{"id":29208,"date":"2023-04-04T12:12:14","date_gmt":"2023-04-04T10:12:14","guid":{"rendered":"https:\/\/www.arc-data-shield.fr\/?p=29208"},"modified":"2024-07-02T09:45:56","modified_gmt":"2024-07-02T07:45:56","slug":"est-ce-que-la-resilience-de-nos-entreprises-est-suffisante-face-au-risque-cyber-actuel","status":"publish","type":"post","link":"https:\/\/www.arc-data-shield.fr\/en\/est-ce-que-la-resilience-de-nos-entreprises-est-suffisante-face-au-risque-cyber-actuel\/","title":{"rendered":"Are our companies sufficiently resilient in the face of today's cyber risks?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_image=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb width=\u00a0\u00bb95.8%\u00a0\u00bb inline_fonts=\u00a0\u00bbABeeZee\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-size: large;\"><span style=\"color: #666666; font-family: inherit; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\">\u00ab\u00a0<\/span><\/span><\/span><span style=\"font-size: large;\"><span style=\"color: #666666; font-family: inherit; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: -0.4px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\"><span style=\"font-weight: normal;\">Seuls 7% des organisations fran\u00e7aises ont une posture de cybers\u00e9curit\u00e9 suffisamment <span style=\"font-family: inherit; font-weight: normal; font-size: medium;\">\u00ab <\/span>mature <span style=\"font-family: inherit; font-weight: normal; font-size: medium;\">\u00bb<\/span> pour se d\u00e9fendre contre les menaces du monde hybride.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-family: inherit; font-size: medium;\"><\/span><\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><span style=\"font-family: inherit; font-weight: normal; font-size: medium;\">Les entreprises sont pass\u00e9es d&rsquo;un mode de fonctionnement fixe, o\u00f9 les collaborateurs utilisent des appareils \u00e0 un seul endroit via un r\u00e9seau statique, \u00e0 un monde hybride o\u00f9 les connexions se font avec de multiples appareils sur diff\u00e9rents r\u00e9seaux, via des applications dans le cloud, g\u00e9n\u00e9rant \u00e9norm\u00e9ment de donn\u00e9es.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: inherit; font-weight: normal; font-size: medium;\">Cette \u00e9volution pose aux entreprises des d\u00e9fis nouveaux en mati\u00e8re de cybers\u00e9curit\u00e9. Surtout, elle met en avant les limites de la sacro-sainte d\u00e9fense p\u00e9rim\u00e9trique.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: inherit; font-weight: normal; font-size: medium;\">Selon l\u2019\u00e9tude de Cisco \u00ab\u2009Cybersecurity Readiness Index : Resilience in a Hybrid World\u2009\u00bb, seuls 7 % des organisations en France ont un niveau de pr\u00e9paration \u00ab\u2009mature\u2009\u00bb, n\u00e9cessaire pour \u00eatre r\u00e9silientes face aux risques modernes de cybers\u00e9curit\u00e9. <\/span><span style=\"font-size: medium;\"><span style=\"font-family: inherit; font-weight: normal;\">&#8230;\u00a0\u00bb<br \/><\/span><\/span><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/itsocial.fr\/enjeux-it\/enjeux-securite\/cybersecurite\/les-entreprises-francaises-doivent-ameliorer-leur-resilience\/\">http:\/\/itsocial.fr\/enjeux-it\/enjeux-securite\/cybersecurite\/les-entreprises-francaises-doivent-ameliorer-leur-resilience\/<\/a><\/p>\n<p>Cr\u00e9dit : <a href=\"http:\/\/itsocial.fr\/enjeux-it\/enjeux-securite\/cybersecurite\/les-entreprises-francaises-doivent-ameliorer-leur-resilience\/\">Philippe RICHARD &#8211; IT SOCIAL<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0Seuls 7% des organisations fran\u00e7aises ont une posture de cybers\u00e9curit\u00e9 suffisamment \u00ab mature \u00bb pour se d\u00e9fendre contre les menaces du monde hybride. Les entreprises sont pass\u00e9es d&rsquo;un mode de fonctionnement fixe, o\u00f9 les collaborateurs utilisent des appareils \u00e0 un seul endroit via un r\u00e9seau statique, \u00e0 un monde hybride o\u00f9 les connexions se font [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29214,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.\n\n<img class=\"aligncenter wp-image-28717 size-full\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/article_1.jpg?_t=1488209924\" width=\"1400\" height=\"933\" \/>\n\nUt velit mauris, egestas sed, gravida nec, ornare ut, mi. Aenean ut orci vel massa suscipit pulvinar. Nulla sollicitudin. Fusce varius, ligula non tempus aliquam, nunc turpis ullamcorper nibh, in tempus sapien eros vitae ligula. Pellentesque rhoncus nunc et augue. Integer id felis. Curabitur aliquet pellentesque diam. Integer quis metus vitae elit lobortis egestas. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Morbi vel erat non mauris convallis vehicula. Nulla et sapien. Integer tortor tellus, aliquam faucibus, convallis id, congue eu, quam. Mauris ullamcorper felis vitae erat. Proin feugiat, augue non elementum posuere, metus purus iaculis lectus, et tristique ligula justo vitae magna.\n\n<img class=\"alignnone size-full wp-image-28719\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/second_image.jpg\" alt=\"\" width=\"1400\" height=\"933\" \/>\n\nAliquam convallis sollicitudin purus. Praesent aliquam, enim at fermentum mollis, ligula massa adipiscing nisl, ac euismod nibh nisl eu lectus. Fusce vulputate sem at sapien. Vivamus leo. Aliquam euismod libero eu enim. Nulla nec felis sed leo placerat imperdiet. Aenean suscipit nulla in justo. Suspendisse cursus rutrum augue. Nulla tincidunt tincidunt mi. Curabitur iaculis, lorem vel rhoncus faucibus, felis magna fermentum augue, et ultricies lacus lorem varius purus. Curabitur eu amet.","_et_gb_content_width":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-29208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commonnews"],"_links":{"self":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/comments?post=29208"}],"version-history":[{"count":6,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29208\/revisions"}],"predecessor-version":[{"id":30199,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29208\/revisions\/30199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media\/29214"}],"wp:attachment":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media?parent=29208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/categories?post=29208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/tags?post=29208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}