{"id":19885,"date":"2023-10-12T14:42:34","date_gmt":"2023-10-12T18:42:34","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=19885"},"modified":"2024-06-03T11:53:23","modified_gmt":"2024-06-03T15:53:23","slug":"cybersecurity-awareness-month-defeat-online-threats-and-achieve-superhero-status-in-your-digital-life","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/cybersecurity-awareness-month-defeat-online-threats-and-achieve-superhero-status-in-your-digital-life\/","title":{"rendered":"Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 : Vaincre les menaces en ligne"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Octobre : un mois pour renforcer la sensibilisation \u00e0 la cybers\u00e9curit\u00e9<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Le mois d'octobre n'est pas seulement synonyme de festivit\u00e9s effrayantes et de plaisirs automnaux, c'est aussi l'occasion d'\u00e9changer des id\u00e9es et des exp\u00e9riences. <strong><a href=\"https:\/\/www.getcybersafe.gc.ca\/en\/cyber-security-awareness-month\" data-type=\"link\" data-id=\"https:\/\/www.getcybersafe.gc.ca\/en\/cyber-security-awareness-month\" target=\"_blank\" rel=\"noopener\">Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9<\/a><\/strong>. C'est le moment id\u00e9al pour aiguiser vos cybercomp\u00e9tences et aider vos proches, en particulier les enfants, \u00e0 naviguer en toute s\u00e9curit\u00e9 dans le monde en ligne. Avec <strong><a href=\"https:\/\/knowledgeflow.org\/initiative\/national-cyberday-2023\/\" data-type=\"initiative\" data-id=\"19086\">Journ\u00e9e nationale du cyberespace<\/a><\/strong> qui se d\u00e9roule \u00e9galement ce mois-ci, la pression est plus forte pour que tout le monde prenne la cybers\u00e9curit\u00e9 au s\u00e9rieux.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Devenir des gardiens num\u00e9riques : Prot\u00e9ger ce qui compte le plus<\/h2>\n\n\n\n<p>Les menaces en ligne ne touchent pas seulement les grandes entreprises et les gouvernements. Elles touchent chaque jour des personnes r\u00e9elles, comme vous et moi. Tout comme les super-h\u00e9ros prot\u00e8gent les villes contre les m\u00e9chants, chacun d'entre nous peut \u00eatre le gardien de son royaume num\u00e9rique, en veillant \u00e0 ce que nos donn\u00e9es et celles de nos enfants restent \u00e0 l'abri des regards indiscrets et des intentions malveillantes.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Responsabiliser les individus : Initiatives du CAFC et de GetCyberSafe en mati\u00e8re de cybers\u00e9curit\u00e9<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Les <strong><a href=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/index-eng.htm\" data-type=\"link\" data-id=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/index-eng.htm\" target=\"_blank\" rel=\"noopener\">Centre canadien de lutte antifraude (CCLA)<\/a><\/strong> et <strong><a href=\"https:\/\/www.getcybersafe.gc.ca\/en\" data-type=\"link\" data-id=\"https:\/\/www.getcybersafe.gc.ca\/en\" target=\"_blank\" rel=\"noopener\">GetCyberSafe<\/a><\/strong> qui sont toutes deux des initiatives gouvernementales de premier plan, se font les championnes de la \"cybercomp\u00e9tence\" ce mois-ci. Avec une myriade d'activit\u00e9s et de campagnes, leur objectif est de sensibiliser les citoyens et de leur fournir des outils pour prot\u00e9ger leur environnement num\u00e9rique. La participation \u00e0 ces activit\u00e9s et \u00e9v\u00e9nements permet non seulement d'enrichir nos connaissances, mais aussi d'amplifier l'importance de la cybers\u00e9curit\u00e9.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>  <\/p>\n\n\n<style>.kb-image19885_30137f-82 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image19885_30137f-82 size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1170\" height=\"347\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/card-infog-cybersecurityruninfamily-1170x347-e.jpg\" alt=\"\" class=\"kb-img wp-image-19899\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/card-infog-cybersecurityruninfamily-1170x347-e.jpg 1170w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/card-infog-cybersecurityruninfamily-1170x347-e-600x178.jpg 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/card-infog-cybersecurityruninfamily-1170x347-e-768x228.jpg 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/card-infog-cybersecurityruninfamily-1170x347-e-18x5.jpg 18w\" sizes=\"auto, (max-width: 1170px) 100vw, 1170px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Favoriser l'\u00e9mergence d'enfants cybercomp\u00e9tents : Guides adapt\u00e9s \u00e0 l'\u00e2ge des enfants et les 10 r\u00e8gles immuables de KnowledgeFlow<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"938\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png.webp\" alt=\"\" class=\"wp-image-19918\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png.webp 938w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png-300x300.webp 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png-100x100.webp 100w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png-600x600.webp 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png-768x768.webp 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/Handouts-Image-938x938-1.png-12x12.webp 12w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>Et pour la jeune g\u00e9n\u00e9ration ? Nous avons sp\u00e9cialement con\u00e7u <strong>guides de discussion<\/strong> class\u00e9es par \u00e2ge, ce qui garantit des conversations sur la cybers\u00e9curit\u00e9 adapt\u00e9es \u00e0 l'\u00e2ge. En outre, notre rubrique \"<a href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/09\/10-immutable-rules-poster-cyberday-2023.pdf\">10 r\u00e8gles immuables de cybers\u00e9curit\u00e9<\/a>\"est une \u00e9mission incontournable pour toute la famille ! Comme les commandements de l'\u00e8re num\u00e9rique, ces r\u00e8gles guident les utilisateurs vers les meilleures pratiques, garantissant que le monde en ligne reste un espace s\u00fbr pour l'exploration, l'apprentissage et la communication.<br><br>\u00c0 tous ceux qui se pr\u00e9occupent de leur s\u00e9curit\u00e9 en ligne, voici notre appel ! Ce mois-ci, ne nous contentons pas de nous prot\u00e9ger, soyons aussi les porte-flambeaux de la cybers\u00e9curit\u00e9 au sein de nos communaut\u00e9s. Rejoignez-nous pour faire de ce mois <strong>Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9<\/strong> vraiment m\u00e9morable. Rendez-vous \u00e0 la <a href=\"https:\/\/knowledgeflow.org\/national-cyberday-2023-registration\/\">Journ\u00e9e nationale du cyberespace<\/a> pour s'inscrire, consulter les ressources, regarder les webinaires et diffuser le message.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Devenez un super-h\u00e9ros de la cybers\u00e9curit\u00e9 ! Adoptez la cybers\u00e9curit\u00e9 en octobre<\/h2>\n\n\n\n<p>Face aux menaces r\u00e9elles, nous ne devons pas oublier que dans le domaine num\u00e9rique, chacun d'entre nous peut \u00eatre un super-h\u00e9ros lorsqu'il est arm\u00e9 des bons outils et des bonnes connaissances. Alors, en ce mois d'octobre, enfilez votre cape num\u00e9rique, donnez du pouvoir \u00e0 ceux qui vous entourent et n'oubliez pas de toujours rester en s\u00e9curit\u00e9 sur Internet !<\/p>","protected":false},"excerpt":{"rendered":"<p>Octobre : un mois pour renforcer la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 Octobre n'est pas seulement synonyme de festivit\u00e9s effrayantes et de d\u00e9lices automnaux, c'est aussi...<\/p>","protected":false},"author":8,"featured_media":19970,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[537,531,388,382,534,535,533],"class_list":["post-19885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-awareness","tag-education","tag-online-safety","tag-parents","tag-privacy","tag-safety","tag-youth"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":537,"label":"Awareness"},{"value":531,"label":"Education"},{"value":388,"label":"online safety"},{"value":382,"label":"parents"},{"value":534,"label":"Privacy"},{"value":535,"label":"Safety"},{"value":533,"label":"Youth"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/10\/blog-post-featured-image-october-6-2023.png",1024,538,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":537,"name":"Awareness","slug":"awareness","term_group":0,"term_taxonomy_id":537,"taxonomy":"post_tag","description":"","parent":0,"count":68,"filter":"raw"},{"term_id":531,"name":"Education","slug":"education","term_group":0,"term_taxonomy_id":531,"taxonomy":"post_tag","description":"","parent":0,"count":48,"filter":"raw"},{"term_id":388,"name":"online safety","slug":"online-safety","term_group":0,"term_taxonomy_id":388,"taxonomy":"post_tag","description":"","parent":0,"count":63,"filter":"raw"},{"term_id":382,"name":"parents","slug":"parents","term_group":0,"term_taxonomy_id":382,"taxonomy":"post_tag","description":"","parent":0,"count":20,"filter":"raw"},{"term_id":534,"name":"Privacy","slug":"privacy","term_group":0,"term_taxonomy_id":534,"taxonomy":"post_tag","description":"","parent":0,"count":32,"filter":"raw"},{"term_id":535,"name":"Safety","slug":"safety","term_group":0,"term_taxonomy_id":535,"taxonomy":"post_tag","description":"","parent":0,"count":30,"filter":"raw"},{"term_id":533,"name":"Youth","slug":"youth","term_group":0,"term_taxonomy_id":533,"taxonomy":"post_tag","description":"","parent":0,"count":22,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/19885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=19885"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/19885\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/19970"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=19885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=19885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=19885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}