{"id":360,"date":"2026-05-02T10:17:27","date_gmt":"2026-05-02T10:17:27","guid":{"rendered":"https:\/\/poieo.tech\/?page_id=360"},"modified":"2026-05-02T22:10:39","modified_gmt":"2026-05-02T22:10:39","slug":"cybersecurite","status":"publish","type":"page","link":"https:\/\/poieo.tech\/index.php\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9 PME : prot\u00e9gez votre syst\u00e8me d\u2019information | Poieo"},"content":{"rendered":"\n[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbHeader\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttp:\/\/poieo.tech\/wp-content\/uploads\/2026\/05\/Poieo-02-2026-v4.jpg\u00a0\u00bb background_position=\u00a0\u00bbtop_center\u00a0\u00bb custom_padding=\u00a0\u00bb164px||26px||false|false\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][et_pb_row _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbbba05b2e-8f2d-47d8-99d2-75324b944645&Prime; header_text_color=\u00a0\u00bb#E0A348&Prime; header_font_size=\u00a0\u00bb50px\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb-163px||-10px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb1px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<h1>Cybers\u00e9curit\u00e9<\/h1>[\/et_pb_text][et_pb_text admin_label=\u00a0\u00bbTittle\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb8de03cee-3d3e-49cb-a573-24d9b6e8a5b2&Prime; text_font=\u00a0\u00bbOswald||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.3em\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_font=\u00a0\u00bbOswald|600||on|||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#0099A0&Prime; header_3_font=\u00a0\u00bb||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb30px||39px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|117px||117px|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]La cybers\u00e9curit\u00e9 n\u2019est plus un sujet r\u00e9serv\u00e9 aux grandes entreprises. PME, PMI, industriels, professions lib\u00e9rales et collectivit\u00e9s d\u00e9pendent chaque jour de leurs outils num\u00e9riques, de leurs donn\u00e9es, de leurs acc\u00e8s, de leurs logiciels m\u00e9tiers et de leurs prestataires.\n\nUne faille, un compte compromis, une sauvegarde absente ou une mauvaise configuration peuvent ralentir, d\u00e9sorganiser ou paralyser une activit\u00e9.  Poieo Technologie vous accompagne pour \u00e9valuer vos risques, s\u00e9curiser votre environnement informatique et construire une strat\u00e9gie cyber claire, coh\u00e9rente et pilot\u00e9e.[\/et_pb_text][et_pb_button button_url=\u00a0\u00bb#\u00a0\u00bb button_text=\u00a0\u00bbDemander un diagnostic informatique avec un DSI externalis\u00e9\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb7b7a0945-c081-4d77-a341-a3e0be77023d\u00a0\u00bb button_text_size=\u00a0\u00bb12px\u00a0\u00bb button_bg_color=\u00a0\u00bb#002E37&Prime; button_border_color=\u00a0\u00bb#002E37&Prime; custom_margin=\u00a0\u00bb1px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-b247d7e9-2bbc-48fc-81a8-3cd1da3da572%22:%91%22button_bg_color%22%93,%22gcid-cda4471f-892e-4743-849d-2cb3737a1499%22:%91%22button_bg_color__hover%22,%22button_border_color__hover%22,%22button_bg_color__hover%22,%22button_border_color__hover%22,%22button_bg_color__hover%22,%22button_border_color__hover%22,%22button_bg_color__hover%22,%22button_border_color__hover%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbAbout\u00a0\u00bb _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color_gradient_direction=\u00a0\u00bb90deg\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb admin_label=\u00a0\u00bbBest Beans Row\u00a0\u00bb module_class=\u00a0\u00bb et_pb_row_fullwidth\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bbnone\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb make_fullwidth=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttp:\/\/poieo.tech\/wp-content\/uploads\/2026\/05\/offre-cybersecurite-01.jpg\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#002E37&Prime; custom_padding=\u00a0\u00bb8%|8%|8%|8%|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb8de03cee-3d3e-49cb-a573-24d9b6e8a5b2&Prime; header_2_text_color=\u00a0\u00bb#E0A348&Prime; custom_margin=\u00a0\u00bb||10px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<h2>Dans beaucoup d\u2019organisations, la cybers\u00e9curit\u00e9 est trait\u00e9e par morceaux.<\/h2>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb98ba484a-bcd2-424e-8fc4-20216a2903c9&Prime; text_font=\u00a0\u00bbOswald|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#9D9D9C\u00a0\u00bb text_font_size=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<p>Dans beaucoup d\u2019organisations, la cybers\u00e9curit\u00e9 est trait\u00e9e par morceaux :<\/p>\n<ul>\n<li>Un antivirus install\u00e9.<\/li>\n<li>Des sauvegardes pr\u00e9vues.<\/li>\n<li>Des mots de passe plus ou moins suivis.<\/li>\n<li>Un prestataire appel\u00e9 en cas d\u2019urgence.<\/li>\n<li>Des acc\u00e8s rarement contr\u00f4l\u00e9s.<\/li>\n<li>Des \u00e9quipes peu sensibilis\u00e9es.<\/li>\n<\/ul>\n<p>Ce fonctionnement laisse des zones d\u2019ombre, o\u00f9 tout peut arriver&#8230;<\/p>\n<p>Poieo Technologie intervient pour structurer votre s\u00e9curit\u00e9 informatique dans son ensemble : postes, serveurs, acc\u00e8s, donn\u00e9es, sauvegardes, prestataires, usages internes et continuit\u00e9 d\u2019activit\u00e9.<\/p>\n<p>Objectif : r\u00e9duire les risques, prot\u00e9ger vos donn\u00e9es et garder votre activit\u00e9 op\u00e9rationnelle.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbVideo\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#002E37&Prime; custom_margin=\u00a0\u00bb0px|||||\u00a0\u00bb custom_padding=\u00a0\u00bb2px||4px|||\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbVideo Row\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb-2px|auto||auto||\u00a0\u00bb custom_padding=\u00a0\u00bb0px||7px|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbTittle\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb8de03cee-3d3e-49cb-a573-24d9b6e8a5b2&Prime; header_2_text_color=\u00a0\u00bb#E0A348&Prime; header_2_font_size=\u00a0\u00bb35px\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb17px||17px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb28px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<h2>La cybers\u00e9curit\u00e9 doit \u00eatre reli\u00e9e au pilotage global du syst\u00e8me d\u2019information<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbAbout\u00a0\u00bb _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color_gradient_direction=\u00a0\u00bb90deg\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb admin_label=\u00a0\u00bbBest Beans Row\u00a0\u00bb module_class=\u00a0\u00bb et_pb_row_fullwidth\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bbnone\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb make_fullwidth=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb8%|4%|8%|4%|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb8de03cee-3d3e-49cb-a573-24d9b6e8a5b2&Prime; header_2_text_color=\u00a0\u00bb#E0A348&Prime; custom_margin=\u00a0\u00bb-48px||10px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<h2>Les failles ne sont pas toujours techniques<\/h2>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb98ba484a-bcd2-424e-8fc4-20216a2903c9&Prime; text_font=\u00a0\u00bbOswald||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#002E37&Prime; text_font_size=\u00a0\u00bb17px\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<p>Une cyberattaque ne passe pas toujours par une faille visible. Elle passe souvent par un usage, un oubli, une mauvaise habitude ou une organisation insuffisamment cadr\u00e9e.<\/p>\n<p>Les risques fr\u00e9quents :<\/p>\n<ul>\n<li>Mots de passe faibles ou partag\u00e9s<\/li>\n<li>Acc\u00e8s non supprim\u00e9s apr\u00e8s un d\u00e9part<\/li>\n<li>Sauvegardes absentes ou non test\u00e9es<\/li>\n<li>Postes non mis \u00e0 jour<\/li>\n<li>Messagerie mal prot\u00e9g\u00e9e<\/li>\n<li>Prestataires sans cadre clair<\/li>\n<li>Donn\u00e9es sensibles mal stock\u00e9es<\/li>\n<li>Absence de plan de r\u00e9action en cas d\u2019incident<\/li>\n<li>\u00c9quipes peu form\u00e9es aux risques cyber<\/li>\n<li>Outils empil\u00e9s sans pilotage global<\/li>\n<\/ul>\n<p>La cybers\u00e9curit\u00e9 commence par une vision claire de votre syst\u00e8me d\u2019information, de vos usages et de vos points de fragilit\u00e9.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttp:\/\/poieo.tech\/wp-content\/uploads\/2026\/05\/offre-cybersecurite-02.jpg\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_divider show_divider=\u00a0\u00bboff\u00a0\u00bb _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb height_tablet=\u00a0\u00bb40vw\u00a0\u00bb height_phone=\u00a0\u00bb40vw\u00a0\u00bb height_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb23px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbVideo\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#002E37&Prime; custom_padding=\u00a0\u00bb6px||0px||false|false\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbVideo Row\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb915px\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbTittle\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb8de03cee-3d3e-49cb-a573-24d9b6e8a5b2&Prime; header_2_text_color=\u00a0\u00bb#E0A348&Prime; header_2_font_size=\u00a0\u00bb35px\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||10px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<h2>Poieo Technologie vous aide \u00e0 faire de la cybers\u00e9curit\u00e9 un sujet de pilotage, pas une r\u00e9action apr\u00e8s incident.<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbCall to Action\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_direction=\u00a0\u00bb90deg\u00a0\u00bb background_color_gradient_stops=\u00a0\u00bbrgba(255,255,255,0) 5mm|rgba(255,255,255,0.85) 99mm\u00a0\u00bb background_color_gradient_unit=\u00a0\u00bbmm\u00a0\u00bb background_color_gradient_overlays_image=\u00a0\u00bbon\u00a0\u00bb background_image=\u00a0\u00bbhttp:\/\/poieo.tech\/wp-content\/uploads\/2026\/05\/Poieo-mission.jpg\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb1vw||1vw||true|false\u00a0\u00bb background_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb use_background_color_gradient_tablet=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_type_tablet=\u00a0\u00bbcircular\u00a0\u00bb background_color_gradient_direction_radial_tablet=\u00a0\u00bbbottom left\u00a0\u00bb background_color_gradient_stops_tablet=\u00a0\u00bbrgba(255,255,255,0.8) 40%|rgba(255,255,255,0) 100%\u00a0\u00bb background_color_gradient_overlays_image_tablet=\u00a0\u00bbon\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; module_class=\u00a0\u00bb et_pb_row_fullwidth\u00a0\u00bb _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb make_fullwidth=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb8de03cee-3d3e-49cb-a573-24d9b6e8a5b2&Prime; header_2_text_color=\u00a0\u00bb#E0A348&Prime; custom_margin=\u00a0\u00bb||10px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<h2>Que faire pour renforcer sa cybers\u00e9curit\u00e9 ?<\/h2>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bb98ba484a-bcd2-424e-8fc4-20216a2903c9&Prime; text_font=\u00a0\u00bbOswald|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#002E37&Prime; text_font_size=\u00a0\u00bb17px\u00a0\u00bb custom_margin=\u00a0\u00bb||30px||false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Le premier r\u00e9flexe consiste \u00e0 r\u00e9aliser un diagnostic cyber. Il permet de conna\u00eetre les risques, de v\u00e9rifier les sauvegardes, de contr\u00f4ler les acc\u00e8s et de d\u00e9finir les actions \u00e0 traiter en priorit\u00e9.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Cybers\u00e9curit\u00e9La cybers\u00e9curit\u00e9 n\u2019est plus un sujet r\u00e9serv\u00e9 aux grandes entreprises. PME, PMI, industriels, professions lib\u00e9rales et collectivit\u00e9s d\u00e9pendent chaque jour de leurs outils num\u00e9riques, de leurs donn\u00e9es, de leurs acc\u00e8s, de leurs logiciels m\u00e9tiers et de leurs prestataires. Une faille, un compte compromis, une sauvegarde absente ou une mauvaise configuration peuvent ralentir, d\u00e9sorganiser ou paralyser [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-360","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/pages\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":14,"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/pages\/360\/revisions"}],"predecessor-version":[{"id":463,"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/pages\/360\/revisions\/463"}],"wp:attachment":[{"href":"https:\/\/poieo.tech\/index.php\/wp-json\/wp\/v2\/media?parent=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}