{"id":31852,"date":"2026-03-26T15:40:26","date_gmt":"2026-03-26T14:40:26","guid":{"rendered":"https:\/\/www.advens.com\/?p=31852"},"modified":"2026-04-14T14:49:52","modified_gmt":"2026-04-14T12:49:52","slug":"massive-data-breach-what-should-be-done","status":"publish","type":"post","link":"https:\/\/www.advens.com\/en\/media\/security-operations\/massive-data-breach-what-should-be-done\/","title":{"rendered":"Massive data breach: what should be done?"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><strong>A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start ringing. One employee has received a suspicious email. Another reports that their professional email address appears in a list circulating on a forum. Every department asks whether \u201cwe are impacted.\u201d Users wonder what to do in the event of a massive data breach.<\/strong><\/p>\n\n\n\n<p><strong>Key answers for CISOs.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>This is the nature of major data breaches: they never remain confined to the organization that is directly affected. This information spreads and, when combined with other databases, fuels phishing campaigns, wire fraud attempts, and more. Those impacted by stolen data include individuals as well as companies and organizations. As a result, the right reflexes to adopt are almost the same, whether you are managing personal accounts or an information system with 5,000 workstations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Setting the scene<strong><\/strong><\/h2>\n\n\n\n<p>Major data breaches have become a global and highly public phenomenon. Cybercriminals \u2014 including new, younger, French\u2011speaking profiles \u2014 seek to pull off the \u201cbiggest hit\u201d possible and to make it known. Beyond notoriety, these groups may be driven by financial gain or, to a lesser extent, geopolitical motivations.<\/p>\n\n\n\n<figure id=\"block-citation-810924192\" class=\"acf-block-citation  mb-4\">\n  <blockquote class=\"blockquote\">\n    <p class=\"fs-3\">\u201cData breaches have become a mainstream issue. Public opinion is increasingly attentive to this type of risk.\u201d <\/p>\n  <\/blockquote>\n  <div class=\"d-flex align-items-center justify-content-start gap-3 gap-xl-4\">\n        <figcaption class=\"blockquote-footer text-end d-flex flex-wrap align-items-center justify-content-end m-0\">\n      <strong>Fabian Cosset<\/strong>\n      <span class=\"mx-1\">\u2022<\/span>\n      <span>Director of CERT Advens<\/span>\n    <\/figcaption>\n  <\/div>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n\n<p><\/p>\n\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding what actually leaked<strong><\/strong><\/h2>\n\n\n\n<p>Almost everyone today has personal data that has been exposed in a breach. The real challenge is therefore to identify which information has been compromised and which actions to take depending on the nature of this data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>Login and password: this is the most common and most directly exploitable scenario, for example via <em><a href=\"https:\/\/www.cnil.fr\/fr\/definition\/credential-stuffing-attaque-informatique\">credential stuffing<\/a><\/em> attacks. Attackers know that reusing the same credentials across personal and professional environments is very widespread. A breach on an e\u2011commerce website can thus become an entry point into a company\u2019s information system.<\/li>\n\n\n\n<li>Email address: an exposed email address automatically triggers targeted phishing campaigns. A breach at a supplier such as an equipment rental company or a purchasing group, for example, can be enough to fuel waves of highly credible fake emails, as they are contextualized around an actual business relationship.<\/li>\n\n\n\n<li>Bank details (IBAN or account information): knowing an IBAN and a BIC enables the creation of fraudulent direct debit mandates, which must therefore be monitored. This element can also contribute to identity theft by forming a credible file when combined with other personal data.<\/li>\n\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Data theft: what should be done?<\/h2>\n\n\n\n<p>The reflexes to adopt are the same for companies as for individuals, even though the stakes are naturally much higher in a collective structure. Social networks also deserve particular attention in a professional context, as information published on LinkedIn or other platforms can be combined with stolen data to fuel sophisticated social engineering attacks \u2014 whether identity theft, highly targeted phishing, or fraudulent phone calls.<\/p>\n\n\n\n<p>In all cases, a breach at a supplier or purchasing group must trigger an immediate alert regarding the risk of phishing campaigns targeting the relevant teams. The bank must also be informed of the risks associated with compromised banking details (wire fraud or mandate fraud attempts).<\/p>\n\n\n\n<p>Here is a checklist of priority actions for organizations and their members to know what to do in the event of data theft:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>Immediately change passwords for the compromised service, and anywhere they have been reused<\/li>\n\n\n\n<li>Strictly separate professional and personal uses (credentials, email addresses, devices)<\/li>\n\n\n\n<li>Adopt a password manager or digital vault to address the difficulty of remembering unique login\/password combinations per service<\/li>\n\n\n\n<li>Monitor bank accounts and inform the bank in the event of exposure of financial data<\/li>\n\n\n\n<li>Raise awareness among the affected teams (particularly procurement and finance departments) about the increased risk of phishing following a massive data breach<\/li>\n\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Communicating for compliance and trust<\/h2>\n\n\n\n<p>Since 2018, the GDPR has required organizations affected by a data breach to notify the CNIL and, in certain cases, the individuals concerned.<\/p>\n\n\n\n<figure id=\"block-citation-2001752091\" class=\"acf-block-citation  mb-4\">\n  <blockquote class=\"blockquote\">\n    <p class=\"fs-3\">\u201cThis obligation has profoundly transformed practices: companies have generally improved their communication on the subject, and for the past two or three years, we can truly speak of an acceleration in transparency on these issues.\u201d <\/p>\n  <\/blockquote>\n  <div class=\"d-flex align-items-center justify-content-start gap-3 gap-xl-4\">\n        <figcaption class=\"blockquote-footer text-end d-flex flex-wrap align-items-center justify-content-end m-0\">\n      <strong>Fabian Cosset<\/strong>\n      <span class=\"mx-1\">\u2022<\/span>\n      <span>Director of CERT Advens<\/span>\n    <\/figcaption>\n  <\/div>\n<\/figure>\n\n\n\n<p>Communication formats vary: some remain very concise, others are more detailed and educational, but the overall trend is clearly toward greater transparency. This is a positive evolution: rapid and clear communication enables victims to adopt the right reflexes themselves without delay. Organizations that communicate effectively after a breach \u2014 explaining what was exposed, what was not, and what victims should do \u2014 not only limit the actual damage, but also preserve their long\u2011term reputation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Banque de France initiative<\/h2>\n\n\n\n<p>One direct consequence of the increased media coverage of data breaches is inevitably the multiplication of inquiries when an incident occurs. Nicolas Pley, Deputy Director of Risk Prevention at the Banque de France, describes a time\u2011consuming situation in which the CISO and CERT\u2011BDF are overwhelmed with questions and sources of varying quality across multiple internal conversations.<\/p>\n\n\n\n<p>To move away from this reactive posture, Nicolas Pley set up an internal communication channel called \u201cCyberurgences,\u201d in which cyber teams provide concise answers to the following questions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>What happened at the third\u2011party organization?<\/li>\n\n\n\n<li>Are we concerned?<\/li>\n\n\n\n<li>Are we a potential target?<\/li>\n\n\n\n<li>What checks were carried out and with what results for our protection?<\/li>\n\n<\/ul>\n\n\n\n<p>The idea is to proactively disseminate \u201cclean\u201d information to a selected group of internal readers who can, if they deem it necessary, cascade it to their teams. Beyond the obvious time savings, this approach also serves as a reminder for awareness\u2011raising. This strong example of internal communication \u2014 primarily between cyber teams and the Banque de France executive management \u2014 could easily be extended to a broader group of contributors. Indeed, sharing such information with a network of partners could help foster a virtuous ecosystem in which everyone knows whether they need to act and how.<\/p>\n\n\n\n<figure id=\"block-citation-82264816\" class=\"acf-block-citation  mb-4\">\n  <blockquote class=\"blockquote\">\n    <p class=\"fs-3\">\u201cThis initiative allowed us to regain control in the face of numerous, redundant, and insufficiently precise email chains. Thanks to this new channel, we have reduced the communication load around these breaches and now deliver a single, unified message, which is also clearer and more reassuring for teams.\u201d<\/p>\n  <\/blockquote>\n  <div class=\"d-flex align-items-center justify-content-start gap-3 gap-xl-4\">\n        <figcaption class=\"blockquote-footer text-end d-flex flex-wrap align-items-center justify-content-end m-0\">\n      <strong>Nicolas Pley<\/strong>\n      <span class=\"mx-1\">\u2022<\/span>\n      <span>Deputy Director of Risk Prevention at the Banque de France<\/span>\n    <\/figcaption>\n  <\/div>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>In conclusion, what should be done in the event of a massive data breach at a third party? For CISOs, it should be approached as an internal event. Every major public incident is an opportunity to test team responsiveness, verify the application of basic cyber hygiene rules, and remind everyone of the importance of separating professional and personal uses \u2014 while illustrating <a href=\"https:\/\/www.advens.com\/expertise\/expertise-risque-securite-cyberattaque\/\">cyber risk<\/a> in a very concrete way.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.advens.com\/expertise\/expertise-gestion-cyberattaque\/\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"241\" src=\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/Advens-Interne-Signature-Mail-CERT.png\" alt=\"Contact CERT Advens in the event of an attack\" class=\"wp-image-31569\" srcset=\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/Advens-Interne-Signature-Mail-CERT.png 740w, https:\/\/www.advens.com\/app\/uploads\/2026\/03\/Advens-Interne-Signature-Mail-CERT-300x98.png 300w, https:\/\/www.advens.com\/app\/uploads\/2026\/03\/Advens-Interne-Signature-Mail-CERT-260x85.png 260w, https:\/\/www.advens.com\/app\/uploads\/2026\/03\/Advens-Interne-Signature-Mail-CERT-696x227.png 696w, https:\/\/www.advens.com\/app\/uploads\/2026\/03\/Advens-Interne-Signature-Mail-CERT-390x127.png 390w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start ringing. One employee has received a suspicious email. Another reports that their professional email address appears in a list circulating on a forum. Every department asks whether \u201cwe are impacted.\u201d Users [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":31554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[470],"tags":[],"custom_format":[],"class_list":["post-31852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-operations"],"acf":[],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Massive data breach: what should be done? - Advens<\/title>\n<meta name=\"description\" content=\"A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive data breach: what should be done? - Advens\" \/>\n<meta property=\"og:description\" content=\"A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T14:40:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T12:49:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"madina.ehsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\"},\"author\":{\"name\":\"madina.ehsan\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\"},\"headline\":\"Massive data breach: what should be done?\",\"datePublished\":\"2026-03-26T14:40:26+00:00\",\"dateModified\":\"2026-04-14T12:49:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\"},\"wordCount\":987,\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg\",\"articleSection\":[\"Security Operations\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\",\"url\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\",\"name\":\"Massive data breach: what should be done? - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg\",\"datePublished\":\"2026-03-26T14:40:26+00:00\",\"dateModified\":\"2026-04-14T12:49:52+00:00\",\"description\":\"A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Vol de donn\u00e9es que faire ?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Operations\",\"item\":\"https:\/\/www.advens.com\/en\/security-operations\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Massive data breach: what should be done?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.com\/#website\",\"url\":\"https:\/\/www.advens.com\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.com\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\",\"name\":\"madina.ehsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"caption\":\"madina.ehsan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Massive data breach: what should be done? - Advens","description":"A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/","og_locale":"en_US","og_type":"article","og_title":"Massive data breach: what should be done? - Advens","og_description":"A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start","og_url":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/","og_site_name":"Advens","article_published_time":"2026-03-26T14:40:26+00:00","article_modified_time":"2026-04-14T12:49:52+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg","type":"image\/jpeg"}],"author":"madina.ehsan","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#article","isPartOf":{"@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/"},"author":{"name":"madina.ehsan","@id":"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b"},"headline":"Massive data breach: what should be done?","datePublished":"2026-03-26T14:40:26+00:00","dateModified":"2026-04-14T12:49:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/"},"wordCount":987,"publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"image":{"@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg","articleSection":["Security Operations"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/","url":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/","name":"Massive data breach: what should be done? - Advens","isPartOf":{"@id":"https:\/\/www.advens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg","datePublished":"2026-03-26T14:40:26+00:00","dateModified":"2026-04-14T12:49:52+00:00","description":"A data breach at Free, Cegedim or the French Public Finance Directorate: the topic makes headlines, and the next morning, many CISOs\u2019 phones start","breadcrumb":{"@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#primaryimage","url":"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg","width":1000,"height":667,"caption":"Vol de donn\u00e9es que faire ?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.com\/media\/security-operations\/massive-data-breach-what-should-be-done\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security Operations","item":"https:\/\/www.advens.com\/en\/security-operations\/"},{"@type":"ListItem","position":3,"name":"Massive data breach: what should be done?"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.com\/#website","url":"https:\/\/www.advens.com\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.com\/#organization","name":"Advens","url":"https:\/\/www.advens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b","name":"madina.ehsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","caption":"madina.ehsan"}}]}},"featured_url":"https:\/\/www.advens.com\/app\/uploads\/2026\/03\/1660.jpg","_links":{"self":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/31852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/comments?post=31852"}],"version-history":[{"count":1,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/31852\/revisions"}],"predecessor-version":[{"id":31853,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/31852\/revisions\/31853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media\/31554"}],"wp:attachment":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media?parent=31852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/categories?post=31852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/tags?post=31852"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/custom_format?post=31852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}