{"id":63186,"date":"2019-03-18T12:30:30","date_gmt":"2019-03-18T16:30:30","guid":{"rendered":"https:\/\/isarta.com\/infos\/?p=63186"},"modified":"2019-03-18T15:07:00","modified_gmt":"2019-03-18T19:07:00","slug":"le-cout-moyen-des-cyberattaques-depasse-desormais-16-million-de-dollars","status":"publish","type":"post","link":"https:\/\/isarta.com\/infos\/le-cout-moyen-des-cyberattaques-depasse-desormais-16-million-de-dollars\/","title":{"rendered":"Le co\u00fbt moyen des cyberattaques d\u00e9passe d\u00e9sormais 1,6 million de dollars"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter  wp-image-63682\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/02\/freestocks-org-540554-unsplash-300x200.jpg\" alt=\"\" width=\"767\" height=\"511\" srcset=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/02\/freestocks-org-540554-unsplash-300x200.jpg 300w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/02\/freestocks-org-540554-unsplash-768x512.jpg 768w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/02\/freestocks-org-540554-unsplash-1024x683.jpg 1024w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/><\/p>\n<p><span style=\"font-size: 12px; color: #999999;\">15 mars 2019<\/span><\/p>\n<p><span style=\"font-size: 20px;\"><strong><span class=\"s2\" style=\"color: #000080;\"><span class=\"s1\">Simon Fontaine, pr\u00e9sident fondateur d\u2019<a style=\"color: #000080;\" href=\"http:\/\/www.ars-solutions.ca\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\">ARS<\/span><\/a>,\u00a0s\u2019int\u00e9resse dans sa chronique du jour au co\u00fbt, sans cesse plus \u00e9lev\u00e9, des cyberattaques et \u00e0 leurs causes, selon un rapport mondial publi\u00e9 r\u00e9cemment.<\/span><\/span><\/strong><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Les cyberattaques sont devenues plus co\u00fbteuses \u00e0 att\u00e9nuer et plus efficaces. Les impacts, tant au niveau des op\u00e9rations, de la productivit\u00e9 et de la confiance du public, deviennent de plus en plus importants \u00e0 pr\u00e9voir.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Le co\u00fbt moyen d\u2019une attaque serait plus pr\u00e9cis\u00e9ment de 1,67 million de dollars. La soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Radware a r\u00e9cemment publi\u00e9 un rapport intitul\u00e9 <a href=\"https:\/\/www.radware.com\/ert-report-2018\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\"><i>Global Application and Network Security Report<\/i> <i>2018-2019<\/i><\/span><\/a> qui met en lumi\u00e8re l&rsquo;impact majeur des cyberattaques sur les entreprises. Ces derni\u00e8res citent en premier lieu la perte op\u00e9rationnelle et de productivit\u00e9 (54 %) puis l&rsquo;exp\u00e9rience client n\u00e9gative (43 %).<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Pr\u00e8s de la moiti\u00e9 (45 %) des r\u00e9pondants ont signal\u00e9 que le but de ces attaques \u00e9tait tout b\u00eatement de perturber le service, tandis que seulement un tiers (35 %) a d\u00e9clar\u00e9 que l&rsquo;objectif \u00e9tait le vol de donn\u00e9es.<\/span><\/p>\n<h2><strong><span style=\"color: #000080; font-size: 20px;\">Peu de plan d&rsquo;intervention d&rsquo;urgence en place<\/span><\/strong><\/h2>\n<p class=\"p2\"><span class=\"s1\">Jeff Curley, responsable des services en ligne et num\u00e9rique pour le Royaume-Uni, l&rsquo;Irlande et les pays nordiques de Radware, donne d&rsquo;autres informations \u00e9galement en conclusions du rapport :<\/span><\/p>\n<blockquote>\n<p class=\"p2\"><span class=\"s1\" style=\"font-size: 16px;\">Nous assistons \u00e0 un r\u00e9el changement de l\u2019impact financier d\u2019une attaque sur une entreprise et de plus en plus d\u2019entreprises prennent le temps de calculer la perte et pas seulement de l\u2019estimer. Comprendre l&rsquo;impact des temps d&rsquo;arr\u00eat sur la productivit\u00e9 ainsi que sur la confiance des consommateurs est essentiel pour justifier les d\u00e9penses consacr\u00e9es \u00e0 la protection de l&rsquo;entreprise. \u00bb<\/span><\/p>\n<\/blockquote>\n<p class=\"p2\"><span class=\"s1\">Plus nombreuses, les cyberattaques sont \u00e9galement devenues plus efficaces : 78 % des personnes interrog\u00e9es ont \u00e9t\u00e9 touch\u00e9es par une attaque entra\u00eenant une d\u00e9gradation du service ou une panne totale, soit 10 % de plus que l\u2019an dernier.\u00a0<\/span><span class=\"s1\">Malgr\u00e9 l\u2019augmentation du nombre de cyberattaques, un tiers des entreprises sond\u00e9es n\u2019a pas mis en place de plan d\u2019intervention d\u2019urgence.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">La grande majorit\u00e9 des entreprises persiste \u00e0 croire que leur organisation est immunis\u00e9e face \u00e0 de telles menaces. C\u2019\u00e9tait peut-\u00eatre vrai il y a 10 ou 20 ans, mais plus aujourd\u2019hui. Il est tentant d\u2019ignorer tout ce qui entoure la cybers\u00e9curit\u00e9 et de remettre le dossier \u00e0 \u00ab plus tard \u00bb. Toutefois, consid\u00e9rant que 92 % des entreprises canadiennes ont subi au moins une cyberattaque au cours de la derni\u00e8re ann\u00e9e, vous devez \u00eatre en mesure de pr\u00e9venir les risques par la mise en place de m\u00e9canismes de protection.<\/span><\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.ars-solutions.ca\/lecoutmoyendescyberattaques\/\">SOURCE ORIGINALE<\/a><\/span><\/p>\n<div class=\"brdr2\"><\/div>\n<p><em>Vous avez aim\u00e9 cette publication?\u00a0<span style=\"color: #3366ff;\"><strong><a style=\"color: #3366ff;\" href=\"http:\/\/www.ars-solutions.ca\/blogue\/\" target=\"_blank\" rel=\"noopener\">Cliquez ici pour d\u2019autres articles de Simon Fontaine<\/a><\/strong><\/span><\/em><\/p>\n<div class=\"brdr2\"><\/div>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_63186\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/le-cout-moyen-des-cyberattaques-depasse-desormais-16-million-de-dollars\/\"  data-item_title=\"Le co\u00fbt moyen des cyberattaques d\u00e9passe d\u00e9sormais 1,6 million de dollars\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/02\/freestocks-org-540554-unsplash-1024x683.jpg\"  data-item_date=\"2019-03-18T12:30:30-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><\/p>\n<hr size=\"3\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Simon Fontaine, pr\u00e9sident fondateur d\u2019ARS,\u00a0s\u2019int\u00e9resse dans sa chronique du jour au co\u00fbt, sans cesse plus \u00e9lev\u00e9, des cyberattaques et \u00e0 leurs causes, selon un rapport mondial publi\u00e9 r\u00e9cemment.<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_63186\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/le-cout-moyen-des-cyberattaques-depasse-desormais-16-million-de-dollars\/\"  data-item_title=\"Le co\u00fbt moyen des cyberattaques d\u00e9passe d\u00e9sormais 1,6 million de dollars\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/02\/freestocks-org-540554-unsplash-1024x683.jpg\"  data-item_date=\"2019-03-18T12:30:30-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><hr size=\"3\"><\/div>","protected":false},"author":62,"featured_media":63682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[175,137,3],"tags":[],"_links":{"self":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/63186"}],"collection":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/comments?post=63186"}],"version-history":[{"count":3,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/63186\/revisions"}],"predecessor-version":[{"id":63683,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/63186\/revisions\/63683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media\/63682"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media?parent=63186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/categories?post=63186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/tags?post=63186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}