{"id":80226,"date":"2025-11-26T08:53:09","date_gmt":"2025-11-26T16:53:09","guid":{"rendered":"https:\/\/dhblog.dream.press\/blog\/?p=80226"},"modified":"2026-04-07T14:00:46","modified_gmt":"2026-04-07T21:00:46","slug":"etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr","status":"publish","type":"post","link":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/","title":{"rendered":"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on"},"content":{"rendered":"<div class=\"tldr-block\" style=\"display: none;\">\n\t<div class=\"svg\">\n\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 119.25 37.8\">\n\t<g>\n\t\t<g>\n\t\t\t<path fill=\"#ffffff\" d=\"M23.4,6.93h-8.1v24.57h-7.2V6.93H0V0h23.4v6.93Z\" \/>\n\t\t\t<path fill=\"#ffffff\" d=\"M45,24.57v6.93h-18.45V0h7.2v24.57h11.25Z\" \/>\n\t\t\t<path fill=\"#ffffff\"\n\t\t\t\td=\"M90.9,15.75c0,8.91-6.61,15.75-15.3,15.75h-12.6V0h12.6c8.68,0,15.3,6.84,15.3,15.75ZM83.97,15.75c0-5.4-3.42-8.82-8.37-8.82h-5.4v17.64h5.4c4.95,0,8.37-3.42,8.37-8.82Z\" \/>\n\t\t\t<path fill=\"#ffffff\"\n\t\t\t\td=\"M105.57,21.15h-3.42v10.35h-7.2V0h12.6c5.98,0,10.8,4.81,10.8,10.8,0,3.87-2.34,7.38-5.81,9.13l6.71,11.56h-7.74l-5.94-10.35ZM102.15,14.85h5.4c1.98,0,3.6-1.75,3.6-4.05s-1.62-4.05-3.6-4.05h-5.4v8.1Z\" \/>\n\t\t<\/g>\n\t\t<path\n\t\t\tfill=\"#0173ec\"\n\t\t\td=\"M53.97,37.8h-5.4l1.8-13.27h7.2l-3.6,13.27ZM49.02,12.55c0-2.34,1.93-4.27,4.27-4.27s4.27,1.94,4.27,4.27-1.93,4.27-4.27,4.27-4.27-1.94-4.27-4.27Z\"\n\t\t \/>\n\t<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"tldr-wrap\">\n\t\t\n\n<p><strong>Selon une \u00e9tude de DreamHost en 2025, <\/strong>12 % des petites entreprises am\u00e9ricaines ont pay\u00e9 les demandes de ran\u00e7on des pirates, et 46 % ont d\u00e9j\u00e0 subi des cyberattaques. Les donn\u00e9es r\u00e9v\u00e8lent une nette division : les entreprises avec des sauvegardes test\u00e9es et des plans de r\u00e9cup\u00e9ration refusent de payer, tandis que celles sans ces mesures deviennent des victimes. La solution ne doit pas \u00eatre complexe \u2014 c&#8217;est une pr\u00e9paration disciplin\u00e9e.<\/p>\n\n\n\n\n\t<\/div>\n<\/div>\n\n<p><strong>Principales D\u00e9couvertes en Un Coup D&#8217;\u0153il<\/strong><\/p>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><ul><li>12 % des r\u00e9pondants ont re\u00e7u une demande de ran\u00e7on li\u00e9e \u00e0 leur site web, email ou donn\u00e9es \u2014 et l&#8217;ont pay\u00e9e.<\/li><li>42 % sont tr\u00e8s pr\u00e9occup\u00e9s par les attaques de ransomware ciblant les sites web.<\/li><li>46 % ont vu leur entreprise touch\u00e9e par une cyberattaque qui a expos\u00e9 des donn\u00e9es, verrouill\u00e9 des fichiers ou mis hors ligne leur site web. 38 % disent que leur site web a \u00e9t\u00e9 pirat\u00e9 ou infect\u00e9 par un malware.<\/li><li>24 % d\u00e9clarent n&#8217;avoir jamais test\u00e9 leur processus de sauvegarde et de restauration pour s&#8217;assurer qu&#8217;il fonctionne r\u00e9ellement.<\/li><li>40,5 % investiraient probablement dans des sauvegardes automatiques de sites web s&#8217;ils savaient que les sauvegardes les emp\u00eacheraient de devoir payer une ran\u00e7on.<\/li><\/ul><\/td><\/tr><\/tbody><\/table><\/figure>\n\n<p>Nous avons interrog\u00e9 1 000 propri\u00e9taires et gestionnaires de petites entreprises (50 employ\u00e9s ou moins), \u00e0 l&#8217;\u00e9chelle nationale, au sujet de la s\u00e9curit\u00e9 des sites web. <strong>Ce que nous avons trouv\u00e9 : 12% ont re\u00e7u une demande de ran\u00e7on li\u00e9e \u00e0 leur site web, email ou donn\u00e9es \u2014 et <\/strong><strong><em>l&#8217;ont pay\u00e9e<\/em><\/strong><strong>.<\/strong><\/p>\n\n\n<p>Pourquoi cela importe-t-il ?&nbsp;<\/p>\n\n\n<p>Les petites entreprises repr\u00e9sentent une cible facile pour les cybercriminels, rendant ces attaques de plus en plus courantes. Nos d\u00e9couvertes r\u00e9v\u00e8lent \u00e0 quel point la menace est r\u00e9pandue et co\u00fbteuse pour les propri\u00e9taires d&#8217;entreprises ordinaires, et pas seulement pour les grandes entreprises.<\/p>\n\n\n<p>En tant que fournisseur d&#8217;h\u00e9bergement web qui dessert des milliers de petites entreprises, DreamHost voulait comprendre l&#8217;impact r\u00e9el de ces menaces et comment les entreprises sont pr\u00e9par\u00e9es \u00e0 y r\u00e9pondre. Les r\u00e9sultats mettent en \u00e9vidence des lacunes \u00e9videntes \u2014 et des solutions applicables \u2014 dans la cybers\u00e9curit\u00e9 des petites entreprises.<\/p>\n\n\n<p>Imagine une salle de cent personnes qui g\u00e8rent des sites Web : des ind\u00e9pendants, des op\u00e9rateurs de magasins, des propri\u00e9taires de petites entreprises ; des gens qui veulent juste que leur site fonctionne. Maintenant, compte douze d&#8217;entre eux.&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1449\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp\" alt=\"Grille d'ic\u00f4nes de petites entreprises avec 12 ic\u00f4nes rouges mises en \u00e9vidence pour montrer le pourcentage qui ont pay\u00e9 une demande de ran\u00e7on.\" class=\"wp-image-77818 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-300x272.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-1024x927.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-768x696.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-1536x1391.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-600x543.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-1200x1087.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-730x661.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-1460x1322.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-784x710.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-1568x1420.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/01_12_of_small_businesses_say_they_ve_paid_a_ransom_demand-877x794.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1449;\" \/><\/figure>\n\n\n<p>Les donn\u00e9es montrent que 12 op\u00e9rateurs de sites web sur 100 ont pay\u00e9 une ran\u00e7on pour r\u00e9cup\u00e9rer l&#8217;acc\u00e8s \u00e0 leurs sites ou donn\u00e9es. Lorsque les sites web sont hors ligne en raison de cyberattaques, les entreprises sont confront\u00e9es \u00e0 des perturbations op\u00e9rationnelles imm\u00e9diates : panneaux administratifs inaccessibles, commandes non ex\u00e9cut\u00e9es et donn\u00e9es clients verrouill\u00e9es.&nbsp;<\/p>\n\n\n<p>Pour beaucoup, payer la ran\u00e7on semble \u00eatre le chemin le plus rapide vers la restauration, malgr\u00e9 les faibles taux de conformit\u00e9 des attaquants.<\/p>\n\n\n<p>La pr\u00e9occupation d\u00e9passe ceux qui ont pay\u00e9. 42% des r\u00e9pondants ont d\u00e9clar\u00e9 \u00eatre \u00ab tr\u00e8s pr\u00e9occup\u00e9s \u00bb par les attaques de ran\u00e7ongiciels ciblant les sites web, refl\u00e9tant une prise de conscience \u00e9tendue du paysage des menaces.&nbsp;<\/p>\n\n\n<p>Les donn\u00e9es compl\u00e8tes de l&#8217;enqu\u00eate r\u00e9v\u00e8lent pourquoi cette pr\u00e9occupation est justifi\u00e9e \u2014 et ce que les entreprises peuvent faire \u00e0 ce sujet.<\/p>\n\n\n<p>Plongeons dedans.&nbsp;<\/p>\n\n\n<h2 id=\"h-1-in-8-americans-have-paid-a-ransom\" class=\"wp-block-heading\">1 Am\u00e9ricain sur 8 a pay\u00e9 une ran\u00e7on<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1211\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid.webp\" alt=\"R\u00e9partition des r\u00e9ponses aux demandes li\u00e9es \u00e0 la ran\u00e7on avec les pourcentages pour ceux qui ont pay\u00e9, qui n'ont pas pay\u00e9, jamais et pas s\u00fbr.\" class=\"wp-image-77819 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-300x227.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-1024x775.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-768x581.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-1536x1163.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-600x454.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-1200x908.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-730x553.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-1460x1105.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-784x593.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-1568x1187.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/02_when_asked_if_they_d_received_demands_related_to_their_website_email_or_data_11_8_yes_and_paid-877x664.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1211;\" \/><\/figure>\n\n\n<p>Ce 12% repr\u00e9sente les entreprises \u00e0 un point de d\u00e9cision : payer la ran\u00e7on ou faire face \u00e0 un arr\u00eat prolong\u00e9.<\/p>\n\n\n<p>Chaque paiement renforce le mod\u00e8le \u00e9conomique du ransomware, validant la tactique et augmentant la probabilit\u00e9 que plus d&#8217;entreprises soient confront\u00e9es \u00e0 des exigences similaires.&nbsp;<\/p>\n\n\n<p>Les attaques de ran\u00e7ongiciels ne sont pas limit\u00e9es aux grandes entreprises. Les petites entreprises avec une infrastructure en ligne accessible sont confront\u00e9es aux m\u00eames menaces.<\/p>\n\n\n<p>Un examen plus approfondi de ceux qui ont re\u00e7u des demandes de ran\u00e7on r\u00e9v\u00e8le le r\u00f4le que joue la pr\u00e9paration dans la prise de d\u00e9cision.<\/p>\n\n\n<p>Parmi les 28,4 % qui ont \u00e9t\u00e9 confront\u00e9s \u00e0 une demande, <strong>41,5 % ont pay\u00e9 la ran\u00e7on.<\/strong> Lorsqu&#8217;ils se retrouvent dans cette situation \u2014 site hors service, donn\u00e9es verrouill\u00e9es, revenus gel\u00e9s \u2014 pr\u00e8s de la moiti\u00e9 choisissent de payer.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1256\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom.webp\" alt=\"Comparaison des r\u00e9ponses aux demandes de ran\u00e7on montrant que 41,5 % ont pay\u00e9 et 58,5 % ont refus\u00e9 parmi ceux qui ont re\u00e7u des demandes.\" class=\"wp-image-77820 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-300x236.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-1024x804.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-768x603.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-1536x1206.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-600x471.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-1200x942.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-730x573.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-1460x1146.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-784x615.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-1568x1231.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/03_of_those_who_received_ransom_demands_41_5_paid_the_ransom-877x688.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1256;\" \/><\/figure>\n\n\n<p>De l&#8217;autre c\u00f4t\u00e9 : <strong>58,5% ont refus\u00e9<\/strong>. Cela repr\u00e9sente 6 entreprises sur 10 qui ont d\u00e9clin\u00e9 le paiement.&nbsp;<\/p>\n\n\n<p>Les donn\u00e9es sugg\u00e8rent que les entreprises disposant de sauvegardes test\u00e9es, de protocoles de r\u00e9cup\u00e9ration et de r\u00e9silience op\u00e9rationnelle \u00e9taient plus susceptibles de refuser de payer. La pr\u00e9paration de l&#8217;infrastructure semble r\u00e9duire la vuln\u00e9rabilit\u00e9 aux demandes de ran\u00e7on.<\/p>\n\n\n<p>Les entreprises qui comprennent leurs risques et maintiennent des sauvegardes test\u00e9es, des connexions s\u00e9curis\u00e9es et des syst\u00e8mes de r\u00e9cup\u00e9ration automatiques d\u00e9montrent une moindre susceptibilit\u00e9 \u00e0 ces attaques.<\/p>\n\n\n<h2 id=\"h-nearly-half-of-americans-are-deeply-worried-about-ransomware-threats-nbsp\" class=\"wp-block-heading\">Pr\u00e8s De La Moiti\u00e9 Des Am\u00e9ricains Sont Profond\u00e9ment Inquiets Des Menaces De Ran\u00e7ongiciel&nbsp;<\/h2>\n\n\n<p>42 % des r\u00e9pondants \u00e0 notre enqu\u00eate ont d\u00e9clar\u00e9 \u00eatre &#8220;tr\u00e8s pr\u00e9occup\u00e9s&#8221; par la menace croissante des attaques de ran\u00e7ongiciel ciblant les sites web. En combinant ceux qui sont &#8220;tr\u00e8s pr\u00e9occup\u00e9s&#8221; avec ceux qui sont &#8220;quelque peu pr\u00e9occup\u00e9s&#8221;, 84,6 % des r\u00e9pondants consid\u00e8rent le ran\u00e7ongiciel comme une menace l\u00e9gitime.&nbsp;<\/p>\n\n\n<p>Le site web <em>est<\/em> l&#8217;entreprise \u2014 la vitrine, le pipeline, le centre. Une perturbation de l&#8217;acc\u00e8s peut avoir un impact direct sur les op\u00e9rations commerciales.&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1396\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_.webp\" alt=\"Graphique circulaire montrant les niveaux de pr\u00e9occupation concernant les attaques par ran\u00e7ongiciel : 42,2 % tr\u00e8s pr\u00e9occup\u00e9s, 42,4 % quelque peu pr\u00e9occup\u00e9s, 11,9 % peu pr\u00e9occup\u00e9s, 3,5 % pas pr\u00e9occup\u00e9s.\" class=\"wp-image-77821 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-300x262.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-1024x893.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-768x670.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-1536x1340.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-600x524.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-1200x1047.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-730x637.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-1460x1274.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-784x684.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-1568x1368.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/04_how_concerned_are_you_about_ransomware_attacks_targeting_websites_-877x765.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1396;\" \/><\/figure>\n\n\n<p>Cette appr\u00e9hension refl\u00e8te un changement plus large : les ransomwares ont \u00e9tendu leur cible au-del\u00e0 des grandes entreprises pour viser les petites entreprises.<\/p>\n\n\n<p>Les violations de haut profil illustrent l&#8217;\u00e9tendue de la menace.&nbsp;<\/p>\n\n\n<p>Lorsque AT&amp;T a subi une violation affectant 73 millions de clients actuels et anciens \u2014 incluant leurs num\u00e9ros de s\u00e9curit\u00e9 sociale, dates de naissance et noms \u2014 la soci\u00e9t\u00e9 a fait face \u00e0 un&nbsp; <a href=\"https:\/\/www.msn.com\/en-us\/money\/companies\/at-t-customers-could-receive-up-to-7-500-as-part-of-a-177-million-data-breach-settlement-here-s-who-qualifies\/ar-AA1Qol2G?ocid=finance-verthp-feeds\">r\u00e8glement de 177 millions de dollars<\/a>. La violation, datant de 2019, n&#8217;a \u00e9t\u00e9 reconnue qu&#8217;apr\u00e8s que les donn\u00e9es des clients soient apparues sur le web sombre.<\/p>\n\n\n<p>Si les organisations dot\u00e9es d&#8217;\u00e9quipes de s\u00e9curit\u00e9 d\u00e9di\u00e9es subissent des violations de cette ampleur, les petites entreprises sont confront\u00e9es \u00e0 des vuln\u00e9rabilit\u00e9s similaires sans disposer de ressources comparables pour une <a href=\"https:\/\/www.dreamhost.com\/features\/security\/\">protection proactive<\/a>.<\/p>\n\n\n<p>L&#8217;\u00e9criture est sur le mur : n\u00e9gliger<em> <\/em>invite \u00e0 l&#8217;exposition.<\/p>\n\n\n<p>Nos donn\u00e9es d&#8217;enqu\u00eate montrent que de nombreux chefs d&#8217;entreprise reconnaissent les faiblesses de s\u00e9curit\u00e9 courantes : <a href=\"https:\/\/www.dreamhost.com\/blog\/abandoned-plugins\/\">plugins obsol\u00e8tes<\/a>, mots de passe faibles et mises \u00e0 jour n\u00e9glig\u00e9es du CMS. Cette prise de conscience stimule une attention accrue aux pratiques de cybers\u00e9curit\u00e9 parmi les petites entreprises.<\/p>\n\n\n<div class=\"article-newsletter article-newsletter--gradient\">\n\n\n<h2>Get Content Delivered Straight to Your Inbox<\/h2><p>Subscribe now to receive all the latest updates, delivered directly to your inbox.<\/p><form class=\"nwsl-form\" id=\"newsletter_block_\" novalidate><div class=\"messages\"><\/div><div class=\"form-group\"><label for=\"input_newsletter_block_\"><input type=\"email\"name=\"email\"id=\"input_newsletter_block_\"placeholder=\"Enter your email address\"novalidatedisabled=\"disabled\"\/><\/label><button type=\"submit\"class=\"btn btn--brand\"disabled=\"disabled\"><span>Sign Me Up!<\/span><svg width=\"21\" height=\"14\" viewBox=\"0 0 21 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M13.8523 0.42524L12.9323 1.34521C12.7095 1.56801 12.7132 1.9304 12.9404 2.14865L16.7241 5.7823H0.5625C0.251859 5.7823 0 6.03416 0 6.3448V7.6573C0 7.96794 0.251859 8.2198 0.5625 8.2198H16.7241L12.9405 11.8535C12.7132 12.0717 12.7095 12.4341 12.9323 12.6569L13.8523 13.5769C14.072 13.7965 14.4281 13.7965 14.6478 13.5769L20.8259 7.39879C21.0456 7.17913 21.0456 6.82298 20.8259 6.60327L14.6477 0.42524C14.4281 0.205584 14.0719 0.205584 13.8523 0.42524Z\" fill=\"white\"\/>\n<\/svg>\n<\/button><\/div><\/form><\/div>\n\n<h2 id=\"h-nearly-half-of-businesses-have-already-been-hacked\" class=\"wp-block-heading\">Pr\u00e8s De La Moiti\u00e9 Des Entreprises Ont D\u00e9j\u00e0 \u00c9t\u00e9 Pirat\u00e9es<\/h2>\n\n\n<p>Cette pr\u00e9occupation g\u00e9n\u00e9ralis\u00e9e n&#8217;est pas infond\u00e9e. 46% de nos r\u00e9pondants ont d\u00e9j\u00e0 subi une cyberattaque, entra\u00eenant l&#8217;exposition de donn\u00e9es, le chiffrement de fichiers ou des arr\u00eats complets de site.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1215\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations.webp\" alt=\"Graphique montrant que 45,9 % des sites web de PME ont \u00e9t\u00e9 touch\u00e9s par une cyberattaque et que 54,1 % ne l'ont pas \u00e9t\u00e9.\" class=\"wp-image-77822 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-300x228.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-1024x778.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-768x583.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-1536x1166.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-600x456.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-1200x911.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-730x554.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-1460x1109.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-784x595.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-1568x1191.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/05_nearly_half_of_smb_websites_have_been_hit_by_a_cyberattack_that_exposed_data_or_disrupted_operations-877x666.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1215;\" \/><\/figure>\n\n\n<p>Pour 38 % des r\u00e9pondants, ces attaques se manifestent sous forme de violations quotidiennes qui font rarement les gros titres mais peuvent entra\u00eener :<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Connexions compromises<\/li>\n\n\n\n<li>Plugins infect\u00e9s<\/li>\n\n\n\n<li>Redirections spam SEO<\/li>\n\n\n\n<li>Domaines suspendus<\/li>\n\n\n<\/ul>\n\n\n<p>Chacun peut signifier une perte de revenus due \u00e0 des temps d&#8217;arr\u00eat, des classements de recherche endommag\u00e9s et une confiance des clients \u00e9rod\u00e9e \u2014 des probl\u00e8mes qui s&#8217;accumulent rapidement pour les petites entreprises fonctionnant avec des marges r\u00e9duites.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1041\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection.webp\" alt=\"Quatre des dix ic\u00f4nes d'ordinateur portable mises en \u00e9vidence pour montrer que 4 Am\u00e9ricains sur 10 ont \u00e9t\u00e9 victimes d'un piratage de site web ou d'une infection par un logiciel malveillant.\" class=\"wp-image-77823 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-300x195.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-1024x666.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-768x500.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-1536x999.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-600x390.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-1200x781.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-730x475.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-1460x950.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-784x510.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-1568x1020.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/06_4_in_10_americans_have_experienced_a_website_hack_or_malware_infection-877x571.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1041;\" \/><\/figure>\n\n\n<p><a href=\"https:\/\/www.dreamhost.com\/blog\/this-site-contains-malware-warning\/\">Les infections par malware<\/a>, en particulier, peuvent se propager rapidement \u00e0 travers des plugins et des th\u00e8mes obsol\u00e8tes, et pour 14% de ceux qui ont \u00e9t\u00e9 pirat\u00e9s, ce n&#8217;est pas un \u00e9v\u00e9nement isol\u00e9 \u2014 ils ont subi plusieurs attaques.<\/p>\n\n\n<p>Les donn\u00e9es indiquent que s&#8217;appuyer sur la s\u00e9curit\u00e9 int\u00e9gr\u00e9e d&#8217;un h\u00e9bergeur web n&#8217;est pas suffisant, et le co\u00fbt de la r\u00e9cup\u00e9ration d\u00e9passe largement celui de la pr\u00e9vention. Pourtant, beaucoup continuent de fonctionner avec les m\u00eames vuln\u00e9rabilit\u00e9s qui les ont fait compromettre au d\u00e9part \u2014 en ignorant les mises \u00e0 jour, en sautant les audits de s\u00e9curit\u00e9 et en utilisant des <a href=\"https:\/\/www.dreamhost.com\/blog\/secure-your-wordpress-website\/\">identifiants faibles<\/a>.<\/p>\n\n\n<p>Ces incidents servent souvent de pr\u00e9curseurs \u00e0 des \u00e9v\u00e9nements de ran\u00e7ongiciels plus importants. De nombreux propri\u00e9taires de sites web abordent la cybers\u00e9curit\u00e9 de mani\u00e8re r\u00e9active plut\u00f4t que proactive.<\/p>\n\n\n<h2 id=\"h-1-in-4-americans-never-test-their-website-backups\" class=\"wp-block-heading\">1 Am\u00e9ricain sur 4 Ne Teste Jamais Ses Sauvegardes De Site Web<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"708\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work.webp\" alt=\"Un Am\u00e9ricain sur quatre n'a pas test\u00e9 si ses sauvegardes fonctionnent, illustr\u00e9 par un texte bleu audacieux sur un fond \u00e9toil\u00e9 sombre.\" class=\"wp-image-77824 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-300x133.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-1024x453.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-768x340.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-1536x680.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-600x266.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-1200x531.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-730x323.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-1460x646.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-784x347.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-1568x694.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/07_1_in_4_americans_admit_they_ve_never_tested_if_their_backups_actually_work-877x388.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/708;\" \/><\/figure>\n\n\n<p>M\u00eame apr\u00e8s avoir \u00e9t\u00e9 pirat\u00e9 ou avoir vu des pairs subir des pertes de donn\u00e9es, de nombreuses entreprises n&#8217;ont toujours pas v\u00e9rifi\u00e9 que leurs sauvegardes de site web fonctionnent r\u00e9ellement. Pr\u00e8s d&#8217;un r\u00e9pondant sur quatre (24 %) a d\u00e9clar\u00e9 n&#8217;avoir jamais test\u00e9 leur processus de sauvegarde et de restauration.<\/p>\n\n\n<p>Cet \u00e9cart entre avoir un plan et avoir un plan qui fonctionne est l\u00e0 o\u00f9 les petites crises deviennent de grandes perturbations commerciales.&nbsp;<\/p>\n\n\n<p>De nombreux propri\u00e9taires supposent que \u00ab sauvegarde automatique \u00bb signifie \u00ab r\u00e9cup\u00e9ration automatique. \u00bb&nbsp;<\/p>\n\n\n<p>Non.&nbsp;<\/p>\n\n\n<p>Les sauvegardes peuvent \u00e9chouer silencieusement ou \u00eatre corrompues. Tester une sauvegarde prend <a href=\"https:\/\/help.dreamhost.com\/hc\/en-us\/articles\/215768257-How-do-I-restore-my-website\">moins de 15 minutes<\/a> et pourrait faire la diff\u00e9rence entre un bref d\u00e9sagr\u00e9ment et des semaines d&#8217;indisponibilit\u00e9.<\/p>\n\n\n<h2 id=\"h-40-of-americans-would-pay-for-backups-to-avoid-paying-hackers\" class=\"wp-block-heading\">40% des Am\u00e9ricains paieraient pour des sauvegardes pour \u00e9viter de payer des pirates<\/h2>\n\n\n<p>Il y a une tendance positive dans les donn\u00e9es : 40% des r\u00e9pondants ont dit qu&#8217;ils seraient les plus susceptibles d&#8217;investir dans des <a href=\"https:\/\/www.dreamhost.com\/blog\/how-to-back-up-wordpress-tutorial\/\">sauvegardes automatiques de site web<\/a> si cela signifiait qu&#8217;ils pourraient \u00e9viter de payer une ran\u00e7on.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"1593\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_.webp\" alt=\"Graphique en barres montrant les raisons d'investir dans des sauvegardes automatiques de sites web, men\u00e9 par l'\u00e9vitement de la ran\u00e7on \u00e0 40,5 %, suivi par le co\u00fbt, le risque et d'autres facteurs.\" class=\"wp-image-77825 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-300x300.webp 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-1024x1020.webp 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-150x150.webp 150w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-768x765.webp 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-1536x1529.webp 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-600x597.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-1200x1195.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-730x727.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-1460x1454.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-784x781.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-1568x1561.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/08_what_would_make_you_most_likely_to_invest_in_automated_website_backups_-877x873.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1593;\" \/><\/figure>\n\n\n<p>Cela repr\u00e9sente un changement vers la pr\u00e9vention comme d\u00e9cision financi\u00e8re. Pr\u00e8s d&#8217;un quart des r\u00e9pondants ont cit\u00e9 le co\u00fbt ou la complexit\u00e9 comme barri\u00e8re les emp\u00eachant d&#8217;adopter des solutions de sauvegarde. Cependant, les sauvegardes automatis\u00e9es co\u00fbtent significativement moins cher que la r\u00e9cup\u00e9ration suite \u00e0 une violation de donn\u00e9es.<\/p>\n\n\n<p>4,6 % ont d\u00e9clar\u00e9 qu&#8217;ils n&#8217;investiraient jamais du tout dans les sauvegardes. Ces entreprises restent vuln\u00e9rables aux attaques par ran\u00e7ongiciel.<\/p>\n\n\n<p>Le co\u00fbt total moyen pour qu&#8217;une petite entreprise r\u00e9ponde \u00e0 une violation de donn\u00e9es et s&#8217;en remette peut varier de <a href=\"https:\/\/purplesec.us\/learn\/average-cost-of-ransomware-attacks\/\">120 000 $ \u00e0 1,24 million de $<\/a>.<\/p>\n\n\n<p>Lorsqu&#8217;un site peut \u00eatre restaur\u00e9 en quelques minutes, les exigences de ran\u00e7on perdent de leur efficacit\u00e9. Plus la r\u00e9cup\u00e9ration est rapide, moins les attaquants ont de levier. Cela positionne les outils de sauvegarde comme une infrastructure essentielle. Si un site peut \u00eatre restaur\u00e9 rapidement, les attaquants perdent leurs principaux outils de n\u00e9gociation : le temps et l&#8217;acc\u00e8s.<\/p>\n\n\n<h2 id=\"h-summary-nbsp\" class=\"wp-block-heading\">R\u00e9sum\u00e9&nbsp;<\/h2>\n\n\n<p>Pr\u00e8s de la moiti\u00e9 des petites entreprises ont d\u00e9j\u00e0 subi une cyberattaque. Cette menace r\u00e9pandue incite \u00e0 un changement dans la mani\u00e8re dont les entreprises abordent la cybers\u00e9curit\u00e9 : <strong>la sensibilisation est d\u00e9sormais \u00e9lev\u00e9e, et les propri\u00e9taires de sites web per\u00e7oivent de plus en plus la cybers\u00e9curit\u00e9 comme une planification de la continuit\u00e9, et non juste un co\u00fbt technique.<\/strong><\/p>\n\n\n<p>Le chemin \u00e0 suivre est clair. La r\u00e9silience se construit avec une pr\u00e9paration disciplin\u00e9e : des sauvegardes rigoureusement test\u00e9es, des outils qui automatisent la d\u00e9fense, et un engagement envers la pr\u00e9paration num\u00e9rique.<\/p>\n\n\n<p>La d\u00e9fense la plus efficace est la capacit\u00e9 de r\u00e9ponse rapide et de r\u00e9cup\u00e9ration.<\/p>\n\n\n<p>Les entreprises qui se pr\u00e9parent \u00e0 l&#8217;avance font face \u00e0 un risque consid\u00e9rablement plus faible lorsqu&#8217;une attaque se produit.<\/p>\n\n\n<h2 id=\"h-methodology\" class=\"wp-block-heading\">M\u00e9thodologie<\/h2>\n\n\n<p>Cet article repose sur une enqu\u00eate nationale r\u00e9alis\u00e9e en octobre 2025, o\u00f9 nous avons recueilli les r\u00e9ponses de 1 000 Am\u00e9ricains pour mieux comprendre leurs exp\u00e9riences et pr\u00e9occupations li\u00e9es \u00e0 la s\u00e9curit\u00e9 des sites web et aux menaces cybern\u00e9tiques. L&#8217;enqu\u00eate ciblait sp\u00e9cifiquement les individus poss\u00e9dant ou g\u00e9rant des entreprises de 50 employ\u00e9s ou moins, garantissant ainsi que les donn\u00e9es refl\u00e8tent les d\u00e9fis et r\u00e9alit\u00e9s uniques auxquels sont confront\u00e9s les petits entrepreneurs.&nbsp;<\/p>\n\n\n<p>Les participants repr\u00e9sentaient une section transversale vari\u00e9e des industries et des milieux professionnels, offrant un aper\u00e7u \u00e9quilibr\u00e9 du sentiment public et des impacts r\u00e9els. Les r\u00e9pondants ont \u00e9t\u00e9 interrog\u00e9s sur une s\u00e9rie de questions concernant les ran\u00e7ongiciels, les violations de sites Web, les pratiques de protection des donn\u00e9es et la r\u00e9ponse aux incidents, fournissant des informations pr\u00e9cieuses sur l&#8217;\u00e9tat actuel de la sensibilisation et de la pr\u00e9paration \u00e0 la cybers\u00e9curit\u00e9 parmi les petits entrepreneurs aux \u00c9tats-Unis.<\/p>\n\n\n<h2 id=\"h-fair-use\" class=\"wp-block-heading\">Utilisation \u00c9quitable<\/h2>\n\n\n<p>Les utilisateurs sont invit\u00e9s \u00e0 utiliser les insights et les d\u00e9couvertes de cette \u00e9tude \u00e0 des fins non commerciales, telles que la recherche acad\u00e9mique, les pr\u00e9sentations \u00e9ducatives et la r\u00e9f\u00e9rence personnelle. Lors de la r\u00e9f\u00e9rence ou de la citation de cet article, veuillez assurer une attribution appropri\u00e9e pour maintenir l&#8217;int\u00e9grit\u00e9 de la recherche. Le lien direct vers cet article est permis, et l&#8217;acc\u00e8s \u00e0 la source originale des informations est encourag\u00e9.<\/p>\n\n\n<p>Pour un usage commercial ou des fins de publication \u2014 y compris mais sans se limiter aux m\u00e9dias, sites web et mat\u00e9riaux promotionnels \u2014 veuillez <a href=\"https:\/\/www.dreamhost.com\/downloads\/dreamhost-press-kit.pdf\">contacter notre \u00e9quipe de communications corporatives<\/a> pour obtenir les autorisations et les d\u00e9tails de licence.&nbsp;<\/p>\n\n\n<p>Nous appr\u00e9cions ton respect des droits de propri\u00e9t\u00e9 intellectuelle et ton adh\u00e9sion aux pratiques de citation \u00e9thiques. Merci pour ton int\u00e9r\u00eat pour notre recherche.<\/p>\n\n\n<div class=\"article-newsletter article-newsletter--gradient\">\n\n\n<h2>Get Content Delivered Straight to Your Inbox<\/h2><p>Subscribe now to receive all the latest updates, delivered directly to your inbox.<\/p><form class=\"nwsl-form\" id=\"newsletter_block_\" novalidate><div class=\"messages\"><\/div><div class=\"form-group\"><label for=\"input_newsletter_block_\"><input type=\"email\"name=\"email\"id=\"input_newsletter_block_\"placeholder=\"Enter your email address\"novalidatedisabled=\"disabled\"\/><\/label><button type=\"submit\"class=\"btn btn--brand\"disabled=\"disabled\"><span>Sign Me Up!<\/span><svg width=\"21\" height=\"14\" viewBox=\"0 0 21 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M13.8523 0.42524L12.9323 1.34521C12.7095 1.56801 12.7132 1.9304 12.9404 2.14865L16.7241 5.7823H0.5625C0.251859 5.7823 0 6.03416 0 6.3448V7.6573C0 7.96794 0.251859 8.2198 0.5625 8.2198H16.7241L12.9405 11.8535C12.7132 12.0717 12.7095 12.4341 12.9323 12.6569L13.8523 13.5769C14.072 13.7965 14.4281 13.7965 14.6478 13.5769L20.8259 7.39879C21.0456 7.17913 21.0456 6.82298 20.8259 6.60327L14.6477 0.42524C14.4281 0.205584 14.0719 0.205584 13.8523 0.42524Z\" fill=\"white\"\/>\n<\/svg>\n<\/button><\/div><\/form><\/div>","protected":false},"excerpt":{"rendered":"<p>Key Findings at Glance 12% des r\u00e9pondants ont re\u00e7u une demande de ran\u00e7on li\u00e9e \u00e0 leur site web, email ou donn\u00e9es \u2014 et l&#8217;ont pay\u00e9e. 42% sont tr\u00e8s pr\u00e9occup\u00e9s par les attaques de ran\u00e7ongiciels ciblant les sites web. 46% ont vu leur entreprise touch\u00e9e par une cyberattaque qui a expos\u00e9 des donn\u00e9es, verrouill\u00e9 des fichiers ou rendu leur site web hors ligne. 38% d\u00e9clarent que leur site web a [\u2026]<\/p>\n","protected":false},"author":964,"featured_media":77826,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_metadesc":"","toc_headlines":"[[\"h-1-in-8-americans-have-paid-a-ransom\",\"1 Am\u00e9ricain sur 8 a pay\u00e9 une ran\u00e7on\"],[\"h-nearly-half-of-americans-are-deeply-worried-about-ransomware-threats-nbsp\",\"Pr\u00e8s De La Moiti\u00e9 Des Am\u00e9ricains Sont Profond\u00e9ment Inquiets Des Menaces De Ran\u00e7ongiciel\u00a0\"],[\"h-nearly-half-of-businesses-have-already-been-hacked\",\"Pr\u00e8s De La Moiti\u00e9 Des Entreprises Ont D\u00e9j\u00e0 \u00c9t\u00e9 Pirat\u00e9es\"],[\"h-1-in-4-americans-never-test-their-website-backups\",\"1 Am\u00e9ricain sur 4 Ne Teste Jamais Ses Sauvegardes De Site Web\"],[\"h-40-of-americans-would-pay-for-backups-to-avoid-paying-hackers\",\"40% des Am\u00e9ricains paieraient pour des sauvegardes pour \u00e9viter de payer des pirates\"],[\"h-summary-nbsp\",\"R\u00e9sum\u00e9\u00a0\"],[\"h-methodology\",\"M\u00e9thodologie\"],[\"h-fair-use\",\"Utilisation \u00c9quitable\"]]","hide_toc":false,"footnotes":""},"categories":[14989],"tags":[],"class_list":["post-80226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-talk-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on - DreamHost Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on\" \/>\n<meta property=\"og:description\" content=\"Key Findings at Glance 12% des r\u00e9pondants ont re\u00e7u une demande de ran\u00e7on li\u00e9e \u00e0 leur site web, email ou donn\u00e9es \u2014 et l&#039;ont pay\u00e9e. 42% sont tr\u00e8s pr\u00e9occup\u00e9s par les attaques de ran\u00e7ongiciels ciblant les sites web. 46% ont vu leur entreprise touch\u00e9e par une cyberattaque qui a expos\u00e9 des donn\u00e9es, verrouill\u00e9 des fichiers ou rendu leur site web hors ligne. 38% d\u00e9clarent que leur site web a [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/\" \/>\n<meta property=\"og:site_name\" content=\"DreamHost Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DreamHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-26T16:53:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T21:00:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/1460x1095_blog_hero_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1460\" \/>\n\t<meta property=\"og:image:height\" content=\"1095\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Brett D.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/tremendousvalue\" \/>\n<meta name=\"twitter:site\" content=\"@dreamhost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brett D.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on - DreamHost Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/","og_locale":"en_US","og_type":"article","og_title":"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on","og_description":"Key Findings at Glance 12% des r\u00e9pondants ont re\u00e7u une demande de ran\u00e7on li\u00e9e \u00e0 leur site web, email ou donn\u00e9es \u2014 et l'ont pay\u00e9e. 42% sont tr\u00e8s pr\u00e9occup\u00e9s par les attaques de ran\u00e7ongiciels ciblant les sites web. 46% ont vu leur entreprise touch\u00e9e par une cyberattaque qui a expos\u00e9 des donn\u00e9es, verrouill\u00e9 des fichiers ou rendu leur site web hors ligne. 38% d\u00e9clarent que leur site web a [\u2026]","og_url":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/","og_site_name":"DreamHost Blog","article_publisher":"https:\/\/www.facebook.com\/DreamHost\/","article_published_time":"2025-11-26T16:53:09+00:00","article_modified_time":"2026-04-07T21:00:46+00:00","og_image":[{"width":1460,"height":1095,"url":"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/1460x1095_blog_hero_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp","type":"image\/webp"}],"author":"Brett D.","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/tremendousvalue","twitter_site":"@dreamhost","twitter_misc":{"Written by":"Brett D.","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#article","isPartOf":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/"},"author":{"name":"Brett D.","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/person\/c5a527c83308e1b196a536952dbf1b6c"},"headline":"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on","datePublished":"2025-11-26T16:53:09+00:00","dateModified":"2026-04-07T21:00:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/"},"wordCount":2289,"publisher":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#organization"},"image":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#primaryimage"},"thumbnailUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/1460x1095_blog_hero_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp","articleSection":["Tech Talk"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/","url":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/","name":"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on - DreamHost Blog","isPartOf":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#primaryimage"},"image":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#primaryimage"},"thumbnailUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/1460x1095_blog_hero_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp","datePublished":"2025-11-26T16:53:09+00:00","dateModified":"2026-04-07T21:00:46+00:00","breadcrumb":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#primaryimage","url":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/1460x1095_blog_hero_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp","contentUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2025\/11\/1460x1095_blog_hero_12_of_small_businesses_say_they_ve_paid_a_ransom_demand.webp","width":1460,"height":1095,"caption":"[STUDY] 12% of Small Businesses Say They\u2019ve Paid a Ransom Demand"},{"@type":"BreadcrumbList","@id":"https:\/\/www-dev.dreamhost.com\/blog\/fr\/etude-12-des-petites-entreprises-disent-avoir-paye-une-demande-de-rancon-fr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dhblog.dream.press\/blog\/"},{"@type":"ListItem","position":2,"name":"[\u00c9TUDE] 12 % des petites entreprises disent avoir pay\u00e9 une demande de ran\u00e7on"}]},{"@type":"WebSite","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#website","url":"https:\/\/www-dev.dreamhost.com\/blog\/","name":"DreamHost Blog","description":"","publisher":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www-dev.dreamhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#organization","name":"DreamHost","url":"https:\/\/www-dev.dreamhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/dhblog.dream.press\/blog\/wp-content\/uploads\/2019\/01\/dh_logo-blue-2.png","contentUrl":"https:\/\/dhblog.dream.press\/blog\/wp-content\/uploads\/2019\/01\/dh_logo-blue-2.png","width":1200,"height":168,"caption":"DreamHost"},"image":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DreamHost\/","https:\/\/x.com\/dreamhost","https:\/\/www.instagram.com\/dreamhost\/","https:\/\/www.linkedin.com\/company\/dreamhost\/","https:\/\/www.youtube.com\/user\/dreamhostusa"]},{"@type":"Person","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/person\/c5a527c83308e1b196a536952dbf1b6c","name":"Brett D.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c560b676913f01e3c4679f853ce85f3b1ffb2a92716cb7a56bc03cefb687020d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c560b676913f01e3c4679f853ce85f3b1ffb2a92716cb7a56bc03cefb687020d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c560b676913f01e3c4679f853ce85f3b1ffb2a92716cb7a56bc03cefb687020d?s=96&d=mm&r=g","caption":"Brett D."},"description":"Brett's the VP of Corporate Communications at DreamHost and definitely not a robot. He tweets as @TremendousValue and it's not great.","sameAs":["https:\/\/www.dreamhost.com\/","https:\/\/x.com\/https:\/\/twitter.com\/tremendousvalue"],"url":"https:\/\/www-dev.dreamhost.com\/blog\/author\/brett\/"}]}},"lang":"fr","translations":{"fr":80226,"es":77873,"en":77808,"ru":80023,"uk":80027,"de":80085,"nl":80152,"it":80163,"pt":80170,"pl":80214},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts\/80226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/users\/964"}],"replies":[{"embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/comments?post=80226"}],"version-history":[{"count":3,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts\/80226\/revisions"}],"predecessor-version":[{"id":80391,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts\/80226\/revisions\/80391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/media\/77826"}],"wp:attachment":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/media?parent=80226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/categories?post=80226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/tags?post=80226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}