{"id":1867,"date":"2019-11-26T11:27:59","date_gmt":"2019-11-26T10:27:59","guid":{"rendered":"http:\/\/pjcrpry.cluster031.hosting.ovh.net\/?p=1867"},"modified":"2020-06-01T12:34:40","modified_gmt":"2020-06-01T10:34:40","slug":"cybersecurite","status":"publish","type":"post","link":"https:\/\/sndll.info\/?p=1867","title":{"rendered":"CYBERS\u00c9CURIT\u00c9"},"content":{"rendered":"<h3 style=\"text-align: justify;\"><span style=\"color: #000000;\">Informatique<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">La s\u00e9curit\u00e9 num\u00e9rique est devenue essentielle dans nos m\u00e9tiers avec les nouveaux usages des consommateurs et l\u2019utilisation du num\u00e9rique dans la gestion des \u00e9tablissements.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">La cybers\u00e9curit\u00e9 est \u00e9galement une cl\u00e9 importante pour la\u00a0<strong>protection des donn\u00e9es personnelles.\u00a0<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Le SNDLL invite tous les \u00e9tablissements \u00e0 prendre connaissance et faire conna\u00eetre \u00e0 ses collaborateurs le kit de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 d\u00e9velopp\u00e9 par l\u2019ACYMA.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">T\u00e9l\u00e9chargement disponible avec ce lien :<\/span><\/p>\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/www.cybermalveillance.gouv.fr\/contenus-de-sensibilisation\" target=\"_blank\" rel=\"external noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=fr&amp;q=https:\/\/www.cybermalveillance.gouv.fr\/contenus-de-sensibilisation&amp;source=gmail&amp;ust=1529390548350000&amp;usg=AFQjCNGTdRWT4T3EXzc2Iz1N0gu2a01R6w\">https:\/\/www.cybermalveillance.gouv.fr\/contenus-de-sensibilisation<\/a><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Ce kit contient des conseils sur\u00a0:<\/span><br \/>\n<span style=\"color: #000000;\">\u2022 l\u2019hame\u00e7onnage (phishing)<\/span><br \/>\n<span style=\"color: #000000;\">\u2022 la gestion des mots de passe<\/span><br \/>\n<span style=\"color: #000000;\">\u2022 l\u2019utilisation des appareils mobiles (t\u00e9l\u00e9phones et tablettes)\u00a0<a style=\"color: #000000;\" href=\"https:\/\/www.synhorcat.com\/europe-numerique\/informatique\/article\/modele-de-charte-informatique-pour-un-etablissement-chr\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=fr&amp;q=https:\/\/www.synhorcat.com\/europe-numerique\/informatique\/article\/modele-de-charte-informatique-pour-un-etablissement-chr&amp;source=gmail&amp;ust=1529390548350000&amp;usg=AFQjCNFDS0qBDUBPFWldh18dXBk-awE9QA\">\u00a0<\/a><\/span><br \/>\n<span style=\"color: #000000;\">\u2022 la s\u00e9curit\u00e9 des usages professionnels et personnels<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">La cybers\u00e9curit\u00e9 doit devenir un r\u00e9flexe pour tous\u00a0: entreprises, citoyens, structures publiques ou associatives.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Sensibilisez tous vos collaborateurs !<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Informatique La s\u00e9curit\u00e9 num\u00e9rique est devenue essentielle dans nos m\u00e9tiers avec les nouveaux usages des consommateurs et l\u2019utilisation du num\u00e9rique dans la gestion des \u00e9tablissements. La cybers\u00e9curit\u00e9 est \u00e9galement une cl\u00e9 importante pour la\u00a0protection&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2332,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/posts\/1867"}],"collection":[{"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sndll.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1867"}],"version-history":[{"count":6,"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/posts\/1867\/revisions"}],"predecessor-version":[{"id":2817,"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/posts\/1867\/revisions\/2817"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sndll.info\/index.php?rest_route=\/wp\/v2\/media\/2332"}],"wp:attachment":[{"href":"https:\/\/sndll.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sndll.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sndll.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}