer\">C\u00e2bl\u00e9s<\/a>, a representative of an analytics security firm said Equifax, like other users of the software, should have been aware of a fix for the vulnerability well in advance of the actual breach.<br \/>\n&#8220;There were clear and simple instructions of how to remedy the situation. The responsibility is then on companies to have procedures in place to follow such advice promptly,&#8221; Bas van Schaik, a product manager and researcher at Semmle, an analytics security firm, told Wired.<br \/>\n&#8220;The fact that Equifax was subsequently attacked in May means that Equifax did not follow that advice,\u201d van Schaik continued. \u201cHad they done so, this breach would not have occurred.&#8221;<br \/>\nRen\u00e9 Gielen, the vice president of Apache Struts, told Wired, &#8220;Most breaches we become aware of are caused by failure to update software components that are known to be vulnerable for months or even years.&#8221;<\/p>\n<h2>The Big Impact<\/h2>\n<p>Equifax is an information juggernaut that manages huge amounts of data regarding creditworthiness of nearly 100 million companies and a billion individuals in the United States and two dozen other countries.<br \/>\nSmith, the former Equifax CEO, said in a speech at the Terry College of Business at the University of Georgia last month \u201cYou think about the largest library in the world \u2026 the Library of Congress, we manage almost 1,200 times that amount of content every day, around the world.\u201d<br \/>\nEquifax is now investigating the scope of the breach and working to get back in control. This includes an offer to victims for free identity theft protection and an Equifax credit file monitoring product for one year. Visit the <a href=\"https:\/\/www.equifax.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Equifax website<\/a> to find out if your information was compromised and, if so, follow the necessary steps.<\/p>\n<h2>Mettre r\u00e9guli\u00e8rement \u00e0 jour les logiciels de s\u00e9curit\u00e9<\/h2>\n<p>The key lesson? All companies with sensitive data on their systems must keep on top of updates to software and operating systems. One part of this is to stay up-to-date with any communications from software suppliers regarding potential problems and solutions for dealing with vulnerabilities.<br \/>\nWhether you are a huge enterprise like Equifax, a small neighborhood storefront or even an individual at home, this is a very important security step that everybody should take.<br \/>\nHackers are always exploring computer security measures to find and exploit weaknesses. In reaction, security software manufacturers are constantly developing patches and software updates to eliminate threats as they are discovered. If your IT department doesn\u2019t stay diligent, these known weaknesses remain like open doors inviting criminals into your business.<br \/>\nIdentify what firewalls, anti-spam, antivirus, antimalware and antispyware software the IT department may have installed company-wide and always insure updates are being installed as they are made available.<br \/>\nAdditionally, don\u2019t ever attempt to download any software (security or otherwise) without visiting trusted review sites and researching its legitimacy. Otherwise, you may accidentally download software designed for the purpose of stealing information or damaging computers within your network.<\/p>\n<h2>What Victims of the Equifax Breach Can Do<\/h2>\n<p>It\u2019s always a good idea to regularly check your credit report to see if any suspicious activity has occurred without your knowledge. If you do see an unauthorized item, immediately call and file a report with your financial institution. You should also file a police report.<br \/>\nThe U.S. Federal Trade Commission (FTC) offers more information for individuals who need assistance or are looking for more information.<\/p>\n<h2>Additional Cybersecurity Threats<\/h2>\n<p>Unpatched software and operating systems are not the only weaknesses that hackers exploit. The different types of malicious attacks are far too numerous to list here, but these are a few common methods.<\/p>\n<h3>Ransomware<\/h3>\n<p><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/symptoms-of-ransomware-infection\/\">Ransomware<\/a> is a growing, dangerous trend in which hackers slip malicious code into an unknowing computer user\u2019s system. The code is used to encrypt the computer\u2019s contents, which will only be unlocked if the user pays the demanded ransom.<\/p>\n<h3>Phishing<\/h3>\n<p>A lot of people are fooled every day by email messages that look genuine, but aren\u2019t. A phishing attempt uses an email message that looks like it comes from someone you know or from a familiar company. It may even appear to be sent directly from a friend\u2019s email address that has been hacked. Inside the message are links that look normal and inviting, but actually lead to disastrous consequences such as:<\/p>\n<ul>\n<li>Download malware onto your computer that allows a hacker to access your data<\/li>\n<li>Direct you to a website that looks exactly like a site you trust, such as Gmail, Paypal or your bank website, but is actually a fake page designed to collect your login information<\/li>\n<\/ul>\n<p><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/sms-text-phishing\/\">Learn how to identify phishing attempts and how to protect yourself.<\/a><\/p>\n<h3>Fake Wireless Access Points<\/h3>\n<p>Ever use your laptop to jump online at a coffee shop or hotel using free public Wi-Fi? Do your employees and co-workers do this when they travel for business with devices that hold private company data?<br \/>\nIt\u2019s risky and here\u2019s why:<br \/>\nA hacker who is connected to the internet through a legitimate wireless access point (WAP) can easily set up a fake WAP that runs through their computer using a software workaround. This fake WAP then shows up as an available free WiFi connection to the unwary victims who think they are using an internet connection.<br \/>\nAnyone who connects to the hacker\u2019s fake WAP runs all of their online data through the hacker\u2019s computer as it goes to and from the real WAP. The hacker now has access to everything being transmitted. That could include online banking transactions, passwords, credit card numbers, vacation plans, home addresses and even more personal information. And, that\u2019s just a fraction of the data that could be stolen without victims ever knowing.<\/p>\n<h3>Password Attack<\/h3>\n<p>As you\u2019ve probably guessed, this type of hack involves accessing a victim\u2019s password-protected data using that victim\u2019s real password. Here are two of the most popular ways this attack is run:<\/p>\n<ul>\n<li>Dictionary attack: The hacker runs through a list of potential passwords until one works. This is why you should never use words like password or easy-to-remember numbers like 1234.<\/li>\n<li>Brute force attack: The hacker knows the number of characters and runs through all possible character combinations, using specialized software to zip through the possibilities.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/12-tips-for-a-stronger-password\/\">Here are twelve tips for a stronger password. <\/a>Share these tips with with everyone in your company.<\/p>\n<h2>Four Steps to Better Company Cybersecurity<\/h2>\n<p>From an IT perspective, it\u2019s safe to assume that any and all customer, employee or other personal information needs to be protected from breach or accidental exposure. In order to best maintain company-wide cybersecurity, it is important to have documented policies and procedures.<br \/>\nLes \u00e9tapes que vous devez suivre en tant qu'informaticien en ce qui concerne les politiques et les proc\u00e9dures de s\u00e9curit\u00e9 sont relativement standard, quel que soit le secteur d'activit\u00e9 dans lequel vous travaillez :<\/p>\n<h3>1. Analyse des risques<\/h3>\n<p>L'analyse des risques, parfois \u00e9galement appel\u00e9e analyse des lacunes ou \u00e9valuation des risques de s\u00e9curit\u00e9, est la premi\u00e8re \u00e9tape de l'\u00e9laboration d'une politique de s\u00e9curit\u00e9 des donn\u00e9es. Les \u00e9valuations des risques de s\u00e9curit\u00e9 doivent \u00eatre effectu\u00e9es chaque ann\u00e9e, deux fois par an ou \u00e0 chaque fois que quelque chose change, comme l'achat de nouveaux \u00e9quipements ou l'expansion des services de l'entreprise.<br \/>\nL'objectif de l'analyse des risques est de comprendre le syst\u00e8me existant et d'identifier les lacunes de la politique et les risques potentiels pour la s\u00e9curit\u00e9. Comme l'explique le SANS Institute, le processus doit permettre de r\u00e9pondre aux questions suivantes :<\/p>\n<ul>\n<li>Que faut-il prot\u00e9ger ?<\/li>\n<li>Quelles sont les menaces et les vuln\u00e9rabilit\u00e9s ?<\/li>\n<li>Quelles sont les cons\u00e9quences d'une d\u00e9t\u00e9rioration ou d'une perte de ces documents ?<\/li>\n<li>Quelle est la valeur pour l'organisation ?<\/li>\n<li>Que peut-on faire pour minimiser l'exposition \u00e0 la perte ou au dommage ?<\/li>\n<\/ul>\n<p>Zones \u00e0 examiner pour assurer une s\u00e9curit\u00e9 ad\u00e9quate :<\/p>\n<ul>\n<li>Configuration des postes de travail et des serveurs<\/li>\n<li>S\u00e9curit\u00e9 physique<\/li>\n<li>Administration de l'infrastructure de r\u00e9seau<\/li>\n<li>Contr\u00f4les d'acc\u00e8s au syst\u00e8me<\/li>\n<li>Classification et gestion des donn\u00e9es<\/li>\n<li>D\u00e9veloppement et maintenance des applications<\/li>\n<li>Menaces existantes et potentielles<\/li>\n<\/ul>\n<p>M\u00e9thodes de s\u00e9curit\u00e9 \u00e0 revoir :<\/p>\n<ul>\n<li>Acc\u00e8s et authentification : l'acc\u00e8s doit \u00eatre physiquement inaccessible \u00e0 toute personne non autoris\u00e9e.<\/li>\n<li>Gestion des comptes utilisateurs<\/li>\n<li>S\u00e9curit\u00e9 des r\u00e9seaux<\/li>\n<li>Contr\u00f4le<\/li>\n<li>S\u00e9paration des t\u00e2ches<\/li>\n<li>S\u00e9curit\u00e9 physique<\/li>\n<li>V\u00e9rification des ant\u00e9c\u00e9dents des employ\u00e9s<\/li>\n<li>Accords de confidentialit\u00e9<\/li>\n<li>Formation \u00e0 la s\u00e9curit\u00e9<\/li>\n<\/ul>\n<p>Les ressources de l'Institut SANS donnent \u00e9galement d'excellentes instructions pour effectuer une analyse approfondie des risques pour votre entreprise.<\/p>\n<h3>2. \u00c9laboration de politiques et de proc\u00e9dures<\/h3>\n<p>Sur la base des r\u00e9sultats de l'analyse des risques, les politiques et proc\u00e9dures de s\u00e9curit\u00e9 pour la protection des donn\u00e9es doivent \u00eatre mises \u00e0 jour ou, s'il n'y en a pas, r\u00e9dig\u00e9es \u00e0 partir de z\u00e9ro.<br \/>\nIdentifier, d\u00e9velopper et documenter :<\/p>\n<ul>\n<li>Un plan complet d\u00e9crivant les politiques de s\u00e9curit\u00e9 des donn\u00e9es<\/li>\n<li>Responsabilit\u00e9s individuelles du personnel en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es<\/li>\n<li>les outils \u00e0 utiliser pour minimiser les risques, tels que les cam\u00e9ras de s\u00e9curit\u00e9, les pare-feu ou les logiciels de s\u00e9curit\u00e9<\/li>\n<li>Lignes directrices concernant l'utilisation de l'internet, de l'intranet et de l'extranet<\/li>\n<\/ul>\n<h3>3. Mise en \u0153uvre<\/h3>\n<p>Une fois que les politiques et les proc\u00e9dures de votre entreprise ont \u00e9t\u00e9 identifi\u00e9es, planifi\u00e9es et document\u00e9es, elles doivent \u00eatre mises en \u0153uvre et respect\u00e9es.<\/p>\n<ul>\n<li>Acheter des logiciels de s\u00e9curit\u00e9 et d'autres outils jug\u00e9s n\u00e9cessaires.<\/li>\n<li>Mettre \u00e0 jour les logiciels et les syst\u00e8mes d'exploitation existants qui sont obsol\u00e8tes<\/li>\n<li>Organiser des programmes obligatoires de formation et de sensibilisation \u00e0 la s\u00e9curit\u00e9 pour tous les employ\u00e9s et exiger des signatures sur les documents \u00e0 lire obligatoirement.<\/li>\n<li>V\u00e9rifier les ant\u00e9c\u00e9dents de tous les employ\u00e9s<\/li>\n<li>V\u00e9rifier les fournisseurs tiers pour s'assurer qu'ils maintiennent et documentent des protocoles de s\u00e9curit\u00e9 conformes, identiques ou plus robustes que ceux en place dans votre entreprise.<\/li>\n<\/ul>\n<h3>4. Enforcement<\/h3>\n<p>Les politiques et proc\u00e9dures de s\u00e9curit\u00e9 peuvent \u00eatre mises en \u0153uvre par le biais de l'\u00e9ducation et de sanctions. Vous avez peut-\u00eatre remarqu\u00e9 que la formation rel\u00e8ve \u00e0 la fois de la mise en \u0153uvre et de l'application. Il s'agit de la partie la plus importante de la s\u00e9curit\u00e9 de votre entreprise et elle doit \u00eatre dispens\u00e9e en permanence.<br \/>\nDes programmes obligatoires de formation et de sensibilisation doivent \u00eatre pr\u00e9vus pour les employ\u00e9s afin de garantir la protection des donn\u00e9es sensibles et confidentielles. Veillez \u00e0 ce que toute personne susceptible de toucher des donn\u00e9es prot\u00e9g\u00e9es re\u00e7oive une formation sur les politiques et les risques actuels, et \u00e0 ce qu'elle soit tenue au courant des mises \u00e0 jour des politiques ou de l'identification de nouveaux risques.<br \/>\nPar exemple, assurez-vous que tous les employ\u00e9s concern\u00e9s sont au courant des escroqueries par hame\u00e7onnage, de la mani\u00e8re de les identifier, de ce qu'il faut faire si quelqu'un pense \u00eatre cibl\u00e9 et de ce qu'il faut faire s'il est victime d'une telle escroquerie et risque d'exposer des donn\u00e9es prot\u00e9g\u00e9es. Au fur et \u00e0 mesure de l'apparition de nouveaux types d'escroqueries, envoyez des courriels \u00e0 l'ensemble de l'entreprise d\u00e9taillant les m\u00e9thodes d'identification et de protection.<br \/>\nLa deuxi\u00e8me partie de l'application consiste \u00e0 \u00e9liminer la tentation d'ignorer les protocoles et \u00e0 encourager le respect des r\u00e8gles. Cela peut se faire en imposant des sanctions, financi\u00e8res ou autres, \u00e0 ceux qui ne respectent pas les proc\u00e9dures importantes.<\/p>\n<h2>Thoroughness is Important for Cybersecurity<\/h2>\n<p>Although it may be true that the Equifax breach could have been avoided by simply updating software, it is certainly not the only big breach that has occurred and not the only type of security mistake made by businesses. If you want to avoid adding your business or your clients to the data breach stats, data security measures must be thorough.<br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/la-saison-des-impots-une-aubaine-pour-les-pirates-informatiques\/\">Saison des imp\u00f4ts : Un jour de paie potentiel pour les pirates informatiques<\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/itproportal-conformite-de-la-securite-des-donnees-un-aide-memoire-pour-linformatique\/\">ITProPortal : Conformit\u00e9 de la s\u00e9curit\u00e9 des donn\u00e9es - Un guide pour les services informatiques<\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/little-hits-big-hacks\/\">Little Hits, Big Hacks<\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/12-tips-for-a-stronger-password\/\">12 conseils pour un mot de passe plus fort<\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/age-de-linformation-la-saison-des-impots-est-terminee-mais-le-danger-nest-pas-la\/\">Information Age: U.S. Tax Season is Over, but the Danger Isn\u2019t<\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"By Michael Hall, Chief Information Security Officer Founded in 1899, Equifax is the oldest of the three largest credit agencies along with the other two being Experian and TransUnion. These companies offer credit and demographic data and services to businesses. They also sell credit monitoring and fraud-prevention services directly to consumers. Consumer information is gathered&hellip;","protected":false},"author":30,"featured_media":48131,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[143],"post_series":[],"class_list":["post-9430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was the Equifax Breach Preventable?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/was-the-equifax-breach-preventable\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was the Equifax Breach Preventable?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/was-the-equifax-breach-preventable\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-05T20:01:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T13:34:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/10\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"Was the Equifax Breach Preventable?\",\"datePublished\":\"2017-10-05T20:01:05+00:00\",\"dateModified\":\"2026-03-05T13:34:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/\"},\"wordCount\":2040,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg\",\"keywords\":[\"security\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/\",\"name\":\"Was the Equifax Breach Preventable?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg\",\"datePublished\":\"2017-10-05T20:01:05+00:00\",\"dateModified\":\"2026-03-05T13:34:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/was-the-equifax-breach-preventable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"DriveSavers\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Was the Equifax Breach Preventable?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/fr-fr\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La faille d'Equifax aurait-elle pu \u00eatre \u00e9vit\u00e9e ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/was-the-equifax-breach-preventable\/","og_locale":"fr_FR","og_type":"article","og_title":"Was the Equifax Breach Preventable?","og_url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/was-the-equifax-breach-preventable\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2017-10-05T20:01:05+00:00","article_modified_time":"2026-03-05T13:34:26+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/10\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg","type":"image\/jpeg"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"\u00c9crit par":"Michelle West","Dur\u00e9e de lecture estim\u00e9e":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"Was the Equifax Breach Preventable?","datePublished":"2017-10-05T20:01:05+00:00","dateModified":"2026-03-05T13:34:26+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/"},"wordCount":2040,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/10\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg","keywords":["security"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/","name":"La faille d'Equifax aurait-elle pu \u00eatre \u00e9vit\u00e9e ?","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/10\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg","datePublished":"2017-10-05T20:01:05+00:00","dateModified":"2026-03-05T13:34:26+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/10\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/10\/DB-WAS-THE-EQUIFAX-BREACH-PREVENTABLE-scaled-e1699515600142.jpg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/was-the-equifax-breach-preventable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"DriveSavers","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Was the Equifax Breach Preventable?"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"Services de r\u00e9cup\u00e9ration de donn\u00e9es DriveSavers","description":"Le leader mondial de la r\u00e9cup\u00e9ration de donn\u00e9es","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers R\u00e9cup\u00e9ration de Donn\u00e9es","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Ecrire sur DriveSavers, la r\u00e9cup\u00e9ration de donn\u00e9es, ou un autre sujet li\u00e9 \u00e0 la technologie ? Contactez nous.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/9430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=9430"}],"version-history":[{"count":1,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/9430\/revisions"}],"predecessor-version":[{"id":83215,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/9430\/revisions\/83215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media\/48131"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=9430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=9430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=9430"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/post_series?post=9430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}