{"id":863,"date":"2023-06-27T13:50:04","date_gmt":"2023-06-27T11:50:04","guid":{"rendered":"https:\/\/www.antivirusedition.com\/blog\/?p=863"},"modified":"2023-06-27T13:50:33","modified_gmt":"2023-06-27T11:50:33","slug":"10-angles-morts-dans-votre-cyberdefense","status":"publish","type":"post","link":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html","title":{"rendered":"10 angles morts dans votre cyberd\u00e9fense"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">De nombreuses organisations ont du mal \u00e0 d\u00e9velopper la bonne strat\u00e9gie pour prot\u00e9ger leur entreprise et \u00e9galement mettre en place une d\u00e9fense cyber-r\u00e9siliente.<br><br>Qu&rsquo;est-ce que la cyber-r\u00e9silience ? Il s&rsquo;agit de la capacit\u00e9 d&rsquo;une organisation \u00e0 pr\u00e9venir, r\u00e9sister et se remettre des cyberattaques. La cyber-r\u00e9silience est essentielle pour les organisations modernes, car aucune entreprise, quelle que soit sa taille, n&rsquo;est \u00e0 l&rsquo;abri d&rsquo;une attaque.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Dans quelle mesure votre organisation est-elle cyber-r\u00e9siliente &#8211; serait-elle capable de survivre \u00e0 une attaque informatique de grande ampleur ?<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Syst\u00e8mes non patch\u00e9s<\/strong><br>57 % des violations de donn\u00e9es sont attribu\u00e9es \u00e0 une mauvaise gestion des correctifs. L&rsquo;application de correctifs de s\u00e9curit\u00e9 est essentielle pour emp\u00eacher les cybercriminels d&rsquo;exploiter des vuln\u00e9rabilit\u00e9s qui pourraient interrompre les op\u00e9rations.<br><\/li>\n\n\n\n<li><strong>Ne pas sauvegarder vos donn\u00e9es<\/strong><br>60 % des PME touch\u00e9es par des ransomwares font faillite dans les six mois suivant l\u2019attaque. Il est crucial de sauvegarder \u00e0 tout moment les donn\u00e9es critiques de son entreprise.<br><\/li>\n\n\n\n<li><strong>Mots de passe faibles<\/strong><br>19 % des entreprises utilisent des mots de passe faciles \u00e0 deviner ou partagent des mots de passe entre comptes. L&rsquo;utilisation de mots de passe forts est importante pour s\u00e9curiser les donn\u00e9es et les syst\u00e8mes de l&rsquo;entreprise.<br><\/li>\n\n\n\n<li><strong>Mauvais contr\u00f4le d&rsquo;acc\u00e8s<\/strong><br>Le contr\u00f4le d&rsquo;acc\u00e8s permet aux organisations de g\u00e9rer qui est autoris\u00e9 \u00e0 acc\u00e9der aux donn\u00e9es et aux ressources de l&rsquo;entreprise. La mise en place de ce processus \u00e9vite que vos donn\u00e9es ne tombent entre de mauvaises mains.<br><\/li>\n\n\n\n<li><strong>Manque de connaissances des employ\u00e9s<\/strong><br>30 % des PME sont la proie d&rsquo;e-mails de phishing chaque ann\u00e9e. Votre personnel est-il form\u00e9 pour rep\u00e9rer les activit\u00e9s suspectes qui pourraient aider \u00e0 \u00e9viter une escroquerie en ligne ou une violation de donn\u00e9es ?<br><\/li>\n\n\n\n<li><strong>Pas de plan de reprise apr\u00e8s sinistre<\/strong><br>Si une violation se produit, vous devez mettre en place un plan de reprise apr\u00e8s sinistre. Ce plan permet de s\u00e9curiser votre r\u00e9seau, d&rsquo;\u00e9viter d&rsquo;autres dommages, d&rsquo;identifier la source de la violation, etc.<br><\/li>\n\n\n\n<li><strong>Absence d&rsquo;antivirus<\/strong><br>Avoir un antivirus install\u00e9 (et le maintenir \u00e0 jour) est important pour bloquer les logiciels malveillants, les virus, les ran\u00e7ongiciels et autres cybermenaces.<br><\/li>\n\n\n\n<li><strong>R\u00e9seaux non s\u00e9curis\u00e9s<\/strong><br>Si vous avez un r\u00e9seau Wi-Fi, assurez-vous qu&rsquo;il est s\u00e9curis\u00e9. De plus, utilisez <a href=\"https:\/\/www.antivirusedition.com\/blog\/quest-ce-quun-vpn-65.html\">le r\u00e9seau priv\u00e9 virtuel (VPN)<\/a> pour que les travailleurs \u00e0 distance acc\u00e8dent \u00e0 votre r\u00e9seau en toute s\u00e9curit\u00e9.<br><\/li>\n\n\n\n<li><strong>BYOD (Bring Your Own Device) sans politique en place<\/strong><br>Pr\u00e8s de 95 % des entreprises autorisent d\u00e9sormais le BYOD sous une forme ou une autre. Il est essentiel que les entreprises aient une politique BYOD document\u00e9e qui se concentre sur les pr\u00e9cautions de s\u00e9curit\u00e9.<br><\/li>\n\n\n\n<li><strong>Pas d&rsquo;authentification multifacteur<\/strong><br>L&rsquo;authentification multifacteur (MFA) fournit des couches de s\u00e9curit\u00e9 suppl\u00e9mentaires en dehors des exigences de base en mati\u00e8re de nom d&rsquo;utilisateur et de mot de passe. Il est con\u00e7u pour valider l&rsquo;identit\u00e9 des utilisateurs essayant d&rsquo;acc\u00e9der \u00e0 un syst\u00e8me.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p class=\"qua-blog-post-description\">De nombreuses organisations ont du mal \u00e0 d\u00e9velopper la bonne strat\u00e9gie pour prot\u00e9ger leur entreprise et \u00e9galement mettre en place une d\u00e9fense cyber-r\u00e9siliente. Qu&rsquo;est-ce que la cyber-r\u00e9silience ? Il s&rsquo;agit de la capacit\u00e9 d&rsquo;une organisation \u00e0 pr\u00e9venir, r\u00e9sister et se remettre des cyberattaques. La cyber-r\u00e9silience est essentielle pour les organisations modernes, car aucune entreprise, quelle [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-863","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 angles morts dans votre cyberd\u00e9fense - Blog Avast Antivirus<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 angles morts dans votre cyberd\u00e9fense - Blog Avast Antivirus\" \/>\n<meta property=\"og:description\" content=\"De nombreuses organisations ont du mal \u00e0 d\u00e9velopper la bonne strat\u00e9gie pour prot\u00e9ger leur entreprise et \u00e9galement mettre en place une d\u00e9fense cyber-r\u00e9siliente. Qu&rsquo;est-ce que la cyber-r\u00e9silience ? Il s&rsquo;agit de la capacit\u00e9 d&rsquo;une organisation \u00e0 pr\u00e9venir, r\u00e9sister et se remettre des cyberattaques. La cyber-r\u00e9silience est essentielle pour les organisations modernes, car aucune entreprise, quelle [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html\" \/>\n<meta property=\"og:site_name\" content=\"Blog Avast Antivirus\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-27T11:50:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-27T11:50:33+00:00\" \/>\n<meta name=\"author\" content=\"La r\u00e9daction\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"La r\u00e9daction\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html\"},\"author\":{\"name\":\"La r\u00e9daction\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#\\\/schema\\\/person\\\/a54a4f38b10ec1a05165b83d04497ced\"},\"headline\":\"10 angles morts dans votre cyberd\u00e9fense\",\"datePublished\":\"2023-06-27T11:50:04+00:00\",\"dateModified\":\"2023-06-27T11:50:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html\"},\"wordCount\":529,\"commentCount\":0,\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html\",\"url\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html\",\"name\":\"10 angles morts dans votre cyberd\u00e9fense - Blog Avast Antivirus\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#website\"},\"datePublished\":\"2023-06-27T11:50:04+00:00\",\"dateModified\":\"2023-06-27T11:50:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#\\\/schema\\\/person\\\/a54a4f38b10ec1a05165b83d04497ced\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/10-angles-morts-dans-votre-cyberdefense-863.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 angles morts dans votre cyberd\u00e9fense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/\",\"name\":\"Blog Avast Antivirus\",\"description\":\"Un site utilisant WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/#\\\/schema\\\/person\\\/a54a4f38b10ec1a05165b83d04497ced\",\"name\":\"La r\u00e9daction\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g\",\"caption\":\"La r\u00e9daction\"},\"url\":\"https:\\\/\\\/preprod.antivirusedition.com\\\/blog\\\/author\\\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 angles morts dans votre cyberd\u00e9fense - Blog Avast Antivirus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html","og_locale":"fr_FR","og_type":"article","og_title":"10 angles morts dans votre cyberd\u00e9fense - Blog Avast Antivirus","og_description":"De nombreuses organisations ont du mal \u00e0 d\u00e9velopper la bonne strat\u00e9gie pour prot\u00e9ger leur entreprise et \u00e9galement mettre en place une d\u00e9fense cyber-r\u00e9siliente. Qu&rsquo;est-ce que la cyber-r\u00e9silience ? Il s&rsquo;agit de la capacit\u00e9 d&rsquo;une organisation \u00e0 pr\u00e9venir, r\u00e9sister et se remettre des cyberattaques. La cyber-r\u00e9silience est essentielle pour les organisations modernes, car aucune entreprise, quelle [&hellip;]","og_url":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html","og_site_name":"Blog Avast Antivirus","article_published_time":"2023-06-27T11:50:04+00:00","article_modified_time":"2023-06-27T11:50:33+00:00","author":"La r\u00e9daction","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"La r\u00e9daction","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html#article","isPartOf":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html"},"author":{"name":"La r\u00e9daction","@id":"https:\/\/preprod.antivirusedition.com\/blog\/#\/schema\/person\/a54a4f38b10ec1a05165b83d04497ced"},"headline":"10 angles morts dans votre cyberd\u00e9fense","datePublished":"2023-06-27T11:50:04+00:00","dateModified":"2023-06-27T11:50:33+00:00","mainEntityOfPage":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html"},"wordCount":529,"commentCount":0,"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html","url":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html","name":"10 angles morts dans votre cyberd\u00e9fense - Blog Avast Antivirus","isPartOf":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/#website"},"datePublished":"2023-06-27T11:50:04+00:00","dateModified":"2023-06-27T11:50:33+00:00","author":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/#\/schema\/person\/a54a4f38b10ec1a05165b83d04497ced"},"breadcrumb":{"@id":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/preprod.antivirusedition.com\/blog\/10-angles-morts-dans-votre-cyberdefense-863.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/preprod.antivirusedition.com\/blog"},{"@type":"ListItem","position":2,"name":"10 angles morts dans votre cyberd\u00e9fense"}]},{"@type":"WebSite","@id":"https:\/\/preprod.antivirusedition.com\/blog\/#website","url":"https:\/\/preprod.antivirusedition.com\/blog\/","name":"Blog Avast Antivirus","description":"Un site utilisant WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/preprod.antivirusedition.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/preprod.antivirusedition.com\/blog\/#\/schema\/person\/a54a4f38b10ec1a05165b83d04497ced","name":"La r\u00e9daction","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db4ae7312ab04e3a9d862cb5a1e54bb3df4eec1322e6c2faccd783bb8ed5cf3c?s=96&d=mm&r=g","caption":"La r\u00e9daction"},"url":"https:\/\/preprod.antivirusedition.com\/blog\/author\/admin"}]}},"_links":{"self":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts\/863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/comments?post=863"}],"version-history":[{"count":1,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts\/863\/revisions"}],"predecessor-version":[{"id":864,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/posts\/863\/revisions\/864"}],"wp:attachment":[{"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/media?parent=863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/categories?post=863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/preprod.antivirusedition.com\/blog\/wp-json\/wp\/v2\/tags?post=863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}