{"id":7004,"date":"2020-08-11T14:18:01","date_gmt":"2020-08-11T12:18:01","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=7004"},"modified":"2020-08-11T14:18:01","modified_gmt":"2020-08-11T12:18:01","slug":"cyberattacken-so-schuetzen-sich-kmu","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/fr\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/","title":{"rendered":"Cyberattaques : comment les PME se prot\u00e8gent"},"content":{"rendered":"<figure id=\"attachment_7005\" aria-describedby=\"caption-attachment-7005\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7005\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\" alt=\"\" width=\"680\" height=\"435\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator-16x10.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator-274x175.jpg 274w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator-547x350.jpg 547w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator-300x192.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7005\" class=\"wp-caption-text\">Pour se prot\u00e9ger des cyberattaques, les PME ont \u00e9galement besoin d'une strat\u00e9gie de s\u00e9curit\u00e9 bien pens\u00e9e. (Image : zVg \/ Dell Technologies)<\/figcaption><\/figure>\n<p>Les cyberattaques ne concernent plus seulement les particuliers et les grandes entreprises. Les petites et moyennes entreprises sont \u00e9galement de plus en plus dans le collimateur des pirates. Elles repr\u00e9sentent des cibles attrayantes si elles ne prot\u00e8gent pas suffisamment leur infrastructure informatique en raison de budgets informatiques r\u00e9duits ou d'un manque d'experts en s\u00e9curit\u00e9. De plus, de nombreux responsables informatiques sont occup\u00e9s par le fonctionnement normal de l'infrastructure informatique. Les PME manquent souvent de savoir-faire, de temps, voire des deux, pour assurer une protection et une s\u00e9curit\u00e9 efficaces des donn\u00e9es.<\/p>\n<h2><strong>Les cyberattaques se multiplient<\/strong><\/h2>\n<p>Cela est d'autant plus vrai en temps de crise, comme l'a clairement montr\u00e9 la pand\u00e9mie Covid-19. Le travail \u00e0 domicile a pos\u00e9 de tout nouveaux d\u00e9fis \u00e0 l'informatique d'entreprise pendant le lock-down.  Les criminels ont profit\u00e9 de cette situation \u00e0 leurs propres fins. Le Centre national de cybers\u00e9curit\u00e9 (NCSC) a enregistr\u00e9 trois fois plus d'incidents pendant certaines semaines du lockdown qu'avant le d\u00e9but de la pand\u00e9mie.<\/p>\n<p>Le mode op\u00e9ratoire des attaquants va du social engineering au phishing en passant par le ransomware. Les cyberattaques repr\u00e9sentent une menace s\u00e9rieuse pour les syst\u00e8mes informatiques, les applications et les donn\u00e9es des entreprises et peuvent avoir de graves cons\u00e9quences. Outre une panne temporaire des syst\u00e8mes, le vol de donn\u00e9es ou l'espionnage, une perte de confiance des clients, une atteinte \u00e0 l'image de marque ou des pertes financi\u00e8res peuvent r\u00e9sulter de l'attaque.<\/p>\n<h2><strong>Cr\u00e9er une base et prendre des mesures proactives<\/strong><\/h2>\n<p>Pour pr\u00e9venir ces sc\u00e9narios, des solutions de stockage fiables et efficaces sont indispensables comme base pour la sauvegarde et la r\u00e9cup\u00e9ration ainsi que l'archivage. Elles permettent de sauvegarder les donn\u00e9es \u00e0 court et moyen terme et de les restaurer en cas de perte. Parall\u00e8lement, il convient \u00e9galement de prendre des mesures proactives pour prot\u00e9ger les donn\u00e9es de l'entreprise.<\/p>\n<p>Les solutions de cybers\u00e9curit\u00e9 pour la d\u00e9fense contre les attaques de logiciels malveillants ainsi que les logiciels de gestion des identit\u00e9s et des acc\u00e8s (IAM), c'est-\u00e0-dire la gestion des identit\u00e9s et de leurs droits d'acc\u00e8s, sont des exemples de telles mesures proactives. Combin\u00e9es, elles bloquent les attaques malveillantes et prot\u00e8gent les donn\u00e9es stock\u00e9es sur les serveurs (locaux ou dans le nuage), les PC, les ordinateurs portables ou les appareils mobiles contre les cybermenaces et l'acc\u00e8s des utilisateurs non autoris\u00e9s.<\/p>\n<h2><strong>7 conseils pour une strat\u00e9gie de s\u00e9curit\u00e9 solide<\/strong><\/h2>\n<p>Une strat\u00e9gie globale de sauvegarde, de restauration et d'archivage ainsi que l'utilisation de solutions de cybers\u00e9curit\u00e9 et de gestion des identit\u00e9s et des acc\u00e8s sont des composants essentiels pour la s\u00e9curit\u00e9 des syst\u00e8mes informatiques et des donn\u00e9es des petites et moyennes entreprises. Les mesures suivantes permettent aux PME d'accro\u00eetre encore leur s\u00e9curit\u00e9 :<\/p>\n<ul>\n<li><strong>Emp\u00eacher le Shadow IT<\/strong>Le Shadow IT signifie que les collaborateurs utilisent des applications \u00e0 l'insu du service informatique, par exemple des services bas\u00e9s sur le cloud ou des outils grand public. Elle augmente les risques, car le service informatique ne peut pas fournir de support et perd le contr\u00f4le. Les entreprises peuvent \u00e9viter ce Shadow IT en r\u00e9pondant rapidement aux demandes des d\u00e9partements sp\u00e9cialis\u00e9s ou en introduisant et en g\u00e9rant elles-m\u00eames des outils grand public courants.<\/li>\n<li><strong>Directives de s\u00e9curit\u00e9<\/strong>Les PME devraient d\u00e9finir des directives qui fixent les strat\u00e9gies et les pratiques de s\u00e9curit\u00e9 fondamentales dans l'entreprise et que les collaborateurs doivent obligatoirement respecter. Il s'agit par exemple de r\u00e8gles pour des mots de passe s\u00fbrs, l'utilisation d'Internet \u00e0 titre priv\u00e9, l'utilisation d'appareils mobiles ou des directives pour la sauvegarde des donn\u00e9es.<\/li>\n<li><strong>Sensibilisation \u00e0 la s\u00e9curit\u00e9<\/strong>L'homme est consid\u00e9r\u00e9 comme le maillon le plus faible de la cha\u00eene de s\u00e9curit\u00e9. C'est pourquoi les entreprises devraient organiser des formations pour leurs collaborateurs sur les directives, les menaces actuelles et la mani\u00e8re de les g\u00e9rer, afin de les sensibiliser \u00e0 la s\u00e9curit\u00e9.<\/li>\n<li><strong>Mises \u00e0 jour permanentes<\/strong>Les entreprises devraient toujours maintenir leurs syst\u00e8mes et applications \u00e0 jour et installer des mises \u00e0 jour ainsi que les derniers patchs de s\u00e9curit\u00e9.<\/li>\n<li><strong>Connexions s\u00e9curis\u00e9es<\/strong>Le pare-feu du r\u00e9seau et du routeur WLAN doit toujours \u00eatre activ\u00e9, m\u00eame pour les collaborateurs travaillant \u00e0 domicile.<\/li>\n<li><strong>Protection des appareils mobiles<\/strong>Les appareils mobiles posent des d\u00e9fis consid\u00e9rables en termes de s\u00e9curit\u00e9 et de gestion. Les entreprises doivent veiller \u00e0 ce que les appareils de leurs collaborateurs soient prot\u00e9g\u00e9s par un mot de passe, \u00e0 ce que les donn\u00e9es soient crypt\u00e9es et \u00e0 ce que des applications de s\u00e9curit\u00e9 soient install\u00e9es afin d'\u00e9viter tout abus.<\/li>\n<li><strong>Gestion des mots de passe<\/strong>Dans le cadre d'une strat\u00e9gie de s\u00e9curit\u00e9 globale, les collaborateurs devraient \u00eatre tenus d'utiliser des mots de passe forts et de les changer tous les trois mois.<\/li>\n<\/ul>\n<p>Si les solutions d\u00e9crites sont utilis\u00e9es activement et que les recommandations sont appliqu\u00e9es, les PME cr\u00e9ent une s\u00e9curit\u00e9 accrue pour leurs donn\u00e9es d'entreprise sans devoir investir trop de ressources. Les logiciels malveillants sont bloqu\u00e9s, l'acc\u00e8s non autoris\u00e9 aux donn\u00e9es et la perte d'informations sensibles sont \u00e9vit\u00e9s.<\/p>\n<p><strong><em>Auteur :<br \/>\n<\/em><\/strong><em>Frank Thon\u00fcs est directeur g\u00e9n\u00e9ral pour la Suisse chez <a href=\"https:\/\/www.delltechnologies.com\/de-ch\/index.htm\">Dell Technologies<\/a>.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacken betreffen l\u00e4ngst nicht mehr nur Privatpersonen und Grossunternehmen. Auch kleinere und mittlere Unternehmen geraten zunehmend ins Visier der Angreifer. Sie stellen attraktive Ziele dar, wenn sie ihre IT-Infrastruktur aufgrund kleiner IT-Budgets oder fehlender Security-Experten nur unzureichend sch\u00fctzen. Hinzu kommt, dass viele IT-Verantwortliche mit dem normalen Betrieb der IT-Infrastruktur ausgelastet sind. F\u00fcr effektiven Datenschutz und [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cyberattacken","_yoast_wpseo_metadesc":"Um die eigene IT-Infrastruktur nachhaltig vor Cyberattacken zu sch\u00fctzen, braucht es eine klare Strategie. Eine Experte gibt Tipps.","articlekey":"","footnotes":""},"categories":[27],"tags":[115,142,156,260],"class_list":["post-7004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-checklisten","tag-cyber-crime","tag-digitalisierung","tag-ict-sicherheit"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacken: So sch\u00fctzen sich KMU - Organisator<\/title>\n<meta name=\"description\" content=\"Um die eigene IT-Infrastruktur nachhaltig vor Cyberattacken zu sch\u00fctzen, braucht es eine klare Strategie. Eine Experte gibt Tipps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacken: So sch\u00fctzen sich KMU\" \/>\n<meta property=\"og:description\" content=\"Um die eigene IT-Infrastruktur nachhaltig vor Cyberattacken zu sch\u00fctzen, braucht es eine klare Strategie. Eine Experte gibt Tipps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-11T12:18:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"#Cyberattacken: So sch\u00fctzen sich #KMU\" \/>\n<meta name=\"twitter:description\" content=\"Um die eigene #IT-Infrastruktur nachhaltig vor #Cyberattacken zu sch\u00fctzen, braucht es eine klare #Strategie. Eine Experte gibt Tipps.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Cyberattacken: So sch\u00fctzen sich KMU\",\"datePublished\":\"2020-08-11T12:18:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/\"},\"wordCount\":724,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\",\"keywords\":[\"Checklisten\",\"Cyber-Crime\",\"Digitalisierung\",\"ICT-Sicherheit\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/\",\"name\":\"Cyberattacken: So sch\u00fctzen sich KMU - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\",\"datePublished\":\"2020-08-11T12:18:01+00:00\",\"description\":\"Um die eigene IT-Infrastruktur nachhaltig vor Cyberattacken zu sch\u00fctzen, braucht es eine klare Strategie. Eine Experte gibt Tipps.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg\",\"width\":680,\"height\":435,\"caption\":\"Um sich vor Cyberattacken zu sch\u00fctzen, ben\u00f6tigen auch KMU eine durchdachte Strategie. (Bild: zVg \\\/ Dell Technologies)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2020-08-11\\\/cyberattacken-so-schuetzen-sich-kmu\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattacken: So sch\u00fctzen sich KMU\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/fr\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques : comment les PME se prot\u00e8gent - Organisateur","description":"Pour prot\u00e9ger durablement sa propre infrastructure informatique contre les cyberattaques, il faut une strat\u00e9gie claire. Un expert donne des conseils.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattacken: So sch\u00fctzen sich KMU","og_description":"Um die eigene IT-Infrastruktur nachhaltig vor Cyberattacken zu sch\u00fctzen, braucht es eine klare Strategie. Eine Experte gibt Tipps.","og_url":"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2020-08-11T12:18:01+00:00","og_image":[{"width":680,"height":435,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"#Cyberattacken: So sch\u00fctzen sich #KMU","twitter_description":"Um die eigene #IT-Infrastruktur nachhaltig vor #Cyberattacken zu sch\u00fctzen, braucht es eine klare #Strategie. Eine Experte gibt Tipps.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Cyberattacken: So sch\u00fctzen sich KMU","datePublished":"2020-08-11T12:18:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/"},"wordCount":724,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg","keywords":["Checklisten","Cyber-Crime","Digitalisierung","ICT-Sicherheit"],"articleSection":["IT"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/","url":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/","name":"Cyberattaques : comment les PME se prot\u00e8gent - Organisateur","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg","datePublished":"2020-08-11T12:18:01+00:00","description":"Pour prot\u00e9ger durablement sa propre infrastructure informatique contre les cyberattaques, il faut une strat\u00e9gie claire. Un expert donne des conseils.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2020\/08\/Cyberattacken-So-schuetzen-sich-KMU_Organisator.jpg","width":680,"height":435,"caption":"Um sich vor Cyberattacken zu sch\u00fctzen, ben\u00f6tigen auch KMU eine durchdachte Strategie. (Bild: zVg \/ Dell Technologies)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2020-08-11\/cyberattacken-so-schuetzen-sich-kmu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Cyberattacken: So sch\u00fctzen sich KMU"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organisateur","description":"Comp\u00e9tence et comp\u00e9tence. Proches de la pratique. L'ORGANISATEUR pr\u00e9pare 10 num\u00e9ros par an sur les th\u00e8mes essentiels pour les dirigeants de PME.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organisateur","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"thomas.berner","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/fr\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/7004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/comments?post=7004"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/7004\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media\/7005"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media?parent=7004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/categories?post=7004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/tags?post=7004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}