{"id":856,"date":"2022-03-18T14:21:45","date_gmt":"2022-03-18T18:21:45","guid":{"rendered":"https:\/\/ekom.ca\/?p=856"},"modified":"2022-03-22T17:35:39","modified_gmt":"2022-03-22T21:35:39","slug":"cybersecurite","status":"publish","type":"post","link":"https:\/\/ekom.ca\/fr\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; fullwidth=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_fullwidth_post_title author=\u00a0\u00bboff\u00a0\u00bb comments=\u00a0\u00bboff\u00a0\u00bb featured_placement=\u00a0\u00bbbackground\u00a0\u00bb text_color=\u00a0\u00bblight\u00a0\u00bb _builder_version=\u00a0\u00bb4.14.9&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bbrgba(0,0,0,0.13)\u00a0\u00bb background_color_gradient_end=\u00a0\u00bbrgba(0,0,0,0.49)\u00a0\u00bb background_color_gradient_overlays_image=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Avez-vous d\u00e9j\u00e0 eu peur de vous faire pirater votre site web, vos donn\u00e9es, votre compte instagram\u00a0? Dans cet article, on va voir l&rsquo;importance de la cybers\u00e9curit\u00e9 pour son entreprise en ces temps d&rsquo;attaque de hackers russes. On va aussi vous donner quelques conseils pour vous prot\u00e9ger.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; specialty=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; specialty_columns=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.15&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_row_inner _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column_inner saved_specialty_column_type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2>La cybers\u00e9curit\u00e9 explication<\/h2>\n<p>La cybers\u00e9curit\u00e9 c\u2019est l\u2019ensemble des moyens pour lutter contre les dangers du web qui peuvent \u00eatre caus\u00e9s soit par des attaques de cybercriminels ou relever d\u2019un manque d\u2019entretiens de vos syst\u00e8mes informatiques.Les r\u00e9seaux informatiques font continuellement circuler des informations, il est important de les ma\u00eetriser ainsi que de filtrer leurs flux qui peuvent dissimuler des programmes informatiques malveillants et qui peuvent s\u2019introduire dans les r\u00e9seaux.<\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.15&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/hacker-g7a473b482_1280.jpg\u00a0\u00bb title_text=\u00a0\u00bbhacker-g7a473b482_1280&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/binary-ga79416b70_1920.jpg\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">L\u2019importance de la cybers\u00e9curit\u00e9<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.15.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.15.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbmargin:auto;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>La menace \u00e9volue, l\u2019\u00e8re de la connexion multiplie les risques. Si les machines sont au c\u0153ur de la cybers\u00e9curit\u00e9, le r\u00f4le de l\u2019humain est aussi essentiel. Il est donc n\u00e9cessaire de former ses co\u00e9quipiers.Il y a de plus en plus d\u2019attaques et de nombreux dommages mat\u00e9riels et virtuels. En effet, la mise hors fonction permanente d\u2019un syst\u00e8me informatique ou bien des rangitils qui volent les donn\u00e9es sensibles pour ensuite demander une ran\u00e7on sont un fl\u00e9au dans le domaine informatique. Il y a \u00e9galement l&rsquo;hame\u00e7onnage et le fishing qui posent de nombreux probl\u00e8mes.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/security-g08f6b4df6_1920.jpg\u00a0\u00bb alt=\u00a0\u00bbcybersecurity\u00a0\u00bb title_text=\u00a0\u00bbsecurity\u00a0\u00bb _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les attaques peuvent toucher l\u2019ensemble de la population aussi bien les donn\u00e9es professionnelles que personnelles. En effet, elles peuvent \u00eatre effectu\u00e9es sur de nombreux outils informatiques tels que des sites web, des plateformes de l\u2019intranet, le stockage et l\u2019informatique en nuage, mais aussi sur les r\u00e9seaux sociaux, les applications web, les appareils intelligents et connect\u00e9s ainsi que les plateformes et solutions de commerce \u00e9lectronique.\u00a0[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/binary-ga79416b70_1920.jpg\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">La menace des virus<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les virus\u00a0programmes ou codes malveillants, contagieux qui parasites un logiciel et ensuite parasites tout l\u2019ordinateur, ce qui cr\u00e9e un dysfonctionnement informatique.<\/p>\n<p>On peut retrouver diff\u00e9rents types de virus tels que\u00a0:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"text-decoration: underline;\"><strong>Ran\u00e7ongiciel <\/strong><span style=\"font-weight: 400;\">aussi appel\u00e9 <\/span><b>ransomware<\/b><\/span><span style=\"font-weight: 400;\"><span style=\"text-decoration: underline;\">,<\/span> est un logiciel qui bloque l\u2019acc\u00e8s \u00e0 l\u2019ordinateur ou \u00e0 des donn\u00e9es pour pouvoir demander une ran\u00e7on par la suite. Le propri\u00e9taire doit payer pour avoir acc\u00e8s au site et r\u00e9cup\u00e9rer ses donn\u00e9es.\u00a0<\/span><span style=\"font-weight: 400;\"><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"text-decoration: underline;\"><strong>Le cheval de Troie<\/strong><\/span><span style=\"font-weight: 400;\"> est un logiciel qui s\u2019installe sans que son utilisateur le remarque, il va servir de transporteur pour le virus, c\u2019est l\u00e0 d\u2019o\u00f9 vient son nom. C\u2019est une m\u00e9thode tr\u00e8s connue qui peut s\u2019attaquer \u00e0 de nombreuses choses comme vos codes de carte bancaire, vos donn\u00e9es sensibles ou encore peuvent servir pour lancer des attaques contre d&rsquo;autres appareils.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"text-decoration: underline;\"><strong>Le logiciel espion<\/strong><span style=\"font-weight: 400;\"> appel\u00e9 <\/span><b>spyware<\/b><\/span><span style=\"font-weight: 400;\">, est un logiciel malveillant qui s\u2019installe sans que l\u2019utilisateur en ait conscience, il est tr\u00e8s souvent utilis\u00e9 pour avoir acc\u00e8s \u00e0 des donn\u00e9es sensibles sur l\u2019environnement dans lesquels il s\u2019est install\u00e9.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"text-decoration: underline;\"><strong>Ver informatique<\/strong><\/span><span style=\"font-weight: 400;\">, il existe depuis longtemps et ont \u00e9t\u00e9 la cause de grands piratages informatiques. Ce logiciel ne cible pas une personne en particulier comme une entreprise, il peut \u00e9galement s\u2019introduire sur tous les ordinateurs \u00e0 sa port\u00e9e. Ce logiciel a pour but de se reproduire sur plusieurs ordinateurs via un r\u00e9seau informatique pour ensuite permettre \u00e0 d\u2019autres logiciels malveillants de s\u2019installer.\u00a0<\/span><span style=\"font-weight: 400;\"><\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/binary-ga79416b70_1920.jpg\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Se prot\u00e9ger\u00a0des cyberattaques<\/h2>\n<h2><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>La meilleure des solutions est de contacter un expert dans ce domaine, mais il existe de nombreuses autres solutions. Voici quelques conseils pour pr\u00e9venir les cybers attaques.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Penser \u00e0 faire vos mises \u00e0 jour.<\/li>\n<li>Installer un antivirus.<\/li>\n<li>N\u2019utilisez pas le m\u00eame mot de passe et mettez des mots de passe compliqu\u00e9s.<\/li>\n<li>\u00c9viter les sites web ill\u00e9gaux qui concentrent de nombreux virus.<\/li>\n<li>N\u2019ouvrez pas de messages suspects, car ils peuvent contenir des liens ou des pi\u00e8ces jointes frauduleuses.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/binary-ga79416b70_1920.jpg\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">La guerre au coeur des cyberattaques<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\"><\/h2>\n<p>\u00a0En ces temps de guerre, on peut d\u00e9j\u00e0 voir appara\u00eetre des cybers attaques et cela va s\u2019empirer avec le temps, cette guerre va \u00eatre une guerre informatique.<\/p>\n<p>R\u00e9cemment au Qu\u00e9bec, plusieurs entreprises ont \u00e9t\u00e9 attaqu\u00e9es par des virus, et cela a impact\u00e9 le travail des entreprises pendant plusieurs jours.\u00a0 L\u2019Aluminerie Alouette a par exemple \u00e9t\u00e9 victime de cyber attaque et a d\u00e9voil\u00e9 que l\u2019intrusion d\u2019un tiers non autoris\u00e9 est bien le responsable de la panne majeure de ses syst\u00e8mes informatiques. Cette entreprise n\u2019est pas un cas isol\u00e9 puisque l\u2019usine de pneus Bridgestone de Joliette a \u00e9galement \u00e9t\u00e9 la cible de cyber attaque. Plusieurs entreprises telles qu\u2019hydro Qu\u00e9bec et loto Qu\u00e9bec ont renforc\u00e9 le nombre de ressources d\u00e9di\u00e9es \u00e0 la cyber s\u00e9curit\u00e9 pour \u00e9viter que la Russie entre sur leurs r\u00e9seaux.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.15&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>La cybers\u00e9curit\u00e9 est maintenant plus importante que jamais, les cybers attaques vont conna\u00eetre une forte hausse en tr\u00e8s peu de temps. Vous devez prot\u00e9ger vos donn\u00e9es et prot\u00e9ger vos sites web. <a href=\"\/fr\/#contact\">Contactez- nous pour toute demande<\/a>\u00a0!<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avez-vous d\u00e9j\u00e0 eu peur de vous faire pirater votre site web, vos donn\u00e9es, votre compte instagram\u00a0? Dans cet article, on va voir l&rsquo;importance de la cybers\u00e9curit\u00e9 pour son entreprise en ces temps d&rsquo;attaque de hackers russes. On va aussi vous donner quelques conseils pour vous prot\u00e9ger.La cybers\u00e9curit\u00e9 explication La cybers\u00e9curit\u00e9 c\u2019est l\u2019ensemble des moyens pour [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":866,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[22],"tags":[],"class_list":["post-856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 - EKOM<\/title>\n<meta name=\"description\" content=\"Avez-vous d\u00e9j\u00e0 eu peur de vous faire pirater votre site web, vos donn\u00e9es, votre compte instagram\u00a0? Dans cet article, on va voir l&rsquo;importance de la cybers\u00e9curit\u00e9 pour son entreprise en ces temps d&rsquo;attaque de hackers russes. On va aus\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ekom.ca\/fr\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 - EKOM\" \/>\n<meta property=\"og:description\" content=\"Avez-vous d\u00e9j\u00e0 eu peur de vous faire pirater votre site web, vos donn\u00e9es, votre compte instagram\u00a0? Dans cet article, on va voir l&#039;importance de la cybers\u00e9curit\u00e9 pour son entreprise en ces temps d&#039;attaque de hackers russes. On va aussi vous donner quelques conseils pour vous prot\u00e9ger.La cybers\u00e9curit\u00e9 explication La cybers\u00e9curit\u00e9 c\u2019est l\u2019ensemble des moyens pour [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ekom.ca\/fr\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"EKOM\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-18T18:21:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-22T21:35:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"boutout\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"boutout\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/\",\"url\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/\",\"name\":\"Cybers\u00e9curit\u00e9 - EKOM\",\"isPartOf\":{\"@id\":\"https:\/\/ekom.ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg\",\"datePublished\":\"2022-03-18T18:21:45+00:00\",\"dateModified\":\"2022-03-22T21:35:39+00:00\",\"author\":{\"@id\":\"https:\/\/ekom.ca\/#\/schema\/person\/eb8f11d100fd481eb708cedda0396992\"},\"breadcrumb\":{\"@id\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ekom.ca\/fr\/cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/#primaryimage\",\"url\":\"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg\",\"contentUrl\":\"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ekom.ca\/fr\/cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ekom.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ekom.ca\/#website\",\"url\":\"https:\/\/ekom.ca\/\",\"name\":\"EKOM\",\"description\":\"Your custom cloud solution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ekom.ca\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ekom.ca\/#\/schema\/person\/eb8f11d100fd481eb708cedda0396992\",\"name\":\"boutout\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ekom.ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b5c2e2be3246736f17e6354cdc42d41?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b5c2e2be3246736f17e6354cdc42d41?s=96&d=mm&r=g\",\"caption\":\"boutout\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 - EKOM","description":"Avez-vous d\u00e9j\u00e0 eu peur de vous faire pirater votre site web, vos donn\u00e9es, votre compte instagram\u00a0? Dans cet article, on va voir l&rsquo;importance de la cybers\u00e9curit\u00e9 pour son entreprise en ces temps d&rsquo;attaque de hackers russes. On va aus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ekom.ca\/fr\/cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 - EKOM","og_description":"Avez-vous d\u00e9j\u00e0 eu peur de vous faire pirater votre site web, vos donn\u00e9es, votre compte instagram\u00a0? Dans cet article, on va voir l'importance de la cybers\u00e9curit\u00e9 pour son entreprise en ces temps d'attaque de hackers russes. On va aussi vous donner quelques conseils pour vous prot\u00e9ger.La cybers\u00e9curit\u00e9 explication La cybers\u00e9curit\u00e9 c\u2019est l\u2019ensemble des moyens pour [&hellip;]","og_url":"https:\/\/ekom.ca\/fr\/cybersecurite\/","og_site_name":"EKOM","article_published_time":"2022-03-18T18:21:45+00:00","article_modified_time":"2022-03-22T21:35:39+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg","type":"image\/jpeg"}],"author":"boutout","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"boutout","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ekom.ca\/fr\/cybersecurite\/","url":"https:\/\/ekom.ca\/fr\/cybersecurite\/","name":"Cybers\u00e9curit\u00e9 - EKOM","isPartOf":{"@id":"https:\/\/ekom.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ekom.ca\/fr\/cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/ekom.ca\/fr\/cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg","datePublished":"2022-03-18T18:21:45+00:00","dateModified":"2022-03-22T21:35:39+00:00","author":{"@id":"https:\/\/ekom.ca\/#\/schema\/person\/eb8f11d100fd481eb708cedda0396992"},"breadcrumb":{"@id":"https:\/\/ekom.ca\/fr\/cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ekom.ca\/fr\/cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ekom.ca\/fr\/cybersecurite\/#primaryimage","url":"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg","contentUrl":"https:\/\/ekom.ca\/wp-content\/uploads\/2022\/03\/cyber-g8f78a9d47_1920.jpg","width":1920,"height":1280,"caption":"cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/ekom.ca\/fr\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ekom.ca\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/ekom.ca\/#website","url":"https:\/\/ekom.ca\/","name":"EKOM","description":"Your custom cloud solution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ekom.ca\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/ekom.ca\/#\/schema\/person\/eb8f11d100fd481eb708cedda0396992","name":"boutout","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ekom.ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b5c2e2be3246736f17e6354cdc42d41?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b5c2e2be3246736f17e6354cdc42d41?s=96&d=mm&r=g","caption":"boutout"}}]}},"_links":{"self":[{"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/posts\/856"}],"collection":[{"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/comments?post=856"}],"version-history":[{"count":20,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/posts\/856\/revisions"}],"predecessor-version":[{"id":917,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/posts\/856\/revisions\/917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/media\/866"}],"wp:attachment":[{"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/media?parent=856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/categories?post=856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ekom.ca\/fr\/wp-json\/wp\/v2\/tags?post=856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}