{"id":354,"date":"2022-10-24T21:50:00","date_gmt":"2022-10-24T21:50:00","guid":{"rendered":"https:\/\/quasimodo.ca\/?p=354"},"modified":"2022-10-27T14:11:35","modified_gmt":"2022-10-27T14:11:35","slug":"piratage-en-entreprise","status":"publish","type":"post","link":"https:\/\/quasimodo.ca\/en\/piratage-en-entreprise\/","title":{"rendered":"Hacking : Are you at risk?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"354\" class=\"elementor elementor-354\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6fda5858 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6fda5858\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70afcc7f\" data-id=\"70afcc7f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97db3e4 elementor-widget elementor-widget-heading\" data-id=\"97db3e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to avoid the traps!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-155c7215 elementor-widget elementor-widget-text-editor\" data-id=\"155c7215\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the increase of teleworking, the risk of being cyber-attacked is high.<\/p>\n<p>A lot of Small and Medium Businesses had to develop solutions to let people telework at the beginning of the pandemy. Lot of them were not prepared to it and made choices that may have impact on the security of their systems.<\/p>\n<p>People are less and less interacting each other with the distance. There are more online and email conversations that will increase the risk too. Being hacked can have big consequences to your data and may interrupt your activities for a while.<\/p>\n<p>There are multiple threats and faults can come from softwares or humans. That is why we want to explain you, what are the different kind of threats to auto-evaluate your vulnerability.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-349bbd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"349bbd7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-543b6e1\" data-id=\"543b6e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13a9c4e elementor-widget elementor-widget-heading\" data-id=\"13a9c4e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The different risks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a21eb1c elementor-widget elementor-widget-text-editor\" data-id=\"a21eb1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWorld has change and the time when virus were just decreasing the performance of your PC! Nowadays, there are multiple kinds of threat and the consequences are more important. Some of them don't even require any computing or development skill. Let's have an overview of some of them and how you can prevent them.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeb83a5 elementor-widget elementor-widget-heading\" data-id=\"aeb83a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-122e2c4 elementor-widget elementor-widget-text-editor\" data-id=\"122e2c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The phishing is a practice in which the hacker try to usurp an identity of someone in the company or any other people that may have some authority. This way, he will try to ask for some secret information (passwords) or any urgent payment for a supplier, taxes, etc. It is part of the social hacking which requires no particular skill in computing or development and work on persuasion.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d9842b elementor-widget elementor-widget-heading\" data-id=\"3d9842b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How does it look like?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2826186 elementor-widget elementor-widget-text-editor\" data-id=\"2826186\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\"><strong>Through emails<\/strong>: the email is one of the best canal, it looks like it has been sent from one of your colleague or any institution (bank, energy company, web provider, web platforms, etc.) but in reality it comes from another account ready to get a quick response.<\/p>\n<p>It usually explains you that you have some issues with your account or have to proceed to a password renewal or do a quick payment to avoid penalties. In reality It will try to scary you so you will click on the link attached or answer by email to the sender directly.<\/p>\n<p>Ouvrir un courriel est rarement dangereux. Ce sont les liens web et les pi\u00e8ces jointes attach\u00e9es qui le sont. Aussi dans le cadre du hame\u00e7onnage, les courriels vous invite sous un certain pr\u00e9texte \u00e0 venir mettre \u00e0 jour des informations confidentielles (carte bancaire, mots de passe, etc.) en vous proposant un lien directement dans le courriel pour venir vous authentifier.<\/p>\n<p>This link or the sender is a fake. Sometimes it will looks like the real website of the company\/institution but in reality it is just a copy. Their only purpose is to make you login or complete a payment or a form with secret information like credentials. This way they can take controle of an account or credit card information.<\/p>\n<p>This method can be also used by phone, online discussions, etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7760b5 elementor-widget elementor-widget-heading\" data-id=\"c7760b5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to avoid it<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f654a6 elementor-widget elementor-widget-text-editor\" data-id=\"4f654a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You can use these 2 rules :<\/p>\n<p>You have to make your colleagues and employees aware of the risk. Specially person that are not used to using a computer or internet. They should never answer to any unusual situation or exceptional situations by email. Like an email from the boss asking to pay a supplier quickly for example.<\/p>\n<p>If they have a doubt, they should identify the sender. If they know the person, always try to make a call or contact directly the company or the institution for confirmations.<\/p>\n<p>If there is any link and you have a doubt, always connect to the official website by a web browser instead of clicking on the link sent by email.<\/p>\n<p>There are some things to know if you want to verify if the email is a phishing but ther are not always visibile :<\/p>\n<ul>\n<li>- First tip : The wording or the grammar is not good. It usually comes from hackers living in another country.<\/li>\n<li>The graphic design can look a bit different from original logo, original email template or real website.<\/li>\n<li>One last tip is the domain used in the sender email or in any url link. Sometimes you can identify a phishing attempt because the sender email address is not the real one or the link redirect you to a website with a different URL than the real one.\n\nExample : you have to pay a UPS invoice but the email redirect you to a website with the URL www.ups-forms1.com. This is a fake one because the domain of UPS website is : www.ups.com and not www.ups-forms1.com.<\/li>\n<\/ul>\n<p>Be careful, malicious attacks can be more subtile. It is just some clues that will help you to detect threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffc4f86 elementor-widget elementor-widget-image\" data-id=\"ffc4f86\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"417\" src=\"https:\/\/quasimodo.ca\/wp-content\/uploads\/2021\/02\/fake-domain-768x417-1.png\" class=\"attachment-large size-large wp-image-5452\" alt=\"\" srcset=\"https:\/\/quasimodo.ca\/wp-content\/uploads\/2021\/02\/fake-domain-768x417-1.png 768w, https:\/\/quasimodo.ca\/wp-content\/uploads\/2021\/02\/fake-domain-768x417-1-300x163.png 300w, https:\/\/quasimodo.ca\/wp-content\/uploads\/2021\/02\/fake-domain-768x417-1-18x10.png 18w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e03d623 elementor-widget elementor-widget-text-editor\" data-id=\"e03d623\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here above, some example including different points :<\/p>\n<ul>\n<li>The email is asking for confidential data.<\/li>\n<li>The email is mispelled and the logo\/company name do not fit with the original design.<\/li>\n<li>Web domain of the sender is not the real one.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cb84dc elementor-widget elementor-widget-heading\" data-id=\"3cb84dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Ransonware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a89cc1 elementor-widget elementor-widget-text-editor\" data-id=\"0a89cc1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ransonware is an encryption tool. It alters documents and makes them unreadable without the decryption key.<\/p>\n<p>Imagine having database locked or different folders of file. It can have significant impact on your business and without a backup, you can lose everything.<\/p>\n<p>The ransonware can be triggered manually if someone get into your system but it can also be executed from another software like a malicious email attachment.<\/p>\n<p>It will instantly encrypt most of your programs in your system or your network.<\/p>\n<p>They usually send you an email and ask for money in order to restaure your documents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01a2eaf elementor-widget elementor-widget-heading\" data-id=\"01a2eaf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Virus, Trojan and other malwares<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37bfc6b elementor-widget elementor-widget-text-editor\" data-id=\"37bfc6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Those threats are usually managed by most of the antivirus softwares but they can also gather information or tracking your activities in order to get crucial information (password, etc.).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b155837 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b155837\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27d0052\" data-id=\"27d0052\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0719e72 elementor-widget elementor-widget-heading\" data-id=\"0719e72\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Good practices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e9b8b2 elementor-widget elementor-widget-heading\" data-id=\"8e9b8b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Sensibilize your team about the risk of social hacking and phishing.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6062b0 elementor-widget elementor-widget-text-editor\" data-id=\"a6062b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As we explained previously, it is very important to understand how people can get critic information just with social hacking and phishing. People should always be aware and able to detect uncommon or suspicious email before opening it.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f49ad6 elementor-widget elementor-widget-heading\" data-id=\"0f49ad6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Save your data!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf5f68f elementor-widget elementor-widget-text-editor\" data-id=\"cf5f68f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans un monde 100% informatis\u00e9 les donn\u00e9es ont trop de valeur pour qu&#8217;elles soient n\u00e9glig\u00e9es. La perte de ces donn\u00e9es seraient pourrait jusqu&#8217;\u00e0 mettre en p\u00e9ril votre entreprise.<\/p>\n<p>You must set up a data recovery plan. Here some advices :<\/p>\n<ul>\n<li>One save is not enough, store multiple saves on different disks, storage options.<\/li>\n<li>Have one save located in another place in case of massive hack or any incident (fire, flood, etc.).<\/li>\n<li>Monitor your saves and make sure the service is always running. Test it regularly.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfe095e elementor-widget elementor-widget-heading\" data-id=\"bfe095e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Make sure your network and your equipments are secure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-509d9e2 elementor-widget elementor-widget-text-editor\" data-id=\"509d9e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Firewall;<\/li>\n<li>Antispam;<\/li>\n<li>Anti-virus;<\/li>\n<li>Up-to-date operating system<\/li>\n<\/ul>\n<p>Autant d&#8217;outils cl\u00e9 pour prot\u00e9ger les ordinateurs personnels.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba1561c elementor-widget elementor-widget-heading\" data-id=\"ba1561c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Securize your server access and your passwords.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3323906 elementor-widget elementor-widget-text-editor\" data-id=\"3323906\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tProt\u00e9gez votre serveur et les acc\u00e8s administrateur de vos sites web publiques en limitant l&#8217;acc\u00e8s \u00e0 certaines adresses IP seulement ou via un VPN.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5666fe6 elementor-widget elementor-widget-heading\" data-id=\"5666fe6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. Make sure your passwords didn't leak.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7008a8e elementor-widget elementor-widget-text-editor\" data-id=\"7008a8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A lot of users use their professionnal accounts in web sites.<\/p>\n<p>When those websites are attacked, some confidential data are leaked, including the passwords and the email addresses.<\/p>\n<p>If people usually use the same password, it can help the hackers to get into your system or hack the email.<\/p>\n<p>Some websites exist to verify if your email and password combination has been leaked like www.haveibeenpwned.com. <a href=\"http:\/\/www.haveibeenpwned.com\"><strong>www.haveibeenpwned.com<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6c1e65 elementor-widget elementor-widget-heading\" data-id=\"e6c1e65\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6. Never open suspicious attachment or link in your emails.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df39192 elementor-widget elementor-widget-text-editor\" data-id=\"df39192\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A little reminder of what a suspicious email is :<\/p>\n<ul>\n<li>Anything asking your to change confidential data or make a payment in urgent situation.<\/li>\n<li>Sender email address has a weird webdomain (information after the @ symbol).\n\nex : you get an email from Bell but the sender is : george@bell-canada-provider.com\n (Which is not the exact webdomain of bell.ca)<\/li>\n<li>The design and logo don't look like the original design of the company.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-867f2a7 elementor-widget elementor-widget-heading\" data-id=\"867f2a7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7. Test your staff and your systems.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f8d91f elementor-widget elementor-widget-text-editor\" data-id=\"8f8d91f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Des compagnies proposent des services afin de r\u00e9aliser un stress-test de votre infrastructure, s&#8217;assurer que votre personnel est \u00e9duqu\u00e9 et vigilant aux pi\u00e8ges et la protection des donn\u00e9es sensibles.<\/p>\n<p>Ces derniers\u00a0 simuleront des attaques dans votre quotidien sur une p\u00e9riode donn\u00e9e et vous fourniront des pistes d&#8217;am\u00e9lioration pour s\u00e9curiser votre syst\u00e8me ou sensibiliser vos collaborateurs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Comment \u00e9viter de se faire prendre au pi\u00e8ge La p\u00e9riode actuelle est propice aux cyber-attaques. En effet, de nombreuses PME ont d\u00e9velopp\u00e9 en quelques semaines seulement des moyens pour permettre le travail \u00e0 distance et le t\u00e9l\u00e9travail parfois au d\u00e9triment de la s\u00e9curit\u00e9 de leur syst\u00e8me informatique. La baisse d\u2019interactions entre coll\u00e8gues et la multiplication &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/quasimodo.ca\/en\/piratage-en-entreprise\/\"> <span class=\"screen-reader-text\">Hacking : Are you at risk?<\/span> Read More &raquo;<\/a><\/p>","protected":false},"author":2,"featured_media":5493,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[31],"tags":[],"class_list":["post-354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/posts\/354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":69,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/posts\/354\/revisions"}],"predecessor-version":[{"id":5494,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/posts\/354\/revisions\/5494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/media\/5493"}],"wp:attachment":[{"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/media?parent=354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/categories?post=354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quasimodo.ca\/en\/wp-json\/wp\/v2\/tags?post=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}