{"id":7757,"date":"2024-08-02T14:17:55","date_gmt":"2024-08-02T14:17:55","guid":{"rendered":"https:\/\/trustpair.com\/usurpation-didentite-bancaire-comment-sen-proteger\/"},"modified":"2024-12-26T16:56:59","modified_gmt":"2024-12-26T16:56:59","slug":"usurpation-didentite-bancaire-comment-sen-proteger","status":"publish","type":"post","link":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/","title":{"rendered":"Usurpation d&rsquo;identit\u00e9 bancaire : comment s&rsquo;en prot\u00e9ger ?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Ann\u00e9es apr\u00e8s ann\u00e9es, le risque de fraude continue de peser lourdement sur les entreprises.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En 2021, <\/span><a href=\"https:\/\/www.allianz-trade.fr\/actualites\/etude-fraude-2021.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">2 entreprises sur 3<\/span><\/a><span style=\"font-weight: 400;\"> ont subi au moins une fraude. <\/span><a href=\"https:\/\/trustpair.fr\/blog\/lusurpation-didentite-un-danger-majeur-pour-les-directions-financieres\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">L\u2019usurpation d\u2019identit\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> est la technique privil\u00e9gi\u00e9e par les fraudeurs, la fraude au faux pr\u00e9sident \u00e9tant la plus subie par les entreprises (+9 points par rapport au Barom\u00e8tre Fraude et Cybercriminalit\u00e9 2020 de Euler Herm\u00e8s).\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Heureusement, des solutions existent pour contrer ce risque. Voici donc quelques <\/span><span style=\"font-weight: 400;\">moyens de se prot\u00e9ger contre l&rsquo;usurpation d&rsquo;identit\u00e9 bancaire.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">L&rsquo;usurpation d&rsquo;identit\u00e9 bancaire : qu&rsquo;est ce que c&rsquo;est ?\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Dans son acception g\u00e9n\u00e9rale, l\u2019usurpation d\u2019identit\u00e9 est d\u00e9finie comme le fait d\u2019utiliser le nom d\u2019un tiers en vue de commettre des actes portant atteinte \u00e0 son honneur.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En entreprise, <\/span><span style=\"font-weight: 400;\">l\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019une personne interne \u00e0 l\u2019entreprise, ou d\u2019un tiers tel qu\u2019un fournisseur. Pour le fraudeur, l\u2019objectif est d\u2019extorquer des fonds et d\u2019obtenir un virement sur son compte. Pour usurper l\u2019identit\u00e9 d\u2019un tiers, le fraudeur va recourir \u00e0 de fausses factures, de faux RIB, de faux comptes bancaires, etc.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&rsquo;usurpation d&rsquo;identit\u00e9 est un d\u00e9lit p\u00e9nal passible d&rsquo;un an d&#8217;emprisonnement et de 15 000 euros d&rsquo;amende par l\u2019article 226-4-1 du Code p\u00e9nal.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Comment les malfaiteurs construisent-ils leurs attaques ?\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A l\u2019heure de la digitalisation, il est important de rappeler que tout compte cr\u00e9\u00e9 sur Internet et toute transaction comportent un risque d&rsquo;usurpation. Le risque 0 n&rsquo;existe pas, puisque les processus impliquant des choix humains sont n\u00e9cessairement faillibles.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cependant, il existe des moyens de se pr\u00e9munir de la fraude et plus particuli\u00e8rement de l\u2019usurpation d\u2019identit\u00e9 bancaire.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Usurpation d&rsquo;identit\u00e9 bancaire : les signes avant-coureurs \u00e0 rep\u00e9rer\u00a0<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vous recevez des lettres ou des messages inconnus \u00e9manant d&rsquo;agents de recouvrement (pour des factures par exemple) ;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vous recevez un mail d&rsquo;un fournisseur alors que vous n&rsquo;\u00eates pas cens\u00e9 en recevoir de sa part ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vous recevez une relance de facture impay\u00e9e suspecte (parce que vous avez d\u00e9j\u00e0 fait le virement, par exemple) ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vous rep\u00e9rez une activit\u00e9 ou un mouvement suspect sur votre compte bancaire.\u00a0<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Les m\u00e9thodes les plus courantes\u00a0<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Le phishing<\/span><span style=\"font-weight: 400;\"> : aussi appel\u00e9e hame\u00e7onnage, cette technique consiste pour le fraudeur \u00e0 se faire passer pour un organisme ou un tiers connu de l\u2019entreprise pour extorquer des fonds.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Le <\/span><a href=\"https:\/\/trustpair.fr\/blog\/spoofing-attention-aux-usurpations-adresses-mail\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">spoofing<\/span><\/a><span style=\"font-weight: 400;\"> : il s\u2019agit d\u2019une technique d\u2019usurpation d&rsquo;identit\u00e9 qui consiste \u00e0 <\/span><span style=\"font-weight: 400;\">induire en erreur le destinataire d\u2019un message, gr\u00e2ce \u00e0 une adresse mail quasi-identique \u00e0 celle d\u2019un exp\u00e9diteur connu.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Le <\/span><a href=\"https:\/\/trustpair.fr\/fraude-au-president\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">FOVI<\/span><\/a><span style=\"font-weight: 400;\"> : cette arnaque au faux ordre de virement bancaire vise \u00e0 pousser la victime \u00e0 r\u00e9aliser un virement non planifi\u00e9.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/trustpair.fr\/blog\/fraude-au-faux-fournisseur-menace-entreprise\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">La fraude au faux fournisseur<\/span><\/a><span style=\"font-weight: 400;\"> : cette technique consiste <\/span><span style=\"font-weight: 400;\">\u00e0 usurper l\u2019identit\u00e9 d\u2019un fournisseur et \u00e0 contacter une entreprise cliente en pr\u00e9tendant un changement de coordonn\u00e9es bancaires.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">La fraude documentaire : il s\u2019agit d\u2019un terme g\u00e9n\u00e9rique qui recouvre <\/span><span style=\"font-weight: 400;\">plusieurs techniques diff\u00e9rentes, comme la contrefa\u00e7on, la <a href=\"https:\/\/trustpair.fr\/blog\/falsification-de-documents-une-pratique-adoptee-par-les-fraudeurs\/\">falsification de documents<\/a>, l\u2019usurpation d&rsquo;identit\u00e9, etc.\u00a0<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Les cons\u00e9quences de l&rsquo;usurpation d&rsquo;identit\u00e9 bancaire\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Elles sont multiples, tant pour l\u2019entreprise que pour le fournisseur.\u00a0\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Pour l\u2019entreprise :\u00a0<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">La d\u00e9fense contre les fausses demande est souvent co\u00fbteuse et fastidieuse ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Les \u00e9quipes qui contr\u00f4lent l\u2019identit\u00e9 des tiers font face \u00e0 une perte de temps et d&rsquo;\u00e9nergie ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">La fraude \u00e0 l&rsquo;identit\u00e9 menace la r\u00e9putation de l&rsquo;entreprise ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Les cons\u00e9quences juridiques sont potentiellement lourdes.\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Pour les fournisseurs\u00a0<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Il est possible d\u2019\u00eatre sanctionn\u00e9 par une mesure d&rsquo;interdiction bancaire et d\u2019\u00eatre fich\u00e9 au FCC (Fichier central des ch\u00e8ques) ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">L\u2019effet r\u00e9seau s\u2019enclenche, c\u2019est-\u00e0-dire que la fraude se propage et atteint l&rsquo;ensemble des clients du fournisseur.\u00a0<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Que faire en cas d&rsquo;usurpation d&rsquo;identit\u00e9 bancaire av\u00e9r\u00e9e ?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">En premier lieu, il est important de pr\u00e9venir tous les \u00e9tablissement financiers dont vous \u00eates client. Ensuite, il convient de v\u00e9rifier dans le <\/span><a href=\"https:\/\/www.service-public.fr\/particuliers\/vosdroits\/F2233\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">FICOBA<\/span><\/a><span style=\"font-weight: 400;\"> (Fichier des comptes bancaires) si des comptes ont \u00e9t\u00e9 ouverts \u00e0 votre nom par l&rsquo;usurpateur. Enfin, si la fraude est av\u00e9r\u00e9e, il est important de d\u00e9poser une plainte pour enclencher d\u2019\u00e9ventuelles poursuites judiciaires.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Comment s&rsquo;assurer de ne pas \u00eatre victime d&rsquo;usurpation d&rsquo;identit\u00e9 bancaire ?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Des mesures peuvent \u00eatre mises en place pour r\u00e9duire (et pr\u00e9venir) le risque d&rsquo;usurpation d&rsquo;identit\u00e9 bancaire. Les trois conseils suivants doivent ainsi \u00eatre appliqu\u00e9s en tout temps :\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prot\u00e9gez vos informations personnelles ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assurez la cybers\u00e9curit\u00e9 de vos syst\u00e8mes ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contr\u00f4lez l&rsquo;acc\u00e8s \u00e0 vos comptes.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Pour \u00eatre s\u00fbre de toujours traiter avec le bon fournisseur, et de le r\u00e9gler sur le bon compte bancaire, la Direction financi\u00e8re doit imp\u00e9rativement <a href=\"https:\/\/trustpair.com\/fr\/blog\/verification-compte-bancaire-tiers-letape-cle-pour-lutter-contre-la-fraude\/\">contr\u00f4ler les coordonn\u00e9es bancaires de tous ses tiers<\/a>. Comment ? Voici quelques conseils suppl\u00e9mentaires :\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Effectuez des contr\u00f4les syst\u00e9matiques et r\u00e9guliers ;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Renforcez la s\u00e9curit\u00e9 des processus ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ne payez jamais en urgence, m\u00eame sous la menace ou la pression ;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Abandonnez les v\u00e9rifications manuelles, trop faillibles ;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cartographiez les risques et sensibilisez les \u00e9quipes aux risques de fraude, via des formations r\u00e9guli\u00e8res.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Enfin, privil\u00e9giez l\u2019automatisation des processus de contr\u00f4le et la fiabilisation en temps r\u00e9el des donn\u00e9es tiers, en faisant appel notamment \u00e0 une solution de s\u00e9curisation des paiements telle que <\/span><a href=\"https:\/\/trustpair.fr\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Trustpair<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-cdcede09-afbd-460d-8a89-428c76842967\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-cdcede09-afbd-460d-8a89-428c76842967\" class=\"hs-cta-node hs-cta-cdcede09-afbd-460d-8a89-428c76842967\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/cdcede09-afbd-460d-8a89-428c76842967\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" id=\"hs-cta-img-cdcede09-afbd-460d-8a89-428c76842967\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/cdcede09-afbd-460d-8a89-428c76842967.png\" alt=\"S\u00e9curisez vos processus de paiement avec Trustpair\" width=\"900\" height=\"305\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'cdcede09-afbd-460d-8a89-428c76842967', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<hr \/>\n<h3>POINT \u00c0 RETENIR :<\/h3>\n<ul>\n<li>L&rsquo;usurpation d&rsquo;identit\u00e9 est d\u00e9finie comme le fait d&rsquo;utiliser le nom d&rsquo;un tiers en vue de commettre des actes portant atteinte \u00e0 son honneur.<\/li>\n<li>L&rsquo;objectif est d&rsquo;extorquer des fonds et d&rsquo;obtenir un virement sur le compte du fraudeur.<\/li>\n<li>Plusieurs m\u00e9thodes existent pour usurper l&rsquo;identit\u00e9 bancaire d&rsquo;un tiers : phishing, spoofing, FOVI, fraude au faux fournisseur, fraude documentaire.<\/li>\n<li>La fraude \u00e0 l&rsquo;identit\u00e9 bancaire a plusieurs cons\u00e9quences : perte de temps, d&rsquo;\u00e9nergie, d&rsquo;argent, r\u00e9putation de l&rsquo;entreprise menac\u00e9, cons\u00e9quence juridique lourde, &#8230;<\/li>\n<li>Il est important de se prot\u00e9ger contre l&rsquo;usurpation d&rsquo;identit\u00e9 bancaire !<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Ann\u00e9es apr\u00e8s ann\u00e9es, le risque de fraude continue de peser lourdement sur les entreprises.\u00a0 En 2021, 2 entreprises sur 3 ont subi au moins une fraude. L\u2019usurpation d\u2019identit\u00e9 est la technique privil\u00e9gi\u00e9e par les fraudeurs, la fraude au faux pr\u00e9sident \u00e9tant la plus subie par les entreprises (+9 points par rapport au Barom\u00e8tre Fraude et [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-7757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraude-virement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Usurpation d&#039;identit\u00e9 bancaire : comment s&#039;en prot\u00e9ger ? - Trustpair<\/title>\n<meta name=\"description\" content=\"L\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019un tiers. Lire plus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Usurpation d&#039;identit\u00e9 bancaire : comment s&#039;en prot\u00e9ger ? - Trustpair\" \/>\n<meta property=\"og:description\" content=\"L\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019un tiers. Lire plus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T14:17:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-26T16:56:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Usurpation d&rsquo;identit\u00e9 bancaire : comment s&rsquo;en prot\u00e9ger ?\",\"datePublished\":\"2024-08-02T14:17:55+00:00\",\"dateModified\":\"2024-12-26T16:56:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\"},\"wordCount\":1036,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png\",\"articleSection\":[\"Fraude au virement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\",\"url\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\",\"name\":\"Usurpation d'identit\u00e9 bancaire : comment s'en prot\u00e9ger ? - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png\",\"datePublished\":\"2024-08-02T14:17:55+00:00\",\"dateModified\":\"2024-12-26T16:56:59+00:00\",\"description\":\"L\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019un tiers. Lire plus.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Usurpation d&#8217;identit\u00e9 bancaire : comment s&#8217;en prot\u00e9ger ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/fr\/#website\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"name\":\"Trustpair\",\"description\":\"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Usurpation d'identit\u00e9 bancaire : comment s'en prot\u00e9ger ? - Trustpair","description":"L\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019un tiers. Lire plus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/","og_locale":"fr_FR","og_type":"article","og_title":"Usurpation d'identit\u00e9 bancaire : comment s'en prot\u00e9ger ? - Trustpair","og_description":"L\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019un tiers. Lire plus.","og_url":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T14:17:55+00:00","article_modified_time":"2024-12-26T16:56:59+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png","type":"image\/png"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"trustpair_2438","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Usurpation d&rsquo;identit\u00e9 bancaire : comment s&rsquo;en prot\u00e9ger ?","datePublished":"2024-08-02T14:17:55+00:00","dateModified":"2024-12-26T16:56:59+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/"},"wordCount":1036,"commentCount":0,"publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png","articleSection":["Fraude au virement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/","url":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/","name":"Usurpation d'identit\u00e9 bancaire : comment s'en prot\u00e9ger ? - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png","datePublished":"2024-08-02T14:17:55+00:00","dateModified":"2024-12-26T16:56:59+00:00","description":"L\u2019usurpation d\u2019identit\u00e9 bancaire consiste \u00e0 utiliser \u00e0 son insu l\u2019identit\u00e9 et les donn\u00e9es personnelles d\u2019un tiers. Lire plus.","breadcrumb":{"@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/usurpation-id-bancaire-blog.png","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Usurpation d&#8217;identit\u00e9 bancaire : comment s&#8217;en prot\u00e9ger ?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/fr\/#website","url":"https:\/\/trustpair.com\/fr\/","name":"Trustpair","description":"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs","publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/fr\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/comments?post=7757"}],"version-history":[{"count":1,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7757\/revisions"}],"predecessor-version":[{"id":14404,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7757\/revisions\/14404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media\/7758"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media?parent=7757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/categories?post=7757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/tags?post=7757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}