{"id":14939,"date":"2021-08-23T07:00:59","date_gmt":"2021-08-23T05:00:59","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=14939"},"modified":"2021-08-25T15:14:18","modified_gmt":"2021-08-25T13:14:18","slug":"six-conseils-en-matiere-de-securite-informatique","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/fr\/six-conseils-en-matiere-de-securite-informatique\/","title":{"rendered":"Six conseils en mati\u00e8re de s\u00e9curit\u00e9 informatique"},"content":{"rendered":"<figure id=\"attachment_14940\" aria-describedby=\"caption-attachment-14940\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14940 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\" alt=\"eco - Association allemande de l&#039;industrie de l&#039;Internet, S\u00e9curit\u00e9 informatique\" width=\"1000\" height=\"752\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg 1000w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-768x578.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-233x175.jpg 233w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-465x350.jpg 465w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-920x692.jpg 920w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-300x226.jpg 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-14940\" class=\"wp-caption-text\">Conseils d'\u00e9co - Association de l'industrie Internet. \u00a9 Depositphotos, alphaspirit<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Les cybercriminels connaissent les failles de s\u00e9curit\u00e9 courantes et actuelles, par exemple sur les serveurs de messagerie, et recherchent sp\u00e9cifiquement les syst\u00e8mes qui ne les ont pas encore combl\u00e9es. Environ une entreprise sur cinq a connu un ou plusieurs incidents de s\u00e9curit\u00e9 graves l'ann\u00e9e derni\u00e8re, selon l'eco - Association of the Internet Industry. Dans environ 20 % de ces incidents, les cybercriminels avaient <a href=\"http:\/\/link.mediaoutreach.meltwater.com\/ls\/click?upn=tBgUFXc4cNv26XYmXro7DbQW1EatTviuCwqAnRKoECPPn-2Bpt19Gpki5qfnT42hT8sCIcbW5mUAwY5U0oz9lTljmqUAUr03GQO4oDc3oROuo3p3rp3agSeT-2Bn86D2ljOmdXbDWdVFwxQJirHs6ds25rWw1f2-2FrfLZvFRNPpVFPUhTyLI4Cnpl-2BfiJ0ZtSEq0yXLKoy-2FhTyUzt0XUQyf9BjinX18d4jliQRMyb6NlDRK4oeWZVMLYX5QiPdDj1cvk1aO_V_TCZ3FQTm-2Beo2X3vwx2Homw0sknNUn-2FwGk1O82R6mTjIPU7SqLnHq6oRVyM-2BfOgUaPSl86Cb6himg7CaWQguJODN2nw1O-2FwrkUYTZsDtR53Xaf3FsEemsFF1D0oM96I4Emf7HEeY4RTptvhaegPT-2F7lRAI25CXjSvk4xCc-2F-2FzjK5oipfUDF-2FphWmUMAbZ16sT1PP4sTT917i4QttFA7mUgsgybb1C80uPmzllrlcQjUWpHM7iaPLioGr72SgCXBP-2Fb2-2BHvCRE46OcHoU-2BkceJp-2B7AHmj7DpMvo3dHxv0Y6JBc-2FVHQC52ZPVkhF75PSt-2FZEC4lvOrONqUyhqmkPcRF0DUiYqVyln2falQjOSxmItnxwt5AzBcW3AdppRXxCOw9-2B726ul-2BaGZQxR1ZJ0Qg-2Fdg-3D-3D\">Logiciel de Troie utilis\u00e9<\/a>pour extorquer des ran\u00e7ons aux entreprises afin que les fichiers crypt\u00e9s soient \u00e0 nouveau accessibles.<\/p>\n<h2><strong>V\u00e9rifier la s\u00e9curit\u00e9 de tous les syst\u00e8mes informatiques<\/strong><\/h2>\n<p>\"Si les applications et les donn\u00e9es sont crypt\u00e9es par des chevaux de Troie d'extorsion, appel\u00e9s ransomware, et que m\u00eame les donn\u00e9es des clients sont vol\u00e9es, les entreprises subissent une grave perte de r\u00e9putation. Dans le pire des cas, la situation peut \u00eatre mena\u00e7ante sur le plan existentiel\", d\u00e9clare Markus Schaffrin, expert en s\u00e9curit\u00e9 informatique et responsable des services aux membres chez eco - Verband der Internetwirtschaft. \"Les entreprises doivent se s\u00e9curiser au maximum \u00e0 tout moment et \u00eatre capables de r\u00e9agir rapidement si le pire se produit.\" Les responsables informatiques doivent v\u00e9rifier r\u00e9guli\u00e8rement la s\u00e9curit\u00e9 de tous les syst\u00e8mes informatiques, en particulier pendant la p\u00e9riode des vacances, et former et sensibiliser leurs coll\u00e8gues. Concr\u00e8tement, eco - Verband der Internetwirtschaft e. V. (Association de l'industrie Internet) donne six conseils pour y parvenir :<\/p>\n<ol>\n<li>Maintenir tous les syst\u00e8mes \u00e0 jour \u00e0 tout moment. Pour ce faire, faites l'inventaire des logiciels et des syst\u00e8mes utilis\u00e9s : Qu'est-ce qui est utilis\u00e9 o\u00f9 ? Quels sont les syst\u00e8mes qui fonctionnent actuellement et ceux qui ont \u00e9t\u00e9 mis hors service ? D\u00e9finissez des processus pour les mises \u00e0 jour r\u00e9guli\u00e8res et les correctifs d'urgence et mettez-les en pratique avec votre personnel.<\/li>\n<li>Recueillir de mani\u00e8re proactive des informations sur les vuln\u00e9rabilit\u00e9s \u00e9ventuelles, par exemple aupr\u00e8s de la\u00a0<a href=\"applewebdata:\/\/B37B2A27-8961-461A-B72B-CCD6DB3623BF\/BSI%20-%20Bundesamt%20fu%CC%88r%20Sicherheit%20in%20der%20Informationstechnikwww.bsi.bund.de\">BSI (Office f\u00e9d\u00e9ral de la s\u00e9curit\u00e9 de l'information)<\/a>\u00a0et\u00a0<a href=\"http:\/\/link.mediaoutreach.meltwater.com\/ls\/click?upn=tBgUFXc4cNv26XYmXro7DaOjDYW4RhLud9EcNbVQ2HW56j-2B78iheXvsdvl1W4mVSJeBr_TCZ3FQTm-2Beo2X3vwx2Homw0sknNUn-2FwGk1O82R6mTjIPU7SqLnHq6oRVyM-2BfOgUaPSl86Cb6himg7CaWQguJODN2nw1O-2FwrkUYTZsDtR53Xaf3FsEemsFF1D0oM96I4Emf7HEeY4RTptvhaegPT-2F7lRAI25CXjSvk4xCc-2F-2FzjK5oipfUDF-2FphWmUMAbZ16sT1PP4sTT917i4QttFA7mUgsgybb1C80uPmzllrlcQjUVbpHPfOD0NkvMLeBYz-2BNJZ055CDKhey7YwrscSxSkWrnoshneMfsFwUDV6SUB6ucKmpCDV7xkIzX-2F2lVedO3G6QifHeDWVpMsZmmk6I4vArOu14TTDGWAakjUWvWKxi4LUN4ViBVaTQkmhPib6VOCt6iirZIyKlVHBn0UJMa0bsw-3D-3D\">CERT-Bund<\/a>. \u00c9valuer les risques et les classer en cons\u00e9quence : quels services sont les plus importants pour mon entreprise, quel est l'impact des vuln\u00e9rabilit\u00e9s sur mon activit\u00e9 ?<\/li>\n<li>Planifiez \u00e0 l'avance votre r\u00e9ponse \u00e0 une \u00e9ventuelle crise ou urgence. Pr\u00e8s d'une entreprise sur trois (31 %) n'a pas encore \u00e9tabli de plan d'urgence pour r\u00e9agir de mani\u00e8re appropri\u00e9e. Faites-le d\u00e8s que possible et informez vos employ\u00e9s en cons\u00e9quence pour limiter ou pr\u00e9venir les dommages aux organisations, aux entreprises ou aux individus.<\/li>\n<li>Sensibilisez r\u00e9guli\u00e8rement votre personnel aux cyberdangers, tels que ceux pos\u00e9s par les attaques de phishing. Former r\u00e9guli\u00e8rement les employ\u00e9s et d\u00e9velopper les comp\u00e9tences appropri\u00e9es afin que leurs coll\u00e8gues r\u00e9agissent correctement en cas de doute. En organisant r\u00e9guli\u00e8rement des formations, vous maintenez cette sensibilisation \u00e0 la s\u00e9curit\u00e9 et aux cyberdangers au c\u0153ur de la culture d'entreprise.<\/li>\n<li>Utilisez des mots de passe forts conform\u00e9ment \u00e0 la <a href=\"http:\/\/link.mediaoutreach.meltwater.com\/ls\/click?upn=tBgUFXc4cNv26XYmXro7DbQW1EatTviuCwqAnRKoECPPn-2Bpt19Gpki5qfnT42hT8sCIcbW5mUAwY5U0oz9lTliC3zbqR6aw35V-2BKyXyvpJZiPzJWAO-2FkMWLKhL9UlD9Zz3N1y26tT-2F8Zk7VP8xCrkxCZ8GNDiJ3PbQW7YBd-2Bj7sGBxWu9h-2F-2FG0LnyU4OkulfWyb7Nz2c6JNsU3zJJ-2Fl1e12y-2BdtZpu4Bg87kjdDn-2FemGy53b06W4hM6VOzBysW42V06N9gfxCWD0GfaeTdjPJNjZPAhFT8xJxYfZTqMO4fArARguvAivp13Ew7hFa9cme6eA_TCZ3FQTm-2Beo2X3vwx2Homw0sknNUn-2FwGk1O82R6mTjIPU7SqLnHq6oRVyM-2BfOgUaPSl86Cb6himg7CaWQguJODN2nw1O-2FwrkUYTZsDtR53Xaf3FsEemsFF1D0oM96I4Emf7HEeY4RTptvhaegPT-2F7lRAI25CXjSvk4xCc-2F-2FzjK5oipfUDF-2FphWmUMAbZ16sT1PP4sTT917i4QttFA7mUgsgybb1C80uPmzllrlcQjUVo6ErtPW6YJX7kz-2Fb-2FVuuF6gTh-2FHFH9LyWBzNPHVfJZnTsa-2Fe5zCKwangGbQHzzAE4BK5dH7E-2Fd6QqtFLen-2BsW9MZ-2F8q2rq72qTCPLkRqTVjj5H5s2dz4zj10C1Q-2BGU23raQ217R0r7Clg3JBzmoJXkIQnROUpWAW-2BIcUmUB-2BRhw-3D-3D\">Recommandation de la BSI<\/a>: Choisissez des mots de passe d'au moins huit caract\u00e8res, utilisez des lettres majuscules et minuscules ainsi que des caract\u00e8res sp\u00e9ciaux et des chiffres. Les mots de passe ne doivent pas \u00eatre \u00e9crits, mais uniquement stock\u00e9s de mani\u00e8re crypt\u00e9e sur l'ordinateur. Conseil : les moyens mn\u00e9motechniques peuvent vous aider \u00e0 vous souvenir de mots de passe cryptiques.<\/li>\n<li>Faites des sauvegardes r\u00e9guli\u00e8res, elles vous prot\u00e8gent, vous et votre entreprise, contre la perte de donn\u00e9es, par exemple en cas d'incidents li\u00e9s \u00e0 des ransomwares et de dommages mat\u00e9riels. Les applications pour ordinateurs, tablettes et smartphones rendent la sauvegarde possible pour tout le monde en peu de temps - par exemple via des solutions cloud ou le stockage sur un appareil externe. Sauvegarder son ordinateur et ses appareils mobiles devrait devenir un rituel indispensable, comme se brosser les dents tous les jours.<\/li>\n<\/ol>\n<p><em>Source : <a href=\"http:\/\/www.eco.de\">eco - Association de l'industrie de l'Internet\u00a0<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Autres sujets :<\/strong><\/em><\/p>\n<ul>\n<li><a href=\"http:\/\/www.m-q.ch\/fr\/10-impulsions-pour-la-politique-de-cybersecurite\/\">10 Impulsions pour la politique de cybers\u00e9curit\u00e9<\/a><\/li>\n<li><a href=\"http:\/\/www.m-q.ch\/fr\/suissedigital-elargit-son-controle-de-cybersecurite\/\"><em>Suissedigital \u00e9tend son contr\u00f4le de cybers\u00e9curit\u00e9<\/em><\/a><\/li>\n<li><a href=\"http:\/\/www.m-q.ch\/fr\/securite-informatique-des-risques-sous-estimes\/\"><em>S\u00e9curit\u00e9 informatique : des dangers sous-estim\u00e9s<\/em><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Les cybercriminels connaissent les failles de s\u00e9curit\u00e9 courantes et actuelles, par exemple sur les serveurs de messagerie, et recherchent de mani\u00e8re cibl\u00e9e les syst\u00e8mes qui ne les ont pas encore combl\u00e9es. Environ une entreprise sur cinq a connu un ou plusieurs incidents de s\u00e9curit\u00e9 graves l'ann\u00e9e derni\u00e8re, comme l'\u00e9crit l'eco - Association de l'\u00e9conomie Internet. Dans environ 20 % de ces incidents, les cybercriminels auraient utilis\u00e9 un logiciel de cheval de Troie, [...].<\/p>","protected":false},"author":35,"featured_media":14940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[5104,4499],"class_list":["post-14939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-eco-verband-der-internetwirtschaft","tag-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/fr\/six-conseils-en-matiere-de-securite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/fr\/six-conseils-en-matiere-de-securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T05:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T13:14:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"752\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Sechs IT-Security-Tipps\",\"datePublished\":\"2021-08-23T05:00:59+00:00\",\"dateModified\":\"2021-08-25T13:14:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"keywords\":[\"eco \u2013 Verband der Internetwirtschaft\",\"IT-Security\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\",\"url\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\",\"name\":\"Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"datePublished\":\"2021-08-23T05:00:59+00:00\",\"dateModified\":\"2021-08-25T13:14:18+00:00\",\"description\":\"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"width\":1000,\"height\":752,\"caption\":\"\u00a9 Depositphotos, alphaspirit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs IT-Security-Tipps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six conseils en mati\u00e8re de s\u00e9curit\u00e9 informatique - MQ Management et Qualit\u00e9","description":"L'eco - Association of the Internet Industry donne six conseils de s\u00e9curit\u00e9 informatique pour mieux se prot\u00e9ger des cybercriminels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/fr\/six-conseils-en-matiere-de-securite-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t","og_description":"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.","og_url":"https:\/\/www.m-q.ch\/fr\/six-conseils-en-matiere-de-securite-informatique\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-08-23T05:00:59+00:00","article_modified_time":"2021-08-25T13:14:18+00:00","og_image":[{"width":1000,"height":752,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Sechs IT-Security-Tipps","datePublished":"2021-08-23T05:00:59+00:00","dateModified":"2021-08-25T13:14:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","keywords":["eco \u2013 Verband der Internetwirtschaft","IT-Security"],"articleSection":["Risikomanagement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/","url":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/","name":"Six conseils en mati\u00e8re de s\u00e9curit\u00e9 informatique - MQ Management et Qualit\u00e9","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","datePublished":"2021-08-23T05:00:59+00:00","dateModified":"2021-08-25T13:14:18+00:00","description":"L'eco - Association of the Internet Industry donne six conseils de s\u00e9curit\u00e9 informatique pour mieux se prot\u00e9ger des cybercriminels.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/sechs-it-security-tipps\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","width":1000,"height":752,"caption":"\u00a9 Depositphotos, alphaspirit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Sechs IT-Security-Tipps"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestion et qualit\u00e9 du QM","description":"Plate-forme pour les syst\u00e8mes de gestion int\u00e9gr\u00e9e.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/14939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/comments?post=14939"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/14939\/revisions"}],"predecessor-version":[{"id":14941,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/14939\/revisions\/14941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media\/14940"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media?parent=14939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/categories?post=14939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/tags?post=14939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}