{"id":29108,"date":"2022-07-15T14:59:14","date_gmt":"2022-07-15T12:59:14","guid":{"rendered":"https:\/\/www.arc-data-shield.fr\/?p=29108"},"modified":"2024-07-02T09:48:18","modified_gmt":"2024-07-02T07:48:18","slug":"portees-par-le-flux-de-la-digitalisation-a-outrance-est-ce-que-nos-usines-4-0-ne-prennent-elles-pas-trop-risques","status":"publish","type":"post","link":"https:\/\/www.arc-data-shield.fr\/en\/portees-par-le-flux-de-la-digitalisation-a-outrance-est-ce-que-nos-usines-4-0-ne-prennent-elles-pas-trop-risques\/","title":{"rendered":"Carried along by the flow of excessive digitalization: aren't our 4.0 factories taking too many risks?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_image=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span style=\"color: #111111; font-family: inherit; font-size: 19px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none; font-weight: normal;\">\u00ab\u00a0<\/span><span style=\"color: #111111; font-family: inherit; font-size: 19px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none; font-weight: normal;\">Les entreprises industrielles sont bien conscientes des cybermenaces qui p\u00e8sent sur leurs usines connect\u00e9es. Pour autant nombre d&rsquo;entre elles reconnaissent ne pas \u00eatre pr\u00eates \u00e0 se d\u00e9fendre.<br \/><\/span><\/p>\n<blockquote>\n<p><span style=\"color: #3f4853; font-family: inherit; font-size: 17px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"><span style=\"font-size: medium;\"><span style=\"color: #000000; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\">Les entreprises qui g\u00e8rent des usines connect\u00e9es reconnaissent tous &#8211; ou presque &#8211; que la cybers\u00e9curit\u00e9 est une composante essentielle de leurs op\u00e9rations. Mais, <\/span><span style=\"font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none; color: #000000;\"><a href=\"https:\/\/www.capgemini.com\/insights\/research-library\/cybersecurity-in-smart-factories\" target=\"_blank\" rel=\"noopener\" style=\"color: #000000;\">selon un rapport publi\u00e9 la semaine derni\u00e8re par Capgemini<\/a><\/span><span style=\"color: #000000; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\">, un grand nombre d\u2019entre eux ne sont pas pr\u00e9par\u00e9s \u00e0 faire face au nombre croissant de cybermenaces qui p\u00e8sent sur leurs usines. Le rapport, bas\u00e9 sur une enqu\u00eate r\u00e9alis\u00e9e aupr\u00e8s de 950 entreprises \u00e0 l&rsquo;\u00e9chelle mondiale, constate que 80 % d&rsquo;entre elles s&rsquo;accordent \u00e0 dire que la cybers\u00e9curit\u00e9 est une composante essentielle du fonctionnement d&rsquo;une usine intelligente et que, si plus de la moiti\u00e9 (51 %) reconnaissent que le nombre de cyberattaques va probablement augmenter au cours des 12 prochains mois, leur niveau actuel de pr\u00e9paration est faible.<\/span><\/span><\/span><span style=\"color: #3f4853; font-family: inherit; font-size: 17px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"><span style=\"font-size: medium;\"><span style=\"color: #000000; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"><\/span><span style=\"color: #000000; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"> .<\/span>..\u00a0\u00bb<\/span><\/span><span style=\"color: #3f4853; font-family: inherit; font-size: 17px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"><\/span><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-les-usines-connectees-ne-sont-pas-preparees-aux-cyberattaques-87339.html\">https:\/\/www.lemondeinformatique.fr\/actualites\/lire-les-usines-connectees-ne-sont-pas-preparees-aux-cyberattaques-87339.html<\/a><\/p>\n<p>Cr\u00e9dit : <a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-les-usines-connectees-ne-sont-pas-preparees-aux-cyberattaques-87339.html\">Jean Elyan &#8211; Le Monde Informatique<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0Les entreprises industrielles sont bien conscientes des cybermenaces qui p\u00e8sent sur leurs usines connect\u00e9es. Pour autant nombre d&rsquo;entre elles reconnaissent ne pas \u00eatre pr\u00eates \u00e0 se d\u00e9fendre. Les entreprises qui g\u00e8rent des usines connect\u00e9es reconnaissent tous &#8211; ou presque &#8211; que la cybers\u00e9curit\u00e9 est une composante essentielle de leurs op\u00e9rations. Mais, selon un rapport publi\u00e9 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29124,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.\n\n<img class=\"aligncenter wp-image-28717 size-full\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/article_1.jpg?_t=1488209924\" width=\"1400\" height=\"933\" \/>\n\nUt velit mauris, egestas sed, gravida nec, ornare ut, mi. Aenean ut orci vel massa suscipit pulvinar. Nulla sollicitudin. Fusce varius, ligula non tempus aliquam, nunc turpis ullamcorper nibh, in tempus sapien eros vitae ligula. Pellentesque rhoncus nunc et augue. Integer id felis. Curabitur aliquet pellentesque diam. Integer quis metus vitae elit lobortis egestas. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Morbi vel erat non mauris convallis vehicula. Nulla et sapien. Integer tortor tellus, aliquam faucibus, convallis id, congue eu, quam. Mauris ullamcorper felis vitae erat. Proin feugiat, augue non elementum posuere, metus purus iaculis lectus, et tristique ligula justo vitae magna.\n\n<img class=\"alignnone size-full wp-image-28719\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/second_image.jpg\" alt=\"\" width=\"1400\" height=\"933\" \/>\n\nAliquam convallis sollicitudin purus. Praesent aliquam, enim at fermentum mollis, ligula massa adipiscing nisl, ac euismod nibh nisl eu lectus. Fusce vulputate sem at sapien. Vivamus leo. Aliquam euismod libero eu enim. Nulla nec felis sed leo placerat imperdiet. Aenean suscipit nulla in justo. Suspendisse cursus rutrum augue. Nulla tincidunt tincidunt mi. Curabitur iaculis, lorem vel rhoncus faucibus, felis magna fermentum augue, et ultricies lacus lorem varius purus. Curabitur eu amet.","_et_gb_content_width":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-29108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commonnews"],"_links":{"self":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/comments?post=29108"}],"version-history":[{"count":7,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29108\/revisions"}],"predecessor-version":[{"id":30203,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29108\/revisions\/30203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media\/29124"}],"wp:attachment":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media?parent=29108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/categories?post=29108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/tags?post=29108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}