{"id":3767,"date":"2020-06-15T11:37:24","date_gmt":"2020-06-15T15:37:24","guid":{"rendered":"https:\/\/knowledgeflow.org\/sharpen-your-cybersafety-arsenal-2\/"},"modified":"2024-07-15T13:29:15","modified_gmt":"2024-07-15T17:29:15","slug":"sharpen-your-cybersafety-arsenal","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/sharpen-your-cybersafety-arsenal\/","title":{"rendered":"Am\u00e9liorez votre arsenal de cybers\u00e9curit\u00e9 pour une cybers\u00e9curit\u00e9 in\u00e9gal\u00e9e"},"content":{"rendered":"<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/10\/cropped-kcf-primary-logo-500x250-1.png.webp\" alt=\"Fondation Knowledgeflow Cybersafety.\" style=\"width:176px;height:auto\" title=\"\"><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Aff\u00fbtez votre arsenal de cybers\u00e9curit\u00e9<\/strong><\/h5>\n\n\n\n<p>\u00c0 l'\u00e8re du num\u00e9rique, la cybers\u00e9curit\u00e9 n'est pas seulement une option, c'est une n\u00e9cessit\u00e9. \u00c0 l'heure actuelle, la cybers\u00e9curit\u00e9 n'est pas une simple option, mais une n\u00e9cessit\u00e9. <a href=\"https:\/\/knowledgeflow.org\/\">KnowledgeFlow<\/a>Dans le cadre de l'initiative de la Commission europ\u00e9enne, nous vous fournissons les outils et les connaissances essentiels pour vous d\u00e9fendre contre les cybermenaces. Nos ressources sont con\u00e7ues pour \u00eatre pratiques, efficaces et faciles \u00e0 mettre en \u0153uvre, afin de vous aider \u00e0 garder une longueur d'avance sur les cybercriminels.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Trois r\u00e8gles simples pour renforcer la cybers\u00e9curit\u00e9.<\/h5>\n\n\n\n<p>1. Ignorer les courriels urgents qui vous demandent d'agir <em>maintenant<\/em>.<\/p>\n\n\n\n<p>2. Lorsqu'une violation de donn\u00e9es concerne vos donn\u00e9es, ne l'ignorez pas.<\/p>\n\n\n\n<p>3. Les ran\u00e7ongiciels impliquent un vol de donn\u00e9es ; agissez en cons\u00e9quence.<\/p>\n\n\n\n<p><a href=\"https:\/\/medium.com\/@datarisk\/sharpen-your-cybersafety-arsenal-b29518dcb266\" target=\"_blank\" rel=\"noopener\">L'article complet est disponible ici.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Affinez votre arsenal de cybers\u00e9curit\u00e9 \u00c0 l'\u00e8re du num\u00e9rique, la cybers\u00e9curit\u00e9 n'est pas seulement une option, c'est une n\u00e9cessit\u00e9....<\/p>","protected":false},"author":8,"featured_media":3801,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/Sharpen-Your-Cybersafety-Arsenal.png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":79,"filter":"raw","cat_ID":516,"category_count":79,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/3767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=3767"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/3767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/3801"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=3767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=3767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=3767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}