{"id":24062,"date":"2023-01-04T17:54:00","date_gmt":"2023-01-04T17:54:00","guid":{"rendered":"http:\/\/35.157.126.229\/modules-de-premier-niveau\/"},"modified":"2024-09-09T08:54:48","modified_gmt":"2024-09-09T08:54:48","slug":"cyber-guru-awareness-modules-de-premier-niveau","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/","title":{"rendered":"Modules de premier niveau"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb2560px\u00a0\u00bb custom_margin=\u00a0\u00bb150px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb60px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||||false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb60px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb42px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Modules de premier niveau<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Formation \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 \/ <span style=\"color: #f18a00;\">Modules de premier niveau<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Phishing.webp\u00a0\u00bb title_text=\u00a0\u00bbHame\u00e7onnage\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>L\u2019HAME\u00c7ONNAGE est la technique d\u2019attaque la plus courante utilis\u00e9e par les cybercriminels. <span>Elle est particuli\u00e8rement sournoise car elle est bas\u00e9e sur une tromperie, qui tente d\u2019inciter la victime potentielle \u00e0 entreprendre une action qui permet au criminel de lancer son attaque. Il est crucial de la reconna\u00eetre afin de prendre des contre-mesures.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Password.webp\u00a0\u00bb title_text=\u00a0\u00bbMot de passe\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>L\u2019un des piliers de la cybers\u00e9curit\u00e9 est le MOT DE PASSE, la cl\u00e9 d\u2019acc\u00e8s \u00e0 toutes les ressources informatiques auxquelles vous devez garantir un acc\u00e8s s\u00e9curis\u00e9 et confidentiel. La gestion de vos MOTS DE PASSE devient donc un \u00e9l\u00e9ment fondamental des strat\u00e9gies d\u00e9fensives, de la personne et de l\u2019entreprise. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Social-Media.webp\u00a0\u00bb title_text=\u00a0\u00bbR\u00e9seaux sociaux\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les R\u00c9SEAUX SOCIAUX repr\u00e9sentent un nouveau mode de socialisation qui rec\u00e8le de multiples risques. L\u2019<span>utilisation consciente de ces outils est la seule solution pour vous prot\u00e9ger et prot\u00e9ger votre entreprise contre les risques que le partage en r\u00e9seau de contenus personnels et professionnels peut engendrer<\/span>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Privacy-Personal-Data.png\u00a0\u00bb alt=\u00a0\u00bbPrivacy &#038; Personal Data\u00a0\u00bb title_text=\u00a0\u00bbPrivacy &#038; Personal Data\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>L\u2019introduction du r\u00e8glement europ\u00e9en sur la protection des donn\u00e9es (RGPD) a accru la sensibilit\u00e9 des entreprises \u00e0 la protection de la VIE PRIV\u00c9E et des donn\u00e9es sensibles. <span>Il est important que tous les membres d\u2019une entreprise soient plus sensibles \u00e0 la protection des donn\u00e9es.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Mobile-App.webp\u00a0\u00bb title_text=\u00a0\u00bbApplications mobiles\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les APPAREILS MOBILES sont des outils qui deviennent de plus en plus critiques et qui sont expos\u00e9s \u00e0 un niveau tr\u00e8s \u00e9lev\u00e9 de chevauchement de la sph\u00e8re personnelle et professionnelle. Ce n\u2019est qu\u2019<span>en permettant de bonnes pratiques d\u2019utilisation que l\u2019on peut augmenter le niveau de s\u00e9curit\u00e9 et de protection des donn\u00e9es.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Modulo-AI.png\u00a0\u00bb alt=\u00a0\u00bbArtificial Intelligence\u00a0\u00bb title_text=\u00a0\u00bbModulo AI\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.27.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>L&rsquo;utilisation d&rsquo;outils d&rsquo;IA peut pr\u00e9senter des risques pour la cybers\u00e9curit\u00e9, soit en renfor\u00e7ant des menaces d\u00e9j\u00e0 existantes, soit en en g\u00e9n\u00e9rant de nouvelles. Le module rappelle quelques bonnes pratiques qui soulignent le r\u00f4le d\u00e9cisif du facteur humain dans la pr\u00e9vention.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/USB-Storage.webp\u00a0\u00bb title_text=\u00a0\u00bbStockage USB\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Tous les p\u00e9riph\u00e9riques USB, et en particulier les p\u00e9riph\u00e9riques de stockage, peuvent devenir un point critique quant \u00e0 la n\u00e9cessit\u00e9 de prot\u00e9ger les informations confidentielles. Conna\u00eetre <span>les risques associ\u00e9s aux p\u00e9riph\u00e9riques USB est le point de d\u00e9part pour \u00e9viter les ph\u00e9nom\u00e8nes de vol de donn\u00e9es.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/malware.webp\u00a0\u00bb title_text=\u00a0\u00bblogiciel malveillant\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les LOGICIELS MALVEILLANTS en g\u00e9n\u00e9ral et les RAN\u00c7ONGICIELS en particulier ont rapidement fait la une des journaux, soulignant toute leur dangerosit\u00e9. Pour infecter votre appareil, un clic inconscient suffit et un <span>logiciel anti-virus ne peut pas nous garantir une protection totale contre ces programmes malveillants.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/e-mail-security.webp\u00a0\u00bb title_text=\u00a0\u00bbS\u00e9curit\u00e9 du courrier \u00e9lectronique\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>Le COURRIER \u00c9LECTRONIQUE est un outil de plus en plus important, qui joue un r\u00f4le central et particuli\u00e8rement critique dans la vie professionnelle. Les COURRIELS contiennent souvent des informations sensibles. La sous-estimation de l\u2019aspect s\u00e9curit\u00e9 peut entra\u00eener de graves risques pour vous et votre entreprise.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Web-Browsing.webp\u00a0\u00bb title_text=\u00a0\u00bbNavigation sur internet\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>La navigation sur internet peut cacher de nombreux risques. <span>Une bonne connaissance de certaines caract\u00e9ristiques particuli\u00e8res des sites internet et des navigateurs en particulier peut aider \u00e0 r\u00e9duire consid\u00e9rablement le niveau de risque. Acqu\u00e9rir les \u00e9l\u00e9ments cognitifs pour naviguer sur le WEB en toute s\u00e9curit\u00e9 est un \u00e9l\u00e9ment fondamental pour \u00e9viter les cyberrisques.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Deepfake.png\u00a0\u00bb title_text=\u00a0\u00bbDeepfake\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb alt=\u00a0\u00bbDeepfake\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.27.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Les deepfakes sont une technique avanc\u00e9e qui utilise l&rsquo;intelligence artificielle pour cr\u00e9er des contenus num\u00e9riques faux mais extr\u00eamement r\u00e9alistes. Les risques li\u00e9s \u00e0 l&rsquo;utilisation de cette technologie sont analys\u00e9s, y compris les abus potentiels dans les sph\u00e8res personnelles et professionnelles, et des conseils pratiques sont propos\u00e9s pour reconna\u00eetre les deepfakes et s&rsquo;en prot\u00e9ger.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Social-Engineering-1.webp\u00a0\u00bb title_text=\u00a0\u00bbIng\u00e9nierie sociale 1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Le social engineering, ou ing\u00e9nierie sociale, est le point de d\u00e9part de toutes les strat\u00e9gies de cyberattaques. Il s\u2019agit d\u2019une strat\u00e9gie qui mise sur la tromperie et la manipulation <span>psychologique \u00e0 des fins malveillantes. Pour rendre l\u2019attaque plus efficace, le c\u0153ur de cette strat\u00e9gie est l\u2019acquisition d\u2019informations sur la victime choisie. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb background_position=\u00a0\u00bbbottom_center\u00a0\u00bb custom_padding=\u00a0\u00bb50px||50px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00a0\u00bb alt=\u00a0\u00bbEn savoir plus\u00a0\u00bb title_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-200px\u00a0\u00bb horizontal_offset=\u00a0\u00bb85px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-90px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-50px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_a_tablet=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_phone=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_f_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_f_phone=\u00a0\u00bb\u00a0\u00bb position_origin_f_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_r_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_r_phone=\u00a0\u00bb\u00a0\u00bb position_origin_r_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb positioning_tablet=\u00a0\u00bbabsolute\u00a0\u00bb positioning_phone=\u00a0\u00bbabsolute\u00a0\u00bb positioning_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb admin_label=\u00a0\u00bbLigne\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb70px|170px|0px|170px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|100px||100px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb70px|20px|0px|20px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|10px|10px||\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb0px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; text_font_size=\u00a0\u00bb20px\u00a0\u00bb header_2_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_2_font_size=\u00a0\u00bb48px\u00a0\u00bb header_2_line_height=\u00a0\u00bb58px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||25px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb32px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_line_height_tablet=\u00a0\u00bb58px\u00a0\u00bb header_2_line_height_phone=\u00a0\u00bb35px\u00a0\u00bb header_2_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Vous souhaitez en savoir plus&nbsp;?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px|0px|70px|0px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb1px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbCONTACTEZ-NOUS\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MTUzIn19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbPROFIL DE L\u2019ENTREPRISE\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbDEMANDEZ UNE D\u00c9MO\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00a0\u00bb alt=\u00a0\u00bbVous voulez en savoir plus\u00a0\u00bb title_text=\u00a0\u00bbVous voulez en savoir plus\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-20px\u00a0\u00bb horizontal_offset=\u00a0\u00bb-100px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-20px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-80px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-100px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-130px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb25%\u00a0\u00bb width_tablet=\u00a0\u00bb25%\u00a0\u00bb width_phone=\u00a0\u00bb25%\u00a0\u00bb width_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modules de premier niveauFormation \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 \/ Modules de premier niveauL\u2019HAME\u00c7ONNAGE est la technique d\u2019attaque la plus courante utilis\u00e9e par les cybercriminels. Elle est particuli\u00e8rement sournoise car elle est bas\u00e9e sur une tromperie, qui tente d\u2019inciter la victime potentielle \u00e0 entreprendre une action qui permet au criminel de lancer son attaque. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24062","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Modules de premier niveau - Cyber Guru<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez la liste des modules de la premi\u00e8re ann\u00e9e d&#039;apprentissage du programme de formation cognitive de Cyber Guru Awareness\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modules de premier niveau\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez la liste des modules de la premi\u00e8re ann\u00e9e d&#039;apprentissage du programme de formation cognitive de Cyber Guru Awareness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T08:54:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-premier-niveau\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-premier-niveau\\\/\",\"name\":\"Modules de premier niveau - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"datePublished\":\"2023-01-04T17:54:00+00:00\",\"dateModified\":\"2024-09-09T08:54:48+00:00\",\"description\":\"D\u00e9couvrez la liste des modules de la premi\u00e8re ann\u00e9e d'apprentissage du programme de formation cognitive de Cyber Guru Awareness\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-premier-niveau\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-premier-niveau\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-premier-niveau\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modules de premier niveau\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Modules de premier niveau - Cyber Guru","description":"D\u00e9couvrez la liste des modules de la premi\u00e8re ann\u00e9e d'apprentissage du programme de formation cognitive de Cyber Guru Awareness","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/","og_locale":"fr_FR","og_type":"article","og_title":"Modules de premier niveau","og_description":"D\u00e9couvrez la liste des modules de la premi\u00e8re ann\u00e9e d'apprentissage du programme de formation cognitive de Cyber Guru Awareness","og_url":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T08:54:48+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/","url":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/","name":"Modules de premier niveau - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"datePublished":"2023-01-04T17:54:00+00:00","dateModified":"2024-09-09T08:54:48+00:00","description":"D\u00e9couvrez la liste des modules de la premi\u00e8re ann\u00e9e d'apprentissage du programme de formation cognitive de Cyber Guru Awareness","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-premier-niveau\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Modules de premier niveau"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/24062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=24062"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/24062\/revisions"}],"predecessor-version":[{"id":39604,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/24062\/revisions\/39604"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=24062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}