{"id":56572,"date":"2018-08-09T10:20:33","date_gmt":"2018-08-09T14:20:33","guid":{"rendered":"https:\/\/isarta.com\/infos\/?p=56572"},"modified":"2018-08-09T11:29:02","modified_gmt":"2018-08-09T15:29:02","slug":"60-des-pme-victimes-de-piratage-informatique-font-faillite-dans-les-six-mois","status":"publish","type":"post","link":"https:\/\/isarta.com\/infos\/60-des-pme-victimes-de-piratage-informatique-font-faillite-dans-les-six-mois\/","title":{"rendered":"60 % des PME victimes de piratage informatique font faillite dans les six mois"},"content":{"rendered":"<div id=\"attachment_57607\" style=\"width: 741px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-57607\" loading=\"lazy\" class=\" wp-image-57607\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/07\/matthew-henry-58760-unsplash-300x200.jpg\" alt=\"\" width=\"731\" height=\"487\" srcset=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/07\/matthew-henry-58760-unsplash-300x200.jpg 300w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/07\/matthew-henry-58760-unsplash-768x512.jpg 768w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/07\/matthew-henry-58760-unsplash-1024x683.jpg 1024w\" sizes=\"(max-width: 731px) 100vw, 731px\" \/><\/p>\n<p id=\"caption-attachment-57607\" class=\"wp-caption-text\"><span style=\"font-size: 10px;\">Source : Matthew Henry \/ Unsplash<\/span><\/p>\n<\/div>\n<p><span style=\"font-size: 12px; color: #999999;\">7 ao\u00fbt 2018<\/span><\/p>\n<p><span class=\"s2\" style=\"font-size: 20px; color: #000080;\"><span class=\"s1\">Plus de la moiti\u00e9 des cyberattaques surviennent dans les petites et moyennes entreprises.\u00a0<a href=\"http:\/\/www.ars-solutions.ca\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\">Notre expert Simon Fontaine<\/span><\/a> recense\u00a04 \u00e9tapes qui vous aideront \u00e0 vous prot\u00e9ger avant qu\u2019il ne soit trop tard.<\/span>\u00a0<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Si vous dirigez une PME, vous repr\u00e9sentez une cible directe pour les cybercriminels. Ces derni\u00e8res sont victimes de la majorit\u00e9 des br\u00e8ches de donn\u00e9es, car elles ont tendance \u00e0 :<\/span><\/p>\n<ul>\n<li class=\"p6\"><span class=\"s1\">Manquer de mesures de s\u00e9curit\u00e9 et de personnel qualifi\u00e9;<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Poss\u00e9der des renseignements pris\u00e9s par les cyber-escrocs (<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/isarta.com\/infos\/?p=54424\" target=\"_blank\" rel=\"noopener\">num\u00e9ros de carte de cr\u00e9dit, NAS<\/a><\/span>);<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">N\u00e9gliger d&rsquo;utiliser une source externe ou un service tiers pour sauvegarder leurs donn\u00e9es ou fichiers, les rendant vuln\u00e9rables aux ran\u00e7ongiciels.<\/span><\/li>\n<\/ul>\n<p class=\"p8\"><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.inc.com\/thomas-koulopoulos\/the-biggest-risk-to-your-business-cant-be-eliminated-heres-how-you-can-survive-i.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Selon un rapport bas\u00e9 sur un sondage aupr\u00e8s de 1 377 PDG de PME<\/span><\/a><\/span><span class=\"s1\">, 62 % des r\u00e9pondants ont d\u00e9clar\u00e9 que leur entreprise n&rsquo;avait pas <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/isarta.com\/infos\/?p=54422\" target=\"_blank\" rel=\"noopener\">de strat\u00e9gie en cybers\u00e9curit\u00e9 \u00e0 jour ou active<\/a><\/span>, ou aucune strat\u00e9gie du tout. Voil\u00e0 une probl\u00e9matique majeure, car les co\u00fbts associ\u00e9s \u00e0 une cyberattaque peuvent \u00eatre sufisamment \u00e9lev\u00e9s pour conduire une entreprise \u00e0 la faillite. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">S\u2019il s\u2019agit de votre cas, n\u2019attendez pas d\u2019agir avant qu\u2019il ne soit trop tard. Ces 4 \u00e9tapes vous aideront \u00e0 \u00e9laborer une <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/isarta.com\/infos\/?p=53254\" target=\"_blank\" rel=\"noopener\">strat\u00e9gie efficace en cybers\u00e9curit\u00e9 qui \u00e9loignera les cybercriminels de votre entreprise<\/a><\/span>.<\/span><\/p>\n<h2 class=\"p11\"><span class=\"s1\" style=\"color: #000080; font-size: 24px;\">1. D\u00e9terminez l&rsquo;importance qu&rsquo;a la cybers\u00e9curit\u00e9 dans votre entreprise<\/span><\/h2>\n<p class=\"p4\"><span class=\"s4\">R\u00e9unissez les <\/span><span class=\"s1\">membres de la haute direction. Ayez une id\u00e9e du niveau de s\u00e9curit\u00e9 que vous avez en place. <\/span><\/p>\n<p class=\"p8\"><span style=\"text-decoration: underline;\"><span class=\"s6\">Questions \u00e0 poser <\/span><\/span><span class=\"s1\"><span style=\"text-decoration: underline;\">:<\/span><\/span><\/p>\n<ul>\n<li class=\"p8\"><span class=\"s1\">Quelqu&rsquo;un est-il responsable de la cybers\u00e9curit\u00e9?<\/span><\/li>\n<li class=\"p8\"><span class=\"s1\">Quelles d\u00e9fenses avons-nous d\u00e9j\u00e0 en place?<\/span><\/li>\n<li class=\"p8\"><span class=\"s1\">Notre strat\u00e9gie est-elle compl\u00e8te?<\/span><\/li>\n<li class=\"p8\"><span class=\"s1\">Si non, pouvons-nous identifier nos points faibles?<\/span><\/li>\n<\/ul>\n<h2 class=\"p13\"><span class=\"s1\" style=\"color: #000080; font-size: 24px;\">2. Identifiez la personne cl\u00e9 qui sera responsable de la cybers\u00e9curit\u00e9<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">Engagez les dirigeants de l&rsquo;ensemble de l&rsquo;organisation &#8211; pas seulement ceux de l&rsquo;informatique. Incluez des personnes de diff\u00e9rents domaines, tels que les finances, les RH, le marketing et les op\u00e9rations. <\/span><\/p>\n<p class=\"p6\"><span style=\"text-decoration: underline;\"><span class=\"s6\">Question \u00e0 poser :<\/span><\/span><\/p>\n<ul>\n<li class=\"p6\"><span class=\"s1\">Comment pouvons-nous informer et accro\u00eetre la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 dans notre entreprise?<\/span><\/li>\n<\/ul>\n<h2 class=\"p13\"><span class=\"s1\" style=\"color: #000080; font-size: 24px;\">3. Prenez un inventaire de vos actifs, d\u00e9terminez leur valeur et priorisez vos actifs les plus critiques<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">Identifiez les actifs les plus importants dans votre entreprise, qu&rsquo;il s&rsquo;agisse de dossiers d&#8217;employ\u00e9s, de propri\u00e9t\u00e9 intellectuelle ou de donn\u00e9es clients. <\/span><\/p>\n<p class=\"p6\"><span style=\"text-decoration: underline;\"><span class=\"s6\">Questions \u00e0 poser <\/span><span class=\"s1\">:<\/span><\/span><\/p>\n<ul>\n<li class=\"p6\"><span class=\"s1\">Quels sont les atouts les plus importants que nous devons prot\u00e9ger?<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Donn\u00e9es clients?<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Propri\u00e9t\u00e9 intellectuelle?<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Dossiers d&#8217;employ\u00e9s? <\/span><\/li>\n<\/ul>\n<h2 class=\"p13\"><span class=\"s7\"><br \/>\n<\/span><span class=\"s1\" style=\"color: #000080; font-size: 24px;\">4. Faites-vous aider<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">D\u00e9velopper l\u2019expertise \u00e0 l\u2019interne n\u2019est pas recommand\u00e9. La cybers\u00e9curit\u00e9 est une sp\u00e9cialit\u00e9 en soi et requiert des outils sp\u00e9cialis\u00e9s. Faites-vous aider.<\/span><\/p>\n<p class=\"p18\"><span style=\"text-decoration: underline;\"><span class=\"s1\">Question \u00e0 poser :<\/span><\/span><\/p>\n<ul>\n<li class=\"p18\"><span class=\"s1\">Quel est le plan de l\u2019entreprise aujourd\u2019hui en mati\u00e8re de cybercriminalit\u00e9?<\/span><\/li>\n<\/ul>\n<p class=\"p6\"><span class=\"s1\">La meilleure d\u00e9fense est d\u2019avoir un plan d\u2019action clair et bien d\u00e9fini par tous les acteurs importants. Faites de la protection de vos donn\u00e9es une priorit\u00e9 au profit de vos employ\u00e9s, clients et de la sant\u00e9 \u00e0 long terme de votre entreprise.<\/span><\/p>\n<p class=\"p19\"><span class=\"s1\"><i>Sources\u00a0: National Cyber Security Alliance &amp; Inc.com<\/i><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.ars-solutions.ca\/2018\/06\/07\/60-des-pme-qui-se-font-pirater-cessent-leurs-activites-dans-les-six-mois\/\">SOURCE ORIGINALE<\/a><\/span><\/p>\n<div class=\"brdr2\"><\/div>\n<p><em>Vous avez aim\u00e9 cette publication?\u00a0<span style=\"color: #3366ff;\"><strong><a style=\"color: #3366ff;\" href=\"http:\/\/www.ars-solutions.ca\/blogue\/\" target=\"_blank\" rel=\"noopener\">Cliquez ici pour d\u2019autres articles de Simon Fontaine<\/a><\/strong><\/span><\/em><\/p>\n<div class=\"brdr2\"><\/div>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_56572\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/60-des-pme-victimes-de-piratage-informatique-font-faillite-dans-les-six-mois\/\"  data-item_title=\"60 % des PME victimes de piratage informatique font faillite dans les six mois\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/07\/matthew-henry-58760-unsplash-1024x683.jpg\"  data-item_date=\"2018-08-09T10:20:33-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><\/p>\n<hr size=\"3\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Plus de la moiti\u00e9 des cyberattaques surviennent dans les petites et moyennes entreprises.\u00a0Notre expert Simon Fontaine recense\u00a04 \u00e9tapes qui vous aideront \u00e0 vous prot\u00e9ger avant qu\u2019il ne soit trop tard.\u00a0<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_56572\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/60-des-pme-victimes-de-piratage-informatique-font-faillite-dans-les-six-mois\/\"  data-item_title=\"60 % des PME victimes de piratage informatique font faillite dans les six mois\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2018\/07\/matthew-henry-58760-unsplash-1024x683.jpg\"  data-item_date=\"2018-08-09T10:20:33-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><hr size=\"3\"><\/div>","protected":false},"author":62,"featured_media":57607,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[175,137,339,3],"tags":[1176],"_links":{"self":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/56572"}],"collection":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/comments?post=56572"}],"version-history":[{"count":3,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/56572\/revisions"}],"predecessor-version":[{"id":57608,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/56572\/revisions\/57608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media\/57607"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media?parent=56572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/categories?post=56572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/tags?post=56572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}