{"id":29179,"date":"2023-01-18T17:06:19","date_gmt":"2023-01-18T16:06:19","guid":{"rendered":"https:\/\/www.arc-data-shield.fr\/?p=29179"},"modified":"2024-07-02T09:47:00","modified_gmt":"2024-07-02T07:47:00","slug":"deployer-des-solutions-de-cybersecurite-efficaces-devient-une-necessite-pour-pouvoir-souscrire-une-assurance-cyber","status":"publish","type":"post","link":"https:\/\/www.arc-data-shield.fr\/en\/deployer-des-solutions-de-cybersecurite-efficaces-devient-une-necessite-pour-pouvoir-souscrire-une-assurance-cyber\/","title":{"rendered":"Deploying effective cybersecurity solutions is a prerequisite for taking out cyber insurance."},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_image=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb width=\u00a0\u00bb95.8%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-size: large;\"><span style=\"color: #666666; font-family: inherit; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\">\u00a0\u00bb <\/span><\/span><\/span><span style=\"font-size: large;\">Le gouvernement veut encourager le d\u00e9veloppement des assurances contre les attaques informatiques. Les entreprises doivent cependant donner des gages et mettre au niveau leur s\u00e9curit\u00e9 informatique pour obtenir des couvertures. Confront\u00e9s \u00e0 un ph\u00e9nom\u00e8ne qu&rsquo;ils peinent encore \u00e0 appr\u00e9hender, les assureurs augmentent les prix et sont sur leurs gardes<\/span>.<\/p>\n<p><span style=\"font-family: inherit; font-size: medium;\"><\/span><\/p>\n<blockquote>\n<p><span style=\"font-family: inherit; font-weight: normal; font-size: medium;\">Les PME et ETI ont int\u00e9r\u00eat \u00e0 s&rsquo;\u00e9quiper de ceintures et de bretelles pour d\u00e9crocher une assurance les prot\u00e9geant en cas de cyberattaques. A\u00a0l&rsquo;heure o\u00f9 les offensives de hackers contre les entreprises se multiplient, les assureurs se montrent vigilants avant d&rsquo;accorder ces couvertures.<\/span><\/p>\n<p><span style=\"font-family: inherit; font-weight: normal; font-size: large;\"><span style=\"font-size: medium;\">\u00ab Seules les entreprises qui auront investi en mati\u00e8re de s\u00e9curit\u00e9 informatique sur des outils de protection pourront s&rsquo;assurer \u00bb, pr\u00e9vient le directeur g\u00e9n\u00e9ral d&rsquo;AIG en France, Christophe Zaniewski. Or, \u00ab les proc\u00e9dures de s\u00e9curit\u00e9 basiques ne sont encore que tr\u00e8s peu mises en place par les PME \u00bb, d\u00e9plore cet acteur historique du march\u00e9<\/span><\/span><span style=\"font-size: medium;\"><span style=\"font-family: inherit; font-weight: normal;\">. &#8230; <\/span><\/span><span style=\"font-size: medium; font-family: inherit; font-weight: normal;\"><\/span><span style=\"color: #3f4853; font-family: inherit; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"><span style=\"color: #000000; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\"><br \/><\/span><\/span><\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/business.lesechos.fr\/entrepreneurs\/numerique-cybersecurite\/0701648139886-cyberattaques-les-entreprises-doivent-se-securiser-pour-etre-assurees-348501.php\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/business.lesechos.fr\/entrepreneurs\/numerique-cybersecurite\/0701648139886-cyberattaques-les-entreprises-doivent-se-securiser-pour-etre-assurees-348501.php\">https:\/\/business.lesechos.fr\/entrepreneurs\/numerique-cybersecurite\/0701648139886-cyberattaques-les-entreprises-doivent-se-securiser-pour-etre-assurees-348501.php<\/a><\/p>\n<p>Cr\u00e9dits : <a href=\"https:\/\/business.lesechos.fr\/entrepreneurs\/numerique-cybersecurite\/0701648139886-cyberattaques-les-entreprises-doivent-se-securiser-pour-etre-assurees-348501.php\">Solenn POULLENNEC et Laurent THEVENIN &#8211; Les Echos ENTREPRENEURS<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00bb Le gouvernement veut encourager le d\u00e9veloppement des assurances contre les attaques informatiques. Les entreprises doivent cependant donner des gages et mettre au niveau leur s\u00e9curit\u00e9 informatique pour obtenir des couvertures. Confront\u00e9s \u00e0 un ph\u00e9nom\u00e8ne qu&rsquo;ils peinent encore \u00e0 appr\u00e9hender, les assureurs augmentent les prix et sont sur leurs gardes. Les PME et ETI ont [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.\n\n<img class=\"aligncenter wp-image-28717 size-full\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/article_1.jpg?_t=1488209924\" width=\"1400\" height=\"933\" \/>\n\nUt velit mauris, egestas sed, gravida nec, ornare ut, mi. Aenean ut orci vel massa suscipit pulvinar. Nulla sollicitudin. Fusce varius, ligula non tempus aliquam, nunc turpis ullamcorper nibh, in tempus sapien eros vitae ligula. Pellentesque rhoncus nunc et augue. Integer id felis. Curabitur aliquet pellentesque diam. Integer quis metus vitae elit lobortis egestas. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Morbi vel erat non mauris convallis vehicula. Nulla et sapien. Integer tortor tellus, aliquam faucibus, convallis id, congue eu, quam. Mauris ullamcorper felis vitae erat. Proin feugiat, augue non elementum posuere, metus purus iaculis lectus, et tristique ligula justo vitae magna.\n\n<img class=\"alignnone size-full wp-image-28719\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/second_image.jpg\" alt=\"\" width=\"1400\" height=\"933\" \/>\n\nAliquam convallis sollicitudin purus. Praesent aliquam, enim at fermentum mollis, ligula massa adipiscing nisl, ac euismod nibh nisl eu lectus. Fusce vulputate sem at sapien. Vivamus leo. Aliquam euismod libero eu enim. Nulla nec felis sed leo placerat imperdiet. Aenean suscipit nulla in justo. Suspendisse cursus rutrum augue. Nulla tincidunt tincidunt mi. Curabitur iaculis, lorem vel rhoncus faucibus, felis magna fermentum augue, et ultricies lacus lorem varius purus. Curabitur eu amet.","_et_gb_content_width":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-29179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commonnews"],"_links":{"self":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/comments?post=29179"}],"version-history":[{"count":6,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29179\/revisions"}],"predecessor-version":[{"id":30201,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29179\/revisions\/30201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media\/29187"}],"wp:attachment":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media?parent=29179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/categories?post=29179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/tags?post=29179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}