{"id":1224,"date":"2022-12-05T12:30:17","date_gmt":"2022-12-05T11:30:17","guid":{"rendered":"https:\/\/www.assurances-cyberattaque.com\/?p=1224"},"modified":"2023-01-09T15:27:41","modified_gmt":"2023-01-09T14:27:41","slug":"les-chiffres-utiles-a-connaitre-pour-se-premunir-des-cyberattaques","status":"publish","type":"post","link":"https:\/\/www.assurances-cyberattaque.com\/?p=1224","title":{"rendered":"Quelques chiffres \u00e0 conna\u00eetre pour contrer les cyberattaques"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>La <strong>cyber s\u00e9curit\u00e9<\/strong> est un sujet qui concerne tout le monde. Cependant les hackers et <strong>cybercriminels<\/strong> ont des cibles favorites, les <strong>P<\/strong>etites<strong>M<\/strong>oyennes<strong>E<\/strong>ntreprises qui sont les plus <strong>vuln\u00e9rables,<\/strong> car bien souvent elles ne poss\u00e8dent pas les moyens ou les connaissances n\u00e9cessaire pour faire face. Il existe toutefois des alternatives et quelques tendances<br \/>de cyber s\u00e9curit\u00e9 \u00e0 conna\u00eetre pour s&rsquo;en <strong>pr\u00e9munir.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#f1f1f1&Prime; custom_margin=\u00a0\u00bb50px|auto||auto||\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_text_color=\u00a0\u00bb#00364c\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2><strong>Une vuln\u00e9rabilit\u00e9 encore trop pr\u00e9sente.<\/strong><\/h2>\n<p>Comme nous le savons les PME font l&rsquo;objet d&rsquo;une cible parfaite pour les<strong> cybercriminels<\/strong>, mais les grandes institutions ne sont pas pour autant \u00e9pargn\u00e9s. D&rsquo;apr\u00e8s la parution d&rsquo;un article de l&rsquo;agence de presse <strong><a href=\"https:\/\/betanews.com\/\">BetaNews<\/a><\/strong> les hackers pourraient acc\u00e9der \u00e0 <strong>93 % des r\u00e9seaux d&rsquo;organisations<\/strong>. Pour appuyer cette information, <strong><a href=\"https:\/\/www.ptsecurity.com\/ww-en\/\">Positive Technologie<\/a><\/strong> soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans le d\u00e9veloppement de solutions de s\u00e9curit\u00e9 de l&rsquo;information a effectu\u00e9 des <strong>tests d&rsquo;intrusions<\/strong>, appel\u00e9s \u00ab\u00a0pentest\u00a0\u00bb dans plusieurs secteurs majeurs comme la finance, les organismes gouvernementaux, entreprises informatiques et bien d&rsquo;autres. Ces tests prouvent les dires de BetaNews en indiquant que <strong>93 % des cas les hackers per\u00e7aient les d\u00e9fenses du r\u00e9seau<\/strong> des victimes pour mettre la main sur le <strong>r\u00e9seau local<\/strong>. Apr\u00e8s coup, la mise en pause des activit\u00e9s de l&rsquo;entreprise repr\u00e9sente une majeure partie des <strong>dommages financiers subit<\/strong> par celle-ci.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_margin=\u00a0\u00bb0px|auto||auto|false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDes petites entreprises ne poss\u00e8dent pas d&rsquo;assurance cyberattaque, malgr\u00e9 le fait qu&rsquo;elles soient conscientes du risque qu&rsquo;elles ne puissent pas se remettre d&rsquo;une attaque.\u00a0\u00bb number=\u00a0\u00bb91&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb||||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_text_color=\u00a0\u00bb#00364c\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb title_line_height=\u00a0\u00bb1.2em\u00a0\u00bb number_text_color=\u00a0\u00bb#00364c\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb title__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb title__hover=\u00a0\u00bbDes petites entreprises ne poss\u00e8dent pas d&rsquo;assurance cyberattaque, malgr\u00e9 le fait qu&rsquo;elles soient conscientes du risque qu&rsquo;elles ne puissent pas se remettre d&rsquo;une attaque.\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDes petites et moyennes entreprises estiment ne pas pouvoir se remettre des dommages financiers d&rsquo;une cyberattaque.\u00a0\u00bb number=\u00a0\u00bb83&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb title_line_height=\u00a0\u00bb1.1em\u00a0\u00bb number_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb background_color=\u00a0\u00bb#00364c\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDes petites entreprises consid\u00e8rent le phishing comme leur plus grande menace.\u00a0\u00bb number=\u00a0\u00bb50&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_text_color=\u00a0\u00bb#00364c\u00a0\u00bb title_line_height=\u00a0\u00bb1.1em\u00a0\u00bb number_text_color=\u00a0\u00bb#00364c\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDes petites entreprises estiment que leurs moyens de cyber s\u00e9curit\u00e9 est efficace.\u00a0\u00bb number=\u00a0\u00bb14&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb title_line_height=\u00a0\u00bb1.1em\u00a0\u00bb number_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb background_color=\u00a0\u00bb#00364c\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|50px|20px|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#f1f1f1&Prime; custom_margin=\u00a0\u00bb50px|auto||auto||\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_text_color=\u00a0\u00bb#000000&Prime; header_2_text_color=\u00a0\u00bb#00364c\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2><strong>La source des cybermenaces<\/strong><\/h2>\n<p>Tel qu&rsquo;\u00e9nonc\u00e9 plus pr\u00e9c\u00e9demment la pand\u00e9mie a occasionn\u00e9 une <strong>hausse<\/strong> de l&rsquo;utilisation des <strong>services informatiques<\/strong> pour le <strong>t\u00e9l\u00e9travail<\/strong>, le cloud \u00e9tant une plateforme de stockage de donn\u00e9es n&rsquo;as pas \u00e9t\u00e9 \u00e9pargn\u00e9. En effet, on compte pr\u00e8s de <strong>92 % d&rsquo;entreprises<\/strong> h\u00e9bergeant une partie de leurs <strong>donn\u00e9es sur le cloud<\/strong>. Ainsi depuis 2020, 79 % d&rsquo;entre elles ont subi au moins une <strong>attaque sur le cloud<\/strong>. N\u00e9anmoins, apr\u00e8s plusieurs \u00e9tudes sur ces menaces nous constatons que :<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDe la s\u00e9curit\u00e9 du cloud comprend la fuite et la perte de donn\u00e9es, 66 % la confidentialit\u00e9 des donn\u00e9es et 44 % la divulgation accidentelle des donn\u00e9es d&rsquo;identification.\u00a0\u00bb number=\u00a0\u00bb69&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb number_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb background_color=\u00a0\u00bb#00364c\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDes entreprises utilisent des applications bas\u00e9es sur le cloud et con\u00e7ues sp\u00e9cifiquement pour celui-ci, dont 54 % ont d\u00e9plac\u00e9 des applications venant d&rsquo;un lieu sur site.\u00a0\u00bb number=\u00a0\u00bb46&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb number_text_color=\u00a0\u00bb#00364c\u00a0\u00bb custom_margin=\u00a0\u00bb||1px|||\u00a0\u00bb custom_padding=\u00a0\u00bb||40px|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_number_counter title=\u00a0\u00bbDes entreprises ont constat\u00e9 que des utilisateurs disposaient d&rsquo;un acc\u00e8s privil\u00e9gi\u00e9 inutile dont 25 % ont rencontr\u00e9 des soucis avec ces acc\u00e8s.\u00a0\u00bb number=\u00a0\u00bb32&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb number_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb background_color=\u00a0\u00bb#00364c\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_number_counter][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#f1f1f1&Prime; custom_margin=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_text_color=\u00a0\u00bb#000000&Prime; header_2_text_color=\u00a0\u00bb#00364c\u00a0\u00bb custom_padding=\u00a0\u00bb|100px||20px|false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2><strong>Veillez sur vos informations<\/strong><\/h2>\n<p>Comme nous le constatons une <strong>majeure partie des menaces<\/strong> les plus importantes peuvent \u00eatre<strong> \u00e9vit\u00e9es<\/strong> car elles proviennent de l&rsquo;<strong>erreur humaine<\/strong> via la mauvaise configuration des outils informatiques, l&rsquo;<strong>acc\u00e8s non autoris\u00e9<\/strong> aux donn\u00e9es sensibles, des <strong>interfaces moyennement s\u00e9curis\u00e9es<\/strong> ou encore la <strong>malversation de compte<\/strong>. De ce fait nous estimons que les <strong>d\u00e9penses<\/strong> des utilisateurs des services de cloud public pourraient atteindre <strong>362,3 milliards<\/strong> de dollars avec la recrudescence des erreurs et <strong>cyberattaques<\/strong> dans le monde en 2022.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.assurances-cyberattaque.com\/wp-content\/uploads\/2022\/12\/article_cyber.jpg\u00a0\u00bb alt=\u00a0\u00bbIllustration de base de donn\u00e9es\u00a0\u00bb title_text=\u00a0\u00bbBase_de_donn\u00e9es_article_cyber\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.17.6&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb module_alignment=\u00a0\u00bbleft\u00a0\u00bb custom_margin=\u00a0\u00bb|||-95px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px|||0px||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cyber s\u00e9curit\u00e9 est un sujet qui concerne tout le monde. Cependant les hackers et cybercriminels ont des cibles favorites, les PetitesMoyennesEntreprises qui sont les plus vuln\u00e9rables, car bien souvent elles ne poss\u00e8dent pas les moyens ou les connaissances n\u00e9cessaire pour faire face. Il existe toutefois des alternatives et quelques tendancesde cyber s\u00e9curit\u00e9 \u00e0 conna\u00eetre [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1224","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=\/wp\/v2\/posts\/1224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1224"}],"version-history":[{"count":8,"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=\/wp\/v2\/posts\/1224\/revisions"}],"predecessor-version":[{"id":1259,"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=\/wp\/v2\/posts\/1224\/revisions\/1259"}],"wp:attachment":[{"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.assurances-cyberattaque.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}