{"id":536,"date":"2020-07-20T13:59:17","date_gmt":"2020-07-20T13:59:17","guid":{"rendered":"https:\/\/wp.quomodosoft.com\/itbin\/?p=536"},"modified":"2025-09-27T22:20:58","modified_gmt":"2025-09-27T22:20:58","slug":"les-10-cyberattaques-les-plus-frequentes-contre-les-pme","status":"publish","type":"post","link":"https:\/\/cantinedigitale.ch\/index.php\/2020\/07\/20\/les-10-cyberattaques-les-plus-frequentes-contre-les-pme\/","title":{"rendered":"Les 10 cyberattaques les plus fr\u00e9quentes contre les PME"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"536\" class=\"elementor elementor-536\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-93f8b54 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"93f8b54\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2a67dac\" data-id=\"2a67dac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-65e777b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"65e777b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2c5cc4c\" data-id=\"2c5cc4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab976fc elementor-widget elementor-widget-text-editor\" data-id=\"ab976fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La cybers\u00e9curit\u00e9 n\u2019est plus un sujet r\u00e9serv\u00e9 aux grandes entreprises. Aujourd\u2019hui, les PME repr\u00e9sentent une cible privil\u00e9gi\u00e9e pour les cybercriminels : ressources limit\u00e9es, manque d\u2019\u00e9quipes sp\u00e9cialis\u00e9es, infrastructures moins s\u00e9curis\u00e9es. R\u00e9sultat : plus de <strong data-start=\"378\" data-end=\"460\">40 % des cyberattaques ciblent directement les petites et moyennes entreprises<\/strong>. Comprendre les menaces les plus fr\u00e9quentes est la premi\u00e8re \u00e9tape pour s\u2019en prot\u00e9ger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-80f9800 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"80f9800\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fd56cda\" data-id=\"fd56cda\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4cc277 elementor-widget elementor-widget-image\" data-id=\"c4cc277\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wp.quomodosoft.com\/itbin\/wp-content\/uploads\/2020\/07\/blog_inner.jpg\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e48a19b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e48a19b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-58aee2f\" data-id=\"58aee2f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1838094 elementor-widget elementor-widget-text-editor\" data-id=\"1838094\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"548\" data-end=\"579\">1. Le phishing (hame\u00e7onnage)<\/h2><p data-start=\"580\" data-end=\"910\">Les emails frauduleux imitant une banque, un fournisseur ou un service public sont la premi\u00e8re porte d\u2019entr\u00e9e des attaques. L\u2019objectif : pousser un employ\u00e9 \u00e0 cliquer sur un lien ou transmettre des identifiants.<br data-start=\"790\" data-end=\"793\" \/><strong data-start=\"793\" data-end=\"811\">Impact typique<\/strong> : vol d\u2019acc\u00e8s \u00e0 des comptes sensibles, fraude financi\u00e8re, intrusion dans le syst\u00e8me d\u2019information.<\/p><h2 data-start=\"912\" data-end=\"933\">2. Les ransomwares<\/h2><p data-start=\"934\" data-end=\"1145\">Logiciels malveillants qui chiffrent toutes les donn\u00e9es d\u2019une entreprise et r\u00e9clament une ran\u00e7on pour les restituer.<br data-start=\"1050\" data-end=\"1053\" \/><strong data-start=\"1053\" data-end=\"1063\">Impact<\/strong> : paralysie de l\u2019activit\u00e9, pertes financi\u00e8res massives, atteinte \u00e0 la r\u00e9putation.<\/p><h2 data-start=\"1147\" data-end=\"1189\">3. Les attaques par mot de passe faible<\/h2><p data-start=\"1190\" data-end=\"1380\">Un grand nombre d\u2019intrusions exploitent encore des mots de passe simples ou r\u00e9utilis\u00e9s.<br data-start=\"1277\" data-end=\"1280\" \/><strong data-start=\"1280\" data-end=\"1290\">Impact<\/strong> : acc\u00e8s non autoris\u00e9 aux messageries, aux syst\u00e8mes de facturation ou aux comptes clients.<\/p><h2 data-start=\"1382\" data-end=\"1408\">4. L\u2019ing\u00e9nierie sociale<\/h2><p data-start=\"1409\" data-end=\"1610\">Les cybercriminels manipulent directement les employ\u00e9s : appels t\u00e9l\u00e9phoniques, faux prestataires, fausses factures.<br data-start=\"1524\" data-end=\"1527\" \/><strong data-start=\"1527\" data-end=\"1537\">Impact<\/strong> : transferts bancaires frauduleux, divulgation d\u2019informations sensibles.<\/p><h2 data-start=\"1612\" data-end=\"1676\">5. Les malwares classiques (virus, chevaux de Troie, spyware)<\/h2><p data-start=\"1677\" data-end=\"1834\">Ils s\u2019installent via un t\u00e9l\u00e9chargement ou une cl\u00e9 USB infect\u00e9e.<br data-start=\"1740\" data-end=\"1743\" \/><strong data-start=\"1743\" data-end=\"1753\">Impact<\/strong> : vol de donn\u00e9es, surveillance des activit\u00e9s, destruction de fichiers critiques.<\/p><h2 data-start=\"1836\" data-end=\"1887\">6. Les attaques DDoS (D\u00e9ni de Service Distribu\u00e9)<\/h2><p data-start=\"1888\" data-end=\"2072\">Un site ou une application est satur\u00e9 de requ\u00eates jusqu\u2019\u00e0 devenir inaccessible.<br data-start=\"1967\" data-end=\"1970\" \/><strong data-start=\"1970\" data-end=\"1980\">Impact<\/strong> : indisponibilit\u00e9 du site e-commerce ou des services en ligne, perte de chiffre d\u2019affaires.<\/p><h2 data-start=\"2074\" data-end=\"2105\">7. Le vol de donn\u00e9es clients<\/h2><p data-start=\"2106\" data-end=\"2294\">Les bases de donn\u00e9es CRM ou e-commerce sont particuli\u00e8rement vis\u00e9es.<br data-start=\"2174\" data-end=\"2177\" \/><strong data-start=\"2177\" data-end=\"2187\">Impact<\/strong> : fuite de donn\u00e9es personnelles, violation du RGPD, sanctions financi\u00e8res, perte de confiance des clients.<\/p><h2 data-start=\"2296\" data-end=\"2339\">8. L\u2019exploitation de failles logicielles<\/h2><p data-start=\"2340\" data-end=\"2489\">Syst\u00e8mes non mis \u00e0 jour, plugins vuln\u00e9rables ou logiciels obsol\u00e8tes.<br data-start=\"2408\" data-end=\"2411\" \/><strong data-start=\"2411\" data-end=\"2421\">Impact<\/strong> : portes ouvertes pour des intrusions silencieuses et persistantes.<\/p><h2 data-start=\"2491\" data-end=\"2538\">9. Le d\u00e9tournement de sites web (defacement)<\/h2><p data-start=\"2539\" data-end=\"2731\">Les hackers modifient l\u2019apparence d\u2019un site pour diffuser un message politique, une arnaque ou un malware.<br data-start=\"2645\" data-end=\"2648\" \/><strong data-start=\"2648\" data-end=\"2658\">Impact<\/strong> : atteinte \u00e0 l\u2019image de marque, fuite des visiteurs vers la concurrence.<\/p><h2 data-start=\"2733\" data-end=\"2774\">10. Le Business Email Compromise (BEC)<\/h2><p data-start=\"2775\" data-end=\"2958\">Fausse usurpation d\u2019identit\u00e9 du dirigeant ou du fournisseur dans un \u00e9change d\u2019emails.<br data-start=\"2860\" data-end=\"2863\" \/><strong data-start=\"2863\" data-end=\"2873\">Impact<\/strong> : virements frauduleux, pertes pouvant atteindre des dizaines de milliers de francs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d6f2b55 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6f2b55\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1382caa\" data-id=\"1382caa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c71599 elementor-widget elementor-widget-heading\" data-id=\"0c71599\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h2 data-start=\"2965\" data-end=\"3000\">Comment une PME peut se prot\u00e9ger ?<\/h2><\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-42ff08b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42ff08b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-59c3d82\" data-id=\"59c3d82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96f71b1 elementor-widget elementor-widget-text-editor\" data-id=\"96f71b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Formation des \u00e9quipes aux risques cyber.<\/p><ul><li style=\"list-style-type: none;\"><ul data-start=\"3001\" data-end=\"3347\"><li data-start=\"3046\" data-end=\"3100\"><p data-start=\"3048\" data-end=\"3100\">Mises \u00e0 jour r\u00e9guli\u00e8res des logiciels et syst\u00e8mes.<\/p><\/li><li data-start=\"3101\" data-end=\"3146\"><p data-start=\"3103\" data-end=\"3146\">Sauvegardes automatis\u00e9es et d\u00e9connect\u00e9es.<\/p><\/li><li data-start=\"3147\" data-end=\"3217\"><p data-start=\"3149\" data-end=\"3217\">Gestion rigoureuse des acc\u00e8s et authentification multifactorielle.<\/p><\/li><li data-start=\"3218\" data-end=\"3302\"><p data-start=\"3220\" data-end=\"3302\">Solutions de s\u00e9curit\u00e9 adapt\u00e9es (pare-feu, antivirus pro, d\u00e9tection d\u2019intrusion).<\/p><\/li><li data-start=\"3303\" data-end=\"3347\"><p data-start=\"3305\" data-end=\"3347\">Plan de r\u00e9ponse aux incidents bien d\u00e9fini.<\/p><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4c91cd0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c91cd0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c587223\" data-id=\"c587223\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b6e5fe elementor-aspect-ratio-169 elementor-widget elementor-widget-Ultimate_Widget_Video\" data-id=\"7b6e5fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;lightbox&quot;:&quot;yes&quot;,&quot;aspect_ratio&quot;:&quot;169&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"Ultimate_Widget_Video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-lightbox\">\r\n\t\t\t\t\t\t\t<div class=\"elementor-custom-embed-image-overlay\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox=\"{&quot;type&quot;:&quot;video&quot;,&quot;videoType&quot;:&quot;youtube&quot;,&quot;url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/embed\\\/XHOmBV4js_E?feature=oembed&amp;start&amp;end&amp;wmode=opaque&amp;loop=0&amp;controls=1&amp;mute=0&amp;rel=0&amp;modestbranding=0&quot;,&quot;modalOptions&quot;:{&quot;id&quot;:&quot;elementor-lightbox-7b6e5fe&quot;,&quot;entranceAnimation&quot;:&quot;&quot;,&quot;entranceAnimation_tablet&quot;:&quot;&quot;,&quot;entranceAnimation_mobile&quot;:&quot;&quot;,&quot;videoAspectRatio&quot;:&quot;169&quot;}}\">\r\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wp.quomodosoft.com\/itbin\/wp-content\/uploads\/2020\/07\/blog_inner_2.jpg\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"video__play__button\" role=\"button\">\r\n\t\t\t\t\t\t\t<i class=\"fas fa-play\"><\/i>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-858d687 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"858d687\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-17c66bd\" data-id=\"17c66bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c47cf1 elementor-widget elementor-widget-text-editor\" data-id=\"1c47cf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"3354\" data-end=\"3368\">Conclusion<\/h3><p data-start=\"3369\" data-end=\"3670\">La plupart des cyberattaques ne reposent pas sur une technologie sophistiqu\u00e9e mais sur des failles humaines et organisationnelles. En investissant dans la sensibilisation, la pr\u00e9vention et des outils adapt\u00e9s, une PME peut transformer la cybers\u00e9curit\u00e9 en atout strat\u00e9gique plut\u00f4t qu\u2019en talon d\u2019Achille.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 n\u2019est plus un sujet r\u00e9serv\u00e9 aux grandes entreprises. Aujourd\u2019hui, les PME repr\u00e9sentent une cible privil\u00e9gi\u00e9e pour les cybercriminels [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"footnotes":""},"categories":[19],"tags":[22,23],"class_list":["post-536","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-tendances-innovation","tag-experience-client","tag-strategie-digitale","post_format-post-format-image","no-social-count","single-post-item mb40"],"_links":{"self":[{"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/posts\/536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/comments?post=536"}],"version-history":[{"count":0,"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/posts\/536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/media\/642"}],"wp:attachment":[{"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/media?parent=536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/categories?post=536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cantinedigitale.ch\/index.php\/wp-json\/wp\/v2\/tags?post=536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}