{"id":4795,"date":"2017-09-21T14:30:27","date_gmt":"2017-09-21T13:30:27","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog?p=4795"},"modified":"2017-10-07T22:55:26","modified_gmt":"2017-10-07T21:55:26","slug":"securite-sur-internet-10-bonnes-pratiques-essentielles","status":"publish","type":"post","link":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles","title":{"rendered":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>Dans le cadre du <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\" target=\"_blank\" rel=\"noopener\">mois de la cybers\u00e9curit\u00e9 2017<\/a>, <a href=\"http:\/\/www.abconsulting-ci.com\" target=\"_blank\" rel=\"noopener\">AB Consulting CI<\/a> et <a href=\"http:\/\/www.abconsulting-ca.com\" target=\"_blank\" rel=\"noopener\">2AB &amp; Associates<\/a>, sponsors officiels depuis plusieurs ann\u00e9es, s&rsquo;associent de nouveau \u00e0 la campagne de sensibilisation des citoyens sur les bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 sur internet.<\/em><\/p>\n<h1>10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet<\/h1>\n<p><img loading=\"lazy\" class=\"wp-image-4805 alignleft\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?resize=290%2C410\" alt=\"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet\" width=\"290\" height=\"410\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?w=580 580w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?resize=212%2C300 212w\" sizes=\"(max-width: 290px) 100vw, 290px\" data-recalc-dims=\"1\" \/><\/p>\n<p style=\"text-align: justify;\">A l&rsquo;occasion du mois de la cybers\u00e9curit\u00e9 2017, nous publions un livre blanc intitul\u00e9 <em><strong>10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet<\/strong><\/em>. Ce livre blanc sera remis \u00e0 tous les participants lors de notre w\u00e9binaire gratuit du <strong>4 octobre prochain<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Aujourd&rsquo;hui notre vie est \u00e9troitement li\u00e9e \u00e0 l&rsquo;utilisation d&rsquo;internet. Cela vaut aussi bien pour notre vie professionnelle que pour notre vie priv\u00e9e. L&rsquo;objectif est de sensibiliser l&rsquo;ensemble des citoyens sur la n\u00e9cessit\u00e9 de prendre quelques pr\u00e9cautions \u00e9l\u00e9mentaires pour se prot\u00e9ger des risques inh\u00e9rents \u00e0 l&rsquo;utilisation de ce mode de communication.<\/p>\n<p style=\"text-align: justify;\">Nous vous proposons donc de nous rejoindre sur notre w\u00e9binaire du 25 octobre 2017 pour creuser ensemble ce sujet d\u00e9licat. Attention, le nombre de places est limit\u00e9. <span style=\"color: #0000ff;\"><strong>I<a href=\"https:\/\/attendee.gotowebinar.com\/register\/1700734866899106563\" target=\"_blank\" rel=\"noopener\">nscrivez-vous ici d\u00e8s maintenant&#8230; C&rsquo;est enti\u00e8rement gratuit!<\/a><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">Nous faisons tout pour sauvegarder nos biens personnels &#8211; en verrouillant nos portes, en surveillant nos sacs et\u00a0nos portefeuilles. H\u00e9las, souvent, nous ne prenons pas le m\u00eame soin avec les informations personnelles\u00a0que nous stockons en ligne, sur les r\u00e9seaux sociaux et dans nos appareils, qu&rsquo;il s&rsquo;agisse d&rsquo;ordinateurs ou de t\u00e9l\u00e9phones. La plupart du temps, c&rsquo;est simplement parce que nous ne comprenons pas bien les risques et que nous ne savons pas par o\u00f9 commencer.<\/p>\n<p style=\"text-align: justify;\">Alors, avant de participer \u00e0 notre w\u00e9binaire et de lire notre livre blanc, voici quelques r\u00e8gles \u00e9l\u00e9mentaires. Il s&rsquo;agit simplement de 3 conseils de bon sens \u00e0 respecter scrupuleusement :<\/p>\n<h2>Naviguez toujours prudemment sur Internet<\/h2>\n<p style=\"text-align: justify;\">Bien s\u00fbr, commencez par utiliser un navigateur et une machine \u00e0 jour des correctifs de s\u00e9curit\u00e9, Mais il convient encore de prendre\u00a0quelques pr\u00e9cautions \u00e9l\u00e9mentaires lorsque vous naviguez sur des sites internet.<\/p>\n<h3>Sites marchands et sites bancaires<\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><strong>IMPORTANT :<\/strong><\/span> <span style=\"color: #800000;\"><em><strong>Ne donnez jamais d\u2019informations personnelles et confidentielles (vos coordonn\u00e9es personnelles, vos coordonn\u00e9es bancaires, etc) sur un site marchand ou un site bancaire, sans avoir v\u00e9rifi\u00e9 au pr\u00e9alable\u00a0que le site est s\u00e9curis\u00e9.<\/strong><\/em><\/span><\/p>\n<p style=\"text-align: justify;\">Le site doit utiliser un certificat \u00e9lectronique qui garantit qu&rsquo;il est authentique. C&rsquo;est gr\u00e2ce \u00e0 ce certificat que la confidentialit\u00e9 des informations \u00e9chang\u00e9es est bien garantie. Bien s\u00fbr, l\u00e0 il s&rsquo;agit de consid\u00e9rations quelque peu techniques et vous n&rsquo;\u00eates pas forc\u00e9ment un(e) technicien(ne). Il existe une fa\u00e7on simple de vous assurer que le site est bien s\u00e9curis\u00e9. Il y a deux informations affich\u00e9es par\u00a0le navigateur qui doivent \u00eatre v\u00e9rifi\u00e9es :<\/p>\n<ul style=\"text-align: justify;\">\n<li>l\u2019adresse URL du site web doit commencer par \u00ab https:\/\/ \u00bb. Par ailleurs, le nom du site doit correspondre \u00e0 ce que vous vous attendez \u00e0 trouver.<\/li>\n<li>un petit cadenas ferm\u00e9 doit figurer \u00e0 droite de l\u2019adresse du site. Il peut aussi se trouver en bas \u00e0 droite de la barre d\u2019\u00e9tat selon\u00a0la version et le type de votre navigateur. Ce cadenas symbolise une connexion s\u00e9curis\u00e9e. En cliquant dessus, on peut\u00a0afficher le certificat \u00e9lectronique du site, et visualiser le nom de l\u2019organisme.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Attention cependant, il est toujours possible \u00e0 un agresseur d\u2019intervenir en amont (sur votre machine) ou en aval (sur le\u00a0site consult\u00e9). Il peut aussi essayer de vous aiguiller sur un site frauduleux, au nom tr\u00e8s voisin. L&rsquo;objectif est le plus souvent d\u2019obtenir des informations\u00a0sensibles. La prudence doit donc \u00eatre de rigueur.<\/p>\n<p style=\"text-align: justify;\">Pour plus de pr\u00e9cisions sur les proc\u00e9d\u00e9s utilis\u00e9s par les pirates, nous vous conseillons la lecture de deux articles publi\u00e9s sur notre blog : <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/phishing-mode-emploi\">Phishing &#8211; Mode d&#8217;emploi<\/a> et <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/10-indices-hameconnage\" target=\"_blank\" rel=\"noopener\">10 trucs pour reconna\u00eetre un mail d&rsquo;hame\u00e7onnage<\/a>.<\/p>\n<h3><strong>Les forums et les blogs<\/strong><\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><strong>IMPORTANT :<\/strong><\/span> <span style=\"color: #800000;\"><em><strong>En aucun cas vous ne devez donner d\u2019informations personnelles sur des\u00a0forums (adresse physique, de messagerie, num\u00e9ro de t\u00e9l\u00e9phone\u2026).<\/strong><\/em><\/span><\/p>\n<p style=\"text-align: justify;\">Il est d\u00e9sormais fr\u00e9quent de communiquer sur des sites communautaires de types forums de discussion ou\u00a0autres blogs. Il est important de bien garder en m\u00e9moire, lorsque l\u2019on veut d\u00e9poser un message sur ce type de site,\u00a0que le contenu de vos \u00e9crits \u00a0pourra \u00eatre analys\u00e9 par des robots. Qu&rsquo;appelle-t-on des robots? Ce sont des programmes capables de\u00a0r\u00e9cup\u00e9rer les informations personnelles contenues dans le texte. Il peut s&rsquo;agir de vos adresses de messageries ou de vos identifiants de messageries instantan\u00e9es. Ces informations pourront ensuite \u00eatre utilis\u00e9es afin de propager du pourriel (spam). Aujourd\u2019hui, il n\u2019est\u00a0pas rare apr\u00e8s avoir d\u00e9pos\u00e9 son adresse personnelle de messagerie \u00e9lectronique sur un forum de se voir inond\u00e9\u00a0de spams les heures ou jours suivants. Attention, ces informations communiqu\u00e9es sur ces sites resteront\u00a0publiques et non ma\u00eetrisables durant une tr\u00e8s longue p\u00e9riode.<\/p>\n<h3>Le paiement en ligne<\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><strong>IMPORTANT :\u00a0<\/strong><\/span><span style=\"color: #800000;\"><em><strong>Soyez prudent sur la nature des donn\u00e9es bancaires demand\u00e9es lors d\u2019un paiement en ligne.\u00a0Un site ne doit jamais vous demander de saisir votre code secret associ\u00e9 \u00e0 votre carte bancaire.\u00a0<\/strong><\/em><\/span><\/p>\n<p style=\"text-align: justify;\">Lorsque que vous d\u00e9cidez de faire des achats sur internet,-vous devez vous assurer du s\u00e9rieux du site marchand. Il doit offrir toutes les garanties de s\u00e9curit\u00e9 lorsque vous payez : chiffrement, possibilit\u00e9 de r\u00e9tractation\u2026.Si vous avez le moindre doute, ne finalisez pas la transaction et signalez le site aux points de contact mentionn\u00e9s sur contrat de votre carte bancaire.<\/p>\n<h2>Pour en savoir plus&#8230;<\/h2>\n<p style=\"text-align: justify;\">Pour en savoir plus, n&rsquo;h\u00e9sitez pas \u00e0 nous adresser vos commentaires et \u00e0 partager vos exp\u00e9riences relatives \u00e0 la s\u00e9curit\u00e9 sur internet. Et surtout <a href=\"https:\/\/attendee.gotowebinar.com\/register\/1700734866899106563\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>inscrivez-vous vite \u00e0 notre w\u00e9binaire gratuit du 25 Octobre<\/strong><\/span><\/a> et recevez le livre blanc <em><strong>10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet<\/strong><\/em>.<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20S%C3%A9curit%C3%A9%20sur%20internet%20%3A%2010%20pratiques%20essentielles&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fsecurite-sur-internet-10-bonnes-pratiques-essentielles&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"28589651f0\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-4795\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-4795\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-4795\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-4795\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Dans le cadre du mois de la cybers\u00e9curit\u00e9 2017, AB Consulting CI et 2AB &amp; Associates, sponsors officiels depuis plusieurs ann\u00e9es, s&rsquo;associent de nouveau \u00e0 la campagne de sensibilisation des citoyens sur les bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 sur internet. 10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet A l&rsquo;occasion du mois&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20S%C3%A9curit%C3%A9%20sur%20internet%20%3A%2010%20pratiques%20essentielles&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fsecurite-sur-internet-10-bonnes-pratiques-essentielles&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"28589651f0\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-4795\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-4795\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-4795\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-4795\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":4805,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[74,73,282,25,99,62],"tags":[413,164,20,80,69,107,732,784,175,203,64,68,134,159,782,783,100,785,87,109,270,781,788,786,787],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=212%2C300","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez notre livre blanc gratuit &quot;10 pratiques essentielles pour rester en s\u00e9curit\u00e9 en ligne&quot; propos\u00e9 par AB Consulting CI et 2AB &amp; Associates\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez notre livre blanc gratuit &quot;10 pratiques essentielles pour rester en s\u00e9curit\u00e9 en ligne&quot; propos\u00e9 par AB Consulting CI et 2AB &amp; Associates\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-21T13:30:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-07T21:55:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819\" \/>\n\t<meta property=\"og:image:width\" content=\"580\" \/>\n\t<meta property=\"og:image:height\" content=\"819\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819\",\"width\":580,\"height\":819,\"caption\":\"10 pratiques essentielles pour rester en s\\u00e9curit\\u00e9 sur internet\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#webpage\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\",\"name\":\"S\\u00e9curit\\u00e9 sur internet : 10 pratiques essentielles - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#primaryimage\"},\"datePublished\":\"2017-09-21T13:30:27+00:00\",\"dateModified\":\"2017-10-07T21:55:26+00:00\",\"description\":\"D\\u00e9couvrez notre livre blanc gratuit \\\"10 pratiques essentielles pour rester en s\\u00e9curit\\u00e9 en ligne\\\" propos\\u00e9 par AB Consulting CI et 2AB & Associates\",\"breadcrumb\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\\u00e9curit\\u00e9 sur internet : 10 pratiques essentielles\"}]},{\"@type\":\"Article\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#webpage\"},\"author\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"S\\u00e9curit\\u00e9 sur internet : 10 pratiques essentielles\",\"datePublished\":\"2017-09-21T13:30:27+00:00\",\"dateModified\":\"2017-10-07T21:55:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#webpage\"},\"wordCount\":982,\"commentCount\":2,\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819\",\"keywords\":[\"2AB &amp; Associates\",\"AB Consulting\",\"bonnes pratiques\",\"COBIT\",\"cyber-s\\u00e9curit\\u00e9\",\"cybers\\u00e9curit\\u00e9\",\"cybersecurity month\",\"forum\",\"gestion de la s\\u00e9curit\\u00e9\",\"internet\",\"ISO 27001\",\"ISO 27002\",\"menace de s\\u00e9curit\\u00e9\",\"mois europ\\u00e9en de la cybers\\u00e9curit\\u00e9\",\"naviguer\",\"paiement en ligne\",\"resilia\",\"s\\u00e9curisation\",\"s\\u00e9curit\\u00e9\",\"s\\u00e9curit\\u00e9 de l'information\",\"S\\u00e9curit\\u00e9 informatique\",\"s\\u00e9curit\\u00e9 sur internet\",\"site bancaire\",\"site web\",\"vente en ligne\"],\"articleSection\":[\"Cyber-r\\u00e9silience\",\"cybers\\u00e9curit\\u00e9\",\"GDPR\",\"ISO\/IEC 27001\",\"ISO\/IEC 27002\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles - Blog de la Transformation Digitale","description":"D\u00e9couvrez notre livre blanc gratuit \"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 en ligne\" propos\u00e9 par AB Consulting CI et 2AB & Associates","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles","og_description":"D\u00e9couvrez notre livre blanc gratuit \"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 en ligne\" propos\u00e9 par AB Consulting CI et 2AB & Associates","og_url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2017-09-21T13:30:27+00:00","article_modified_time":"2017-10-07T21:55:26+00:00","og_image":[{"width":580,"height":819,"url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"http:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"http:\/\/www.ab-consulting.fr\/blog\/#website","url":"http:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#primaryimage","inLanguage":"fr-FR","url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819","contentUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819","width":580,"height":819,"caption":"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet"},{"@type":"WebPage","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#webpage","url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles","name":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles - Blog de la Transformation Digitale","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#primaryimage"},"datePublished":"2017-09-21T13:30:27+00:00","dateModified":"2017-10-07T21:55:26+00:00","description":"D\u00e9couvrez notre livre blanc gratuit \"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 en ligne\" propos\u00e9 par AB Consulting CI et 2AB & Associates","breadcrumb":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles"}]},{"@type":"Article","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#article","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#webpage"},"author":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles","datePublished":"2017-09-21T13:30:27+00:00","dateModified":"2017-10-07T21:55:26+00:00","mainEntityOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#webpage"},"wordCount":982,"commentCount":2,"publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819","keywords":["2AB &amp; Associates","AB Consulting","bonnes pratiques","COBIT","cyber-s\u00e9curit\u00e9","cybers\u00e9curit\u00e9","cybersecurity month","forum","gestion de la s\u00e9curit\u00e9","internet","ISO 27001","ISO 27002","menace de s\u00e9curit\u00e9","mois europ\u00e9en de la cybers\u00e9curit\u00e9","naviguer","paiement en ligne","resilia","s\u00e9curisation","s\u00e9curit\u00e9","s\u00e9curit\u00e9 de l'information","S\u00e9curit\u00e9 informatique","s\u00e9curit\u00e9 sur internet","site bancaire","site web","vente en ligne"],"articleSection":["Cyber-r\u00e9silience","cybers\u00e9curit\u00e9","GDPR","ISO\/IEC 27001","ISO\/IEC 27002","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles#respond"]}]},{"@type":"Person","@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\" class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/gdpr\" class=\"advgb-post-tax-term\">GDPR<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27001\" class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27002\" class=\"advgb-post-tax-term\">ISO\/IEC 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">GDPR<\/span>","<span class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO\/IEC 27002<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">2AB &amp; Associates<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">AB Consulting<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">bonnes pratiques<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybersecurity month<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">forum<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">gestion de la s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">internet<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">mois europ\u00e9en de la cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">naviguer<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">paiement en ligne<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curisation<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9 informatique<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 sur internet<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">site bancaire<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">site web<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">vente en ligne<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">2AB &amp; Associates<\/span>","<span class=\"advgb-post-tax-term\">AB Consulting<\/span>","<span class=\"advgb-post-tax-term\">bonnes pratiques<\/span>","<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybersecurity month<\/span>","<span class=\"advgb-post-tax-term\">forum<\/span>","<span class=\"advgb-post-tax-term\">gestion de la s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">internet<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">mois europ\u00e9en de la cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">naviguer<\/span>","<span class=\"advgb-post-tax-term\">paiement en ligne<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curisation<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9 informatique<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 sur internet<\/span>","<span class=\"advgb-post-tax-term\">site bancaire<\/span>","<span class=\"advgb-post-tax-term\">site web<\/span>","<span class=\"advgb-post-tax-term\">vente en ligne<\/span>"]}},"comment_count":"2","relative_dates":{"created":"Posted 9 ans ago","modified":"Updated 9 ans ago"},"absolute_dates":{"created":"Posted on 21 septembre 2017","modified":"Updated on 7 octobre 2017"},"absolute_dates_time":{"created":"Posted on 21 septembre 2017 14 h 30 min","modified":"Updated on 7 octobre 2017 22 h 55 min"},"featured_img_caption":"","jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-1fl","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":4773,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan","url_meta":{"origin":4795,"position":0},"title":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan","date":"19 septembre 2017","format":false,"excerpt":"Mois de la cybers\u00e9curit\u00e9 2017 Le Mois de la cybers\u00e9curit\u00e9 (CSM) s'appuie sur le fait qu'Internet est une ressource partag\u00e9e et que la s\u00e9curit\u00e9 des communications sur internet est une responsabilit\u00e9 partag\u00e9e. Le Mois de la cybers\u00e9curit\u00e9 est une campagne internationale de sensibilisation. Elle a lieu chaque ann\u00e9e en Europe,\u2026","rel":"","context":"Dans &quot;CISM&quot;","img":{"alt_text":"Mois de la cybers\u00e9curit\u00e9 2017","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4962,"url":"http:\/\/www.ab-consulting.fr\/blog\/gdpr\/protection-des-renseignements-personnels","url_meta":{"origin":4795,"position":1},"title":"Protection des renseignements personnels","date":"15 octobre 2017","format":false,"excerpt":"Dans le cadre du mois de la cybers\u00e9curit\u00e9 2017, nous avons eu le plaisir d'accueillir, le 11 octobre dernier, David Henrard pour un w\u00e9binaire exceptionnel pr\u00e9sentant un \u00e9tat des lieux de la protection des renseignements personnels en 2017 dans le monde. La protection des renseignements personnels Un \u00e9tat des lieux\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"La protection des renseignements personnels","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/10\/protection-renseignements-personnels-Webinaire.jpg?fit=580%2C357&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":462,"url":"http:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":4795,"position":2},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1057,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/10-trucs-sensibilisation-securite","url_meta":{"origin":4795,"position":3},"title":"10 cl\u00e9s pour une sensibilisation r\u00e9ussie sur la s\u00e9curit\u00e9","date":"24 octobre 2015","format":false,"excerpt":"Les cyber-menaces pesant sur\u00a0votre entreprise sont g\u00e9n\u00e9ralement imput\u00e9es \u00e0 des personnes \u00e9trang\u00e8res \u00e0 l'Organisation ou \u00e0 des programmeurs v\u00e9reux ins\u00e9rant, dans vos applications, du code malveillant con\u00e7u pour exploiter\u00a0les informations sensibles pour\u00a0votre Entreprise, voler\u00a0les donn\u00e9es\u00a0confidentielles de vos clients et \/ ou vous d\u00e9rober\u00a0de l'argent. Cependant, la menace de s\u00e9curit\u00e9 se\u2026","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"S\u00e9curit\u00e9 menac\u00e9e de l'int\u00e9rieur","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/violation-s\u00e9curit\u00e9.jpeg?fit=424%2C283&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":964,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/10-indices-hameconnage","url_meta":{"origin":4795,"position":4},"title":"10 trucs pour reconna\u00eetre un mail d&rsquo;hame\u00e7onnage","date":"17 octobre 2015","format":false,"excerpt":"Malheureusement, il n'y a pas qu'une seule technique qui fonctionnerait dans toutes les situations. Il est, par cons\u00e9quent, difficile de d\u00e9tecter un email d'hame\u00e7onnage. Cependant il existe des indices qui permettent d'\u00e9veiller les soup\u00e7ons. Cet article r\u00e9pertorie 10 d'entre eux.","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"10 indices pour reconna\u00eetre un mail d'hame\u00e7onnage","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/phishing.jpeg?fit=424%2C283&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1192,"url":"http:\/\/www.ab-consulting.fr\/blog\/geit\/cyber-risques-conseil-administration","url_meta":{"origin":4795,"position":5},"title":"Cyber-risques &#8211; Que fait le Conseil d&rsquo;Administration?","date":"30 octobre 2015","format":false,"excerpt":"Le Conseil d'Administration est en charge de s'assurer de la cr\u00e9ation de valeur pour les parties prenantes de l'Entreprise tout en optimisant les risques et les ressources. Le Conseil d'Administration, organe de Gouvernance de l'entreprise est donc directement concern\u00e9 par les cyber-risques. \"La SEC (organisme f\u00e9d\u00e9ral am\u00e9ricain en charge de\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Le conseil d'administration","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/conseil-administration-300x193.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/4795"}],"collection":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=4795"}],"version-history":[{"count":31,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/4795\/revisions"}],"predecessor-version":[{"id":4894,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/4795\/revisions\/4894"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media\/4805"}],"wp:attachment":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=4795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=4795"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=4795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}