{"id":13407,"date":"2022-06-09T16:09:38","date_gmt":"2022-06-09T14:09:38","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=13407"},"modified":"2022-06-10T08:05:00","modified_gmt":"2022-06-10T06:05:00","slug":"fuenf-typische-cybersecurity-risiken-in-kmu","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/fr\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/","title":{"rendered":"Cinq risques typiques de cybers\u00e9curit\u00e9 dans les PME"},"content":{"rendered":"<figure id=\"attachment_13408\" aria-describedby=\"caption-attachment-13408\" style=\"width: 925px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13408\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg\" alt=\"\" width=\"925\" height=\"668\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg 925w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-680x491.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-768x555.jpg 768w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-18x12.jpg 18w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-242x175.jpg 242w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-485x350.jpg 485w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-920x664.jpg 920w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU-300x217.jpg 300w\" sizes=\"auto, (max-width: 925px) 100vw, 925px\" \/><figcaption id=\"caption-attachment-13408\" class=\"wp-caption-text\">Souvent, les failles de s\u00e9curit\u00e9 dans l'informatique de l'entreprise ne sont pas connues.<br \/>Image : ZVG \/ T&amp;N<\/figcaption><\/figure>\n<p>Check Point Research (CPR), les chercheurs en s\u00e9curit\u00e9 du sp\u00e9cialiste de la cybers\u00e9curit\u00e9 Check Point Software Technologies, a enregistr\u00e9 l'ann\u00e9e derni\u00e8re 65 % de cyberattaques en plus contre les entreprises suisses que l'ann\u00e9e pr\u00e9c\u00e9dente. Les PME sont une cible attrayante pour les cyber-escrocs. Leurs syst\u00e8mes de d\u00e9fense sont g\u00e9n\u00e9ralement moins \u00e9tendus que ceux des grandes entreprises et donc plus faciles \u00e0 contourner. En m\u00eame temps, les secrets d'entreprise et les donn\u00e9es des PME sont souvent essentiels \u00e0 leur survie et donc particuli\u00e8rement pr\u00e9cieux.<\/p>\n<h2>Le d\u00e9fi de la s\u00e9curit\u00e9 informatique<\/h2>\n<p>En r\u00e8gle g\u00e9n\u00e9rale, les PME sont conscientes des dangers des cybermenaces. Mais dans la pratique, il s'av\u00e8re que les failles de s\u00e9curit\u00e9 dans l'informatique de leur propre entreprise sont souvent inconnues. Nous avons rassembl\u00e9 cinq vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 que nous rencontrons fr\u00e9quemment dans les petites et moyennes entreprises :<\/p>\n<ol>\n<li>La sauvegarde des donn\u00e9es de l'entreprise est insuffisante. La r\u00e8gle g\u00e9n\u00e9rale de la strat\u00e9gie de sauvegarde 3-2-1 s'applique \u00e0 la sauvegarde des donn\u00e9es de l'entreprise. Celle-ci stipule qu'il faut disposer d'au moins trois copies des donn\u00e9es. Celles-ci doivent \u00eatre sauvegard\u00e9es sur deux supports de stockage diff\u00e9rents. Une copie de sauvegarde doit \u00eatre conserv\u00e9e sur un site externe. La sauvegarde externe est souvent n\u00e9glig\u00e9e. Le probl\u00e8me : les cyber-attaques, mais aussi les pannes de courant ou les \u00e9v\u00e9nements naturels peuvent \u00e9galement d\u00e9truire les sauvegardes de donn\u00e9es locales. La mani\u00e8re la plus simple d'externaliser une copie de sauvegarde est d'effectuer une sauvegarde automatis\u00e9e chez un fournisseur de services. Il est particuli\u00e8rement important que la sauvegarde externe soit s\u00e9par\u00e9e de la propre infrastructure et que la connexion soit crypt\u00e9e de bout en bout.<\/li>\n<li>Les collaborateurs ne sont pas sensibilis\u00e9s aux dangers imminents de la cybers\u00e9curit\u00e9. Un clic sur le mauvais lien et un logiciel malveillant est activ\u00e9... L'un des plus grands risques de s\u00e9curit\u00e9 dans l'entreprise sont les utilisateurs des syst\u00e8mes informatiques, c'est-\u00e0-dire les propres collaborateurs. Sensibiliser les collaborateurs aux cybermenaces et les pr\u00e9parer aux situations d'urgence fait aujourd'hui partie du programme obligatoire. Ceux qui souhaitent renoncer aux formations classiques peuvent recourir \u00e0 un logiciel de sensibilisation \u00e0 la s\u00e9curit\u00e9. Les solutions modernes offrent, en plus d'une plateforme d'apprentissage en ligne, la possibilit\u00e9 de simuler des attaques et de v\u00e9rifier si l'infrastructure pr\u00e9sente des failles de s\u00e9curit\u00e9 (test d'intrusion).<\/li>\n<li>Il n'existe pas de plan de r\u00e9cup\u00e9ration. Les syst\u00e8mes informatiques tombent en panne. Et maintenant ? Un plan de r\u00e9cup\u00e9ration documente la mani\u00e8re dont une organisation peut r\u00e9agir \u00e0 une urgence d'un point de vue organisationnel et technique. L'objectif d'un plan de reprise apr\u00e8s sinistre est de limiter les d\u00e9g\u00e2ts et de minimiser les interruptions de l'activit\u00e9 normale.<\/li>\n<li>Les acc\u00e8s au r\u00e9seau informatique et les interfaces Internet ne sont pas prot\u00e9g\u00e9s. Un pare-feu fait aujourd'hui partie de l'\u00e9quipement standard d'une organisation. Mais tous les pare-feux ne se valent pas. Un syst\u00e8me int\u00e9gr\u00e9 de d\u00e9tection et de pr\u00e9vention des intrusions (IDS\/IPS) est particuli\u00e8rement important en ce qui concerne les dangers du r\u00e9seau. Celui-ci surveille le r\u00e9seau \u00e0 la recherche d'anomalies et peut d\u00e9tecter \u00e0 temps les violations de r\u00e8gles et les incidents nuisibles tels que les attaques de pirates.<\/li>\n<li>Les syst\u00e8mes d'exploitation, les antivirus et les pare-feu ne sont pas \u00e0 jour. Les travaux de maintenance ne sont g\u00e9n\u00e9ralement pas tr\u00e8s appr\u00e9ci\u00e9s. Ils sont volontiers repouss\u00e9s au profit d'autres priorit\u00e9s ou ne sont pas suffisamment effectu\u00e9s. L'ex\u00e9cution s\u00e9rieuse et r\u00e9guli\u00e8re de la maintenance et des mises \u00e0 jour est pourtant la base de syst\u00e8mes s\u00fbrs et est aujourd'hui plus importante que jamais. Il s'agit par exemple d'appliquer des correctifs qui comblent de nouvelles lacunes en mati\u00e8re de s\u00e9curit\u00e9.<\/li>\n<\/ol>\n<h2>Un contr\u00f4le de s\u00e9curit\u00e9 informatique r\u00e9v\u00e8le des points faibles<\/h2>\n<p>Les petites entreprises ne peuvent plus gu\u00e8re suivre la dynamique dans le domaine de la s\u00e9curit\u00e9. Parall\u00e8lement, la pression sur la s\u00e9curit\u00e9 des donn\u00e9es de l'entreprise augmente. Aujourd'hui, il ne suffit plus d'accumuler des produits de s\u00e9curit\u00e9 pour \u00eatre totalement prot\u00e9g\u00e9. Une approche globale est n\u00e9cessaire. Un audit de s\u00e9curit\u00e9 informatique externe aide les PME \u00e0 d\u00e9couvrir les points faibles et \u00e0 d\u00e9finir les besoins de protection des actifs informatiques. En outre, un audit de s\u00e9curit\u00e9 global indique les mesures \u00e0 prendre pour rem\u00e9dier aux failles de s\u00e9curit\u00e9. Il vaut toujours la peine de faire appel \u00e0 des experts externes pour v\u00e9rifier sa propre s\u00e9curit\u00e9 informatique : Gr\u00e2ce \u00e0 leurs connaissances sp\u00e9cialis\u00e9es et \u00e0 leur regard ext\u00e9rieur, ils cr\u00e9ent de la valeur ajout\u00e9e et comblent les lacunes qui existent dans l'entreprise.<\/p>\n<h2>Auteur<\/h2>\n<p>Renato Casati est co-responsable du secteur IT chez T&amp;N, un prestataire de services TIC suisse proposant des solutions informatiques et de t\u00e9l\u00e9communication dans l'environnement professionnel.<br \/>\n&gt; <a href=\"https:\/\/www.tn-ict.com\/\">www.tn-ict.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Check Point Research (CPR), die Sicherheitsforscher des Cybersecurity-Spezialisten Check Point Software Technologies, hat im vergangenen Jahr 65 Prozent mehr Cyberattacken auf Schweizer Unternehmen registriert als noch im Vorjahr. KMU sind f\u00fcr Cyberbetr\u00fcger ein attraktives Ziel. Ihre Abwehrsysteme sind in der Regel weniger umfangreich als bei Grossunternehmen und somit einfacher zu umgehen. Gleichzeitig sind die Betriebsgeheimnisse [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13408,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cybersecurity-Risiken","_yoast_wpseo_metadesc":"Die Cybersecurity-Risiken sind den Unternehmen meistens bekannt, doch nicht alle wissen um die Sicherheitsl\u00fccken in der eigenen IT.","articlekey":"","footnotes":""},"categories":[582],"tags":[2910,115,142,260,286],"class_list":["post-13407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-operational-excellence","tag-ausgabe-5-6-2022","tag-checklisten","tag-cyber-crime","tag-ict-sicherheit","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00fcnf typische Cybersecurity-Risiken in KMU - Organisator<\/title>\n<meta name=\"description\" content=\"Die Cybersecurity-Risiken sind den Unternehmen meistens bekannt, doch nicht alle wissen um die Sicherheitsl\u00fccken in der eigenen IT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00fcnf typische Cybersecurity-Risiken in KMU - Organisator\" \/>\n<meta property=\"og:description\" content=\"Die Cybersecurity-Risiken sind den Unternehmen meistens bekannt, doch nicht alle wissen um die Sicherheitsl\u00fccken in der eigenen IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-09T14:09:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T06:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"925\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/aa2bace6c5c5aad60102004a50c4eb1c\"},\"headline\":\"F\u00fcnf typische Cybersecurity-Risiken in KMU\",\"datePublished\":\"2022-06-09T14:09:38+00:00\",\"dateModified\":\"2022-06-10T06:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/\"},\"wordCount\":643,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg\",\"keywords\":[\"Ausgabe 5-6\\\/2022\",\"Checklisten\",\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT\"],\"articleSection\":[\"OPERATIONAL EXCELLENCE\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/\",\"name\":\"F\u00fcnf typische Cybersecurity-Risiken in KMU - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg\",\"datePublished\":\"2022-06-09T14:09:38+00:00\",\"dateModified\":\"2022-06-10T06:05:00+00:00\",\"description\":\"Die Cybersecurity-Risiken sind den Unternehmen meistens bekannt, doch nicht alle wissen um die Sicherheitsl\u00fccken in der eigenen IT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg\",\"width\":925,\"height\":668,\"caption\":\"H\u00e4ufig sind Sicherheitsl\u00fccken in der eigenen Unternehmens-IT unbekannt. Bild: ZVG \\\/ T&N\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2022-06-09\\\/fuenf-typische-cybersecurity-risiken-in-kmu\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00fcnf typische Cybersecurity-Risiken in KMU\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/aa2bace6c5c5aad60102004a50c4eb1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/www.organisator.ch\"],\"url\":\"https:\\\/\\\/www.organisator.ch\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cinq risques typiques de cybers\u00e9curit\u00e9 dans les PME - Organisateur","description":"Les risques de cybers\u00e9curit\u00e9 sont g\u00e9n\u00e9ralement connus des entreprises, mais toutes ne sont pas au courant des failles de s\u00e9curit\u00e9 de leur propre informatique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/","og_locale":"fr_FR","og_type":"article","og_title":"F\u00fcnf typische Cybersecurity-Risiken in KMU - Organisator","og_description":"Die Cybersecurity-Risiken sind den Unternehmen meistens bekannt, doch nicht alle wissen um die Sicherheitsl\u00fccken in der eigenen IT.","og_url":"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2022-06-09T14:09:38+00:00","article_modified_time":"2022-06-10T06:05:00+00:00","og_image":[{"width":925,"height":668,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/"},"author":{"name":"admin","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/aa2bace6c5c5aad60102004a50c4eb1c"},"headline":"F\u00fcnf typische Cybersecurity-Risiken in KMU","datePublished":"2022-06-09T14:09:38+00:00","dateModified":"2022-06-10T06:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/"},"wordCount":643,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg","keywords":["Ausgabe 5-6\/2022","Checklisten","Cyber-Crime","ICT-Sicherheit","IT"],"articleSection":["OPERATIONAL EXCELLENCE"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/","url":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/","name":"Cinq risques typiques de cybers\u00e9curit\u00e9 dans les PME - Organisateur","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg","datePublished":"2022-06-09T14:09:38+00:00","dateModified":"2022-06-10T06:05:00+00:00","description":"Les risques de cybers\u00e9curit\u00e9 sont g\u00e9n\u00e9ralement connus des entreprises, mais toutes ne sont pas au courant des failles de s\u00e9curit\u00e9 de leur propre informatique.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/06\/Fuenf-typische-Cybersecurity-Risiken-in-KMU.jpg","width":925,"height":668,"caption":"H\u00e4ufig sind Sicherheitsl\u00fccken in der eigenen Unternehmens-IT unbekannt. Bild: ZVG \/ T&N"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2022-06-09\/fuenf-typische-cybersecurity-risiken-in-kmu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"F\u00fcnf typische Cybersecurity-Risiken in KMU"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organisateur","description":"Comp\u00e9tence et comp\u00e9tence. Proches de la pratique. L'ORGANISATEUR pr\u00e9pare 10 num\u00e9ros par an sur les th\u00e8mes essentiels pour les dirigeants de PME.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organisateur","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/aa2bace6c5c5aad60102004a50c4eb1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.organisator.ch"],"url":"https:\/\/www.organisator.ch\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/13407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/comments?post=13407"}],"version-history":[{"count":3,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/13407\/revisions"}],"predecessor-version":[{"id":13991,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/13407\/revisions\/13991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media\/13408"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media?parent=13407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/categories?post=13407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/tags?post=13407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}