{"id":1841,"date":"2024-02-29T12:00:00","date_gmt":"2024-02-29T17:00:00","guid":{"rendered":"https:\/\/miguelcastelo.ca\/?p=1841"},"modified":"2024-03-01T22:25:58","modified_gmt":"2024-03-02T03:25:58","slug":"dont-get-hooked-a-guide-to-phishing-scam-awareness","status":"publish","type":"post","link":"https:\/\/miguelcastelo.ca\/fr\/dont-get-hooked-a-guide-to-phishing-scam-awareness\/","title":{"rendered":"Ne vous laissez pas pi\u00e9ger : Un guide de sensibilisation \u00e0 l'hame\u00e7onnage"},"content":{"rendered":"\n<p>Phishing scams are a constant threat in our digital age. These deceptive attempts aim to steal your personal information, financial details, or login credentials by mimicking legitimate sources like banks, social media platforms, or even trusted individuals.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77.jpg\" alt=\"Phishing Scam Awareness Blog Post\" class=\"wp-image-1845\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Phishing Scam Awareness<\/figcaption><\/figure>\n\n\n<div class=\"root-eb-toc-5eb7h wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-5eb7h \"><div class=\"eb-toc-container eb-toc-5eb7h eb-toc-sticky-left eb-toc-is-sticky eb-toc-collapsible eb-toc-initially-collapsed eb-toc-scrollToTop style-2 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"true\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><span class=\"eb-toc-close eb-toc-sticky-left\"><\/span><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;1. Be Wary of Unsolicited Messages&quot;,&quot;text&quot;:&quot;1. Be Wary of Unsolicited Messages&quot;,&quot;link&quot;:&quot;1-be-wary-of-unsolicited-messages&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;2. Verify the Sender&quot;,&quot;text&quot;:&quot;2. Verify the Sender&quot;,&quot;link&quot;:&quot;2-verify-the-sender&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;3. Scrutinize the Content&quot;,&quot;text&quot;:&quot;3. Scrutinize the Content&quot;,&quot;link&quot;:&quot;3-scrutinize-the-content&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;4. Secure Your Devices and Online Accounts&quot;,&quot;text&quot;:&quot;4. Secure Your Devices and Online Accounts&quot;,&quot;link&quot;:&quot;4-secure-your-devices-and-online-accounts&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;5. Educate Yourself and Others&quot;,&quot;text&quot;:&quot;5. Educate Yourself and Others&quot;,&quot;link&quot;:&quot;5-educate-yourself-and-others&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;About the Author&quot;,&quot;text&quot;:&quot;About the Author&quot;,&quot;link&quot;:&quot;about-the-author&quot;}]\" data-visible=\"[true,true,true,true,true,true]\" data-delete-headers=\"[{&quot;label&quot;:&quot;1. Be Wary of Unsolicited Messages&quot;,&quot;value&quot;:&quot;1-be-wary-of-unsolicited-messages&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;2. Verify the Sender&quot;,&quot;value&quot;:&quot;2-verify-the-sender&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;3. Scrutinize the Content&quot;,&quot;value&quot;:&quot;3-scrutinize-the-content&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;4. Secure Your Devices and Online Accounts&quot;,&quot;value&quot;:&quot;4-secure-your-devices-and-online-accounts&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;5. Educate Yourself and Others&quot;,&quot;value&quot;:&quot;5-educate-yourself-and-others&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;About the Author&quot;,&quot;value&quot;:&quot;about-the-author&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#1-be-wary-of-unsolicited-messages\">1. Be Wary of Unsolicited Messages<\/a><li><a href=\"#2-verify-the-sender\">2. Verify the Sender<\/a><li><a href=\"#3-scrutinize-the-content\">3. Scrutinize the Content<\/a><li><a href=\"#4-secure-your-devices-and-online-accounts\">4. Secure Your Devices and Online Accounts<\/a><li><a href=\"#5-educate-yourself-and-others\">5. Educate Yourself and Others<\/a><li><a href=\"#about-the-author\">About the Author<\/a><\/ul><\/div><\/div><button class=\"eb-toc-button  eb-toc-button-left\"><div>Table of Contents<\/div><\/button><\/div><\/div><\/div>\n\n\n<p>Falling victim to a phishing scam can have serious consequences, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Financial loss:<\/strong> Hackers can use stolen information to access your bank accounts, credit cards, or other financial resources.<\/li>\n\n\n\n<li><strong>Identity theft:<\/strong> Stolen personal data can be used to commit fraud in your name, impacting your credit score and causing significant distress.<\/li>\n\n\n\n<li><strong>Data breaches:<\/strong> Phishing scams can be used to gain access to sensitive information on company networks, putting businesses and their employees at risk.<\/li>\n<\/ul>\n\n\n\n<p>Here are some key strategies to protect yourself from phishing scams:<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>1. Be Wary of Unsolicited Messages<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing attempts often come through emails, text messages, or phone calls. Be cautious of any unsolicited communication, especially if it creates a sense of urgency or pressure.<\/li>\n\n\n\n<li><strong>Red flags:<\/strong> Look out for messages with poor grammar, spelling errors, or generic greetings. Legitimate communication from recognized institutions will typically address you by name.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>2. Verify the Sender<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Don&#8217;t click on links or open attachments from unknown senders.<\/li>\n\n\n\n<li>If you receive a message that appears to be from a known company, contact them directly through their official website or phone number to verify its legitimacy.<\/li>\n\n\n\n<li><strong>Hover over links:<\/strong> Before clicking, hover your mouse over the link to see the actual URL in the bottom left corner of your browser window.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>3. Scrutinize the Content<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing scams often employ tactics to pressure or manipulate you into acting quickly. Be cautious of messages that:\n<ul class=\"wp-block-list\">\n<li><strong>Threaten to close your account or take legal action if you don&#8217;t respond immediately.<\/strong><\/li>\n\n\n\n<li><strong>Offer prizes or rewards that seem too good to be true.<\/strong><\/li>\n\n\n\n<li><strong>Request personal information or login credentials.<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>4. Secure Your Devices and Online Accounts<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use strong and unique passwords for all your online accounts.<\/li>\n\n\n\n<li>Enable two-factor authentication (2FA) whenever available to add an extra layer of security.<\/li>\n\n\n\n<li>Keep your software and operating systems updated with the latest security patches.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>5. Educate Yourself and Others<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Stay informed about the latest phishing tactics and share awareness tips with family, friends, and colleagues.<\/li>\n\n\n\n<li>Reporting suspicious activity: If you encounter a phishing attempt, report it to the relevant platform or organization.<\/li>\n<\/ul>\n\n\n\n<p>By following these steps and remaining vigilant, you can significantly reduce your risk of falling victim to phishing scams. Remember, it&#8217;s always better to be safe than sorry. If something seems off, it probably is. Trust your instincts and prioritize protecting your personal information and online security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<details class=\"wp-block-details has-medium-font-size is-layout-flow wp-block-details-is-layout-flow\" style=\"font-style:normal;font-weight:400\"><summary>References<\/summary>\n<p class=\"has-small-font-size\"><em>Avoiding Social Engineering and Phishing Attacks | CISA<\/em>. (2021, February 1). <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Dickey, C. (n.d.). <em>Ways Your Card Info Might Be Stolen And How To Prevent It<\/em>. Bankrate. Retrieved February 29, 2024, from <a href=\"https:\/\/www.bankrate.com\/finance\/credit-cards\/5-ways-theives-steal-credit-card-data\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.bankrate.com\/finance\/credit-cards\/5-ways-theives-steal-credit-card-data\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Establishment, C. S. (2021, January 8). <em>Phishing: Don\u2019t get reeled in<\/em>. Get Cyber Safe. <a href=\"https:\/\/www.getcybersafe.gc.ca\/en\/phishing\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.getcybersafe.gc.ca\/en\/phishing<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Handling Unexpected or Suspicious Email Attachments | Division of Information Technology<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/it.stonybrook.edu\/help\/kb\/handling-unexpected-or-suspicious-email-attachments\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/it.stonybrook.edu\/help\/kb\/handling-unexpected-or-suspicious-email-attachments<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How to protect against phishing: 18 tips for spotting a scam<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/us.norton.com\/blog\/how-to\/how-to-protect-against-phishing\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us.norton.com\/blog\/how-to\/how-to-protect-against-phishing<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How to Recognize and Avoid Phishing Scams<\/em>. (2019, May 3). Consumer Advice. <a href=\"https:\/\/consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How to Recognize Phishing and Social Engineering Attempts\u2014Avoid Cyber Threats | LinkedIn<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/www.linkedin.com\/pulse\/how-recognize-phishing-social-engineering-attempts-avoid-vijayan-cqgyc\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/pulse\/how-recognize-phishing-social-engineering-attempts-avoid-vijayan-cqgyc\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How to spot a scam email, text message or call<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\/spot-scams\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\/spot-scams<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">McAfee. (2022, December 7). How to Keep Your Data Safe From the Latest Phishing Scam. <em>McAfee<\/em>. <a href=\"https:\/\/www.mcafee.com\/learn\/the-latest-phishing-scam\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.mcafee.com\/learn\/the-latest-phishing-scam\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Online Scams<\/em>. (2023, April 2). Old Dominion University. <a href=\"https:\/\/www.odu.edu\/information-technology-services\/security\/internet-security\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.odu.edu\/information-technology-services\/security\/internet-security<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Phishing Scams<\/em>. (2018, October 31). Federal Trade Commission. <a href=\"https:\/\/www.ftc.gov\/news-events\/topics\/identity-theft\/phishing-scams\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.ftc.gov\/news-events\/topics\/identity-theft\/phishing-scams<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Phishing: Spot and report scam emails, texts, websites and calls<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Preventing Phishing Attacks: Safeguarding Your Personal Data | LinkedIn<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/www.linkedin.com\/pulse\/preventing-phishing-attacks-safeguarding-your-data-srinivasan\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/pulse\/preventing-phishing-attacks-safeguarding-your-data-srinivasan\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Protect yourself from phishing\u2014Microsoft Support<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/protect-yourself-from-phishing-0c7ea947-ba98-3bd9-7184-430e1f860a44\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/support.microsoft.com\/en-us\/windows\/protect-yourself-from-phishing-0c7ea947-ba98-3bd9-7184-430e1f860a44<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What is phishing? Everything you need to know to protect yourself from scammers<\/em>. (n.d.). ZDNET. Retrieved February 29, 2024, from <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What is Social Engineering? Examples and<\/em>. (n.d.). Retrieved February 29, 2024, from <a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-social-engineering\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-social-engineering<\/a><\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">About the Author<\/h2>\n\n\n<div class=\"wp-block-post-author wp-duotone-unset-1\"><div class=\"wp-block-post-author__avatar\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/5d4e3329ec6635c9125a46bbf02e23f016c952e0f63eb74d0e03b9d126d75828?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/5d4e3329ec6635c9125a46bbf02e23f016c952e0f63eb74d0e03b9d126d75828?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' \/><\/div><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\">Miguel Castelo<\/a><\/p><p class=\"wp-block-post-author__bio\">Miguel Castelo is a passionate cybersecurity professional with a strong foundation in technology. He holds a Bachelor of Science in Cybersecurity and is currently pursuing a Master&#8217;s degree in Computer Engineering at Polytechnique Montreal, further solidifying his technical expertise.\r\n\r\nBeyond his academic pursuits, Miguel brings valuable experience in web design and development, graphic design, and programming. This diverse skillset allows him to approach cybersecurity challenges from multiple angles, fostering a holistic understanding of the digital landscape.\r\n\r\nMiguel&#8217;s dedication to continuous learning and his diverse skillset position him as a valuable asset in the cybersecurity field. He is driven by a passion for building secure, resilient systems and protecting individuals and organizations in the ever-evolving digital world.<\/p><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Les escroqueries par hame\u00e7onnage constituent une menace constante \u00e0 l'\u00e8re num\u00e9rique. Ces tentatives trompeuses visent \u00e0 voler vos informations personnelles, vos donn\u00e9es financi\u00e8res ou vos identifiants de connexion en imitant des sources l\u00e9gitimes telles que des banques, des plateformes de m\u00e9dias sociaux ou m\u00eame des personnes de confiance.<\/p>","protected":false},"author":1,"featured_media":1845,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[19],"tags":[22,20,21,23,24,25,26],"class_list":["post-1841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cyber-safe","tag-cybersecurity","tag-cybersecurity-awareness","tag-information-security","tag-phishing","tag-social-engineering","tag-social-engineering-awareness"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/comments?post=1841"}],"version-history":[{"count":17,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1841\/revisions"}],"predecessor-version":[{"id":1971,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1841\/revisions\/1971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media\/1845"}],"wp:attachment":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media?parent=1841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/categories?post=1841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/tags?post=1841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}