{"id":24074,"date":"2023-01-04T18:21:55","date_gmt":"2023-01-04T18:21:55","guid":{"rendered":"http:\/\/35.157.126.229\/modules-de-troisieme-niveau\/"},"modified":"2024-09-09T09:05:46","modified_gmt":"2024-09-09T09:05:46","slug":"cyber-guru-awareness-modules-de-troisieme-niveau","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/","title":{"rendered":"Modules de troisi\u00e8me niveau"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb2560px\u00a0\u00bb custom_margin=\u00a0\u00bb150px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb60px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||||false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb60px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb42px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Modules de troisi\u00e8me niveau<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Formation \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 \/ <span style=\"color: #f18a00;\">Modules de troisi\u00e8me niveau<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/28-real-scam.webp\u00a0\u00bb title_text=\u00a0\u00bbarnaque\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>En pr\u00e9sentant quelques cas r\u00e9els d\u2019escroqueries qui se sont produites dans la cyber dimension, nous voulons favoriser le processus de prise de conscience de la r\u00e9alit\u00e9 du danger. Nous rappellerons \u00e9galement quelques bonnes pratiques, qui auraient \u00e9vit\u00e9 de devenir victimes d\u2019une escroquerie.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/29-phone-scam.webp\u00a0\u00bb title_text=\u00a0\u00bbarnaque t\u00e9l\u00e9phonique\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>L\u2019interaction entre les cybertechniques et les techniques plus traditionnelles telles que le classement t\u00e9l\u00e9phonique est connue sous le nom d\u2019attaques combin\u00e9es. Ces derni\u00e8res sont particuli\u00e8rement sournoises car elles tendent \u00e0 dissiper la m\u00e9fiance de certains individus \u00e0 l\u2019\u00e9gard des communications num\u00e9riques en trompant la victime.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/26-social-cyberbullying.webp\u00a0\u00bb title_text=\u00a0\u00bbr\u00e9seaux sociaux et cyberintimidation\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Ce <span>sujet, qui semble relever de la sph\u00e8re strictement priv\u00e9e avec une caract\u00e9risation sociale et culturelle, peut au contraire avoir des r\u00e9percussions du point de vue de la s\u00e9curit\u00e9, et peut \u00e9galement causer des dommages juridiques ou atteindre l\u2019image de sa propre entreprise.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/25-privacy.webp\u00a0\u00bb title_text=\u00a0\u00bbconfidentialit\u00e9\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>L\u2019utilisation des technologies num\u00e9riques, du Web et des r\u00e9seaux sociaux a un prix en termes de perte de confidentialit\u00e9. Une attitude consciente dans ce domaine peut nous permettre de vivre de mani\u00e8re \u00e9quilibr\u00e9e le rapport \u00e0 l\u2019innovation, sans pour autant payer un prix excessivement \u00e9lev\u00e9 en termes de confidentialit\u00e9.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/27-legal-aspect.webp\u00a0\u00bb title_text=\u00a0\u00bbaspects juridiques\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Violation du droit d\u2019auteur, non-respect de la r\u00e9glementation, utilisation non l\u00e9gitime de produits logiciels, diffamation, ne sont que quelques exemples d\u2019aspects juridiques li\u00e9s \u00e0 l\u2019utilisation inconsciente des technologies num\u00e9riques et aux risques de commettre des infractions, avec un impact n\u00e9gatif sur la personne et l\u2019entreprise. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/30-physical-security.webp\u00a0\u00bb title_text=\u00a0\u00bbs\u00e9curit\u00e9 physique\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>La s\u00e9curit\u00e9 physique, comme l\u2019acc\u00e8s non autoris\u00e9 aux locaux, aux ressources ou aux informations, contribue \u00e9galement \u00e0 assurer la protection des personnes et des entreprises. Bien que la s\u00e9curit\u00e9 physique au sein des entreprises soit affect\u00e9e par des r\u00e9glementations sp\u00e9cifiques, il existe des r\u00e8gles g\u00e9n\u00e9rales et des bonnes pratiques pour r\u00e9duire les risques.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/31-e-commerce.webp\u00a0\u00bb title_text=\u00a0\u00bbcommerce \u00e9lectronique\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>Les risques augmentent, ainsi que l\u2019ampleur des dommages potentiels, lorsqu\u2019une activit\u00e9 est directement li\u00e9e \u00e0 un flux de tr\u00e9sorerie, comme dans le cas du commerce \u00e9lectronique. Nous abordons le sujet en consid\u00e9rant les diff\u00e9rents types de commerce \u00e9lectronique, du B2C au B2B qui a le plus d\u2019impact pour l\u2019entreprise.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/32-holiday-business-trip.webp\u00a0\u00bb title_text=\u00a0\u00bbvoyages d\u2019affaires et d\u2019agr\u00e9ment\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>Notre cyber-vuln\u00e9rabilit\u00e9 augmente toujours lorsque nous sommes confront\u00e9s \u00e0 une situation telle que l\u2019organisation de vacances ou de voyages d\u2019affaires. Nous abordons le sujet en essayant de couvrir tout le cycle de l\u2019\u00e9v\u00e9nement \u2013 de la planification au retour \u00e0 la maison ou au bureau \u2013 en observant tous les risques qui se pr\u00e9sentent \u00e0 chacune des \u00e9tapes.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/33-cyber-hygiene.webp\u00a0\u00bb title_text=\u00a0\u00bbcyberhygi\u00e8ne\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>Maintenir les appareils dans un bon \u00e9tat d\u2019hygi\u00e8ne permet d\u2019obtenir de meilleurs r\u00e9sultats en termes de productivit\u00e9, mais surtout de r\u00e9duire les risques d\u2019atteinte \u00e0 la s\u00e9curit\u00e9 des informations. Un ensemble de bonnes pratiques sur la fa\u00e7on de maintenir une bonne hygi\u00e8ne de nos appareils et de nos donn\u00e9es.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/34-backup-restore.webp\u00a0\u00bb title_text=\u00a0\u00bbsauvegarde-restauration\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>Disposer d\u2019une strat\u00e9gie appropri\u00e9e de sauvetage et de r\u00e9cup\u00e9ration des donn\u00e9es permet de se prot\u00e9ger contre le risque de subir des dommages en cas de cyberattaque. C\u2019est une arme de d\u00e9fense qui nous permet d\u2019\u00e9viter que notre appareil ne devienne la cible de ran\u00e7ongiciel ou ne perde des donn\u00e9es importantes face \u00e0 un \u00e9v\u00e9nement technologique banal.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/24-social-engineering-2.webp\u00a0\u00bb title_text=\u00a0\u00bb24-social-engineering-2&Prime; _builder_version=\u00a0\u00bb4.27.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span>Revenons \u00e0 l\u2019ing\u00e9nierie sociale \u00e0 partir de quelques exemples tir\u00e9s de la r\u00e9alit\u00e9. De cette fa\u00e7on, des \u00e9l\u00e9ments de sensibilisation suppl\u00e9mentaires sont fournis sur les techniques utilis\u00e9es par la cybercriminalit\u00e9, devenant en fait la synth\u00e8se id\u00e9ale des \u00e9l\u00e9ments d\u00e9j\u00e0 trait\u00e9s dans les modules du troisi\u00e8me niveau.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/35-best-practice.webp\u00a0\u00bb title_text=\u00a0\u00bbmeilleures pratiques\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]L\u2019ensemble du parcours de formation est ax\u00e9 sur les meilleures pratiques, entendues comme des comportements vertueux capables de r\u00e9duire les risques cybern\u00e9tiques. Ce module fait une synth\u00e8se de ce concept en mettant l\u2019accent sur 12&nbsp;bonnes pratiques qui peuvent concr\u00e8tement aider \u00e0 r\u00e9duire le cyberrisque.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb background_position=\u00a0\u00bbbottom_center\u00a0\u00bb custom_padding=\u00a0\u00bb50px||50px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00a0\u00bb alt=\u00a0\u00bbEn savoir plus\u00a0\u00bb title_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-200px\u00a0\u00bb horizontal_offset=\u00a0\u00bb85px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-90px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-50px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_a_tablet=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_phone=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_f_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_f_phone=\u00a0\u00bb\u00a0\u00bb position_origin_f_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_r_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_r_phone=\u00a0\u00bb\u00a0\u00bb position_origin_r_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb positioning_tablet=\u00a0\u00bbabsolute\u00a0\u00bb positioning_phone=\u00a0\u00bbabsolute\u00a0\u00bb positioning_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb admin_label=\u00a0\u00bbLigne\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb70px|170px|0px|170px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|100px||100px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb70px|20px|0px|20px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|10px|10px||\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb0px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; text_font_size=\u00a0\u00bb20px\u00a0\u00bb header_2_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_2_font_size=\u00a0\u00bb48px\u00a0\u00bb header_2_line_height=\u00a0\u00bb58px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||25px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb32px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_line_height_tablet=\u00a0\u00bb58px\u00a0\u00bb header_2_line_height_phone=\u00a0\u00bb35px\u00a0\u00bb header_2_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Vous souhaitez en savoir plus&nbsp;?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px|0px|70px|0px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb1px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbCONTACTEZ-NOUS\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MTUzIn19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbPROFIL DE L\u2019ENTREPRISE\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbDEMANDEZ UNE D\u00c9MO\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00a0\u00bb alt=\u00a0\u00bbVous voulez en savoir plus\u00a0\u00bb title_text=\u00a0\u00bbVous voulez en savoir plus\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-20px\u00a0\u00bb horizontal_offset=\u00a0\u00bb-100px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-20px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-80px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-100px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-130px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb25%\u00a0\u00bb width_tablet=\u00a0\u00bb25%\u00a0\u00bb width_phone=\u00a0\u00bb25%\u00a0\u00bb width_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modules de troisi\u00e8me niveauFormation \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 \/ Modules de troisi\u00e8me niveauEn pr\u00e9sentant quelques cas r\u00e9els d\u2019escroqueries qui se sont produites dans la cyber dimension, nous voulons favoriser le processus de prise de conscience de la r\u00e9alit\u00e9 du danger. Nous rappellerons \u00e9galement quelques bonnes pratiques, qui auraient \u00e9vit\u00e9 de devenir victimes d\u2019une [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24074","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Modules de troisi\u00e8me niveau - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Lista de los m\u00f3dulos del segundo a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modules de troisi\u00e8me niveau\" \/>\n<meta property=\"og:description\" content=\"Lista de los m\u00f3dulos del segundo a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T09:05:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-troisieme-niveau\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-troisieme-niveau\\\/\",\"name\":\"Modules de troisi\u00e8me niveau - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"datePublished\":\"2023-01-04T18:21:55+00:00\",\"dateModified\":\"2024-09-09T09:05:46+00:00\",\"description\":\"Lista de los m\u00f3dulos del segundo a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-troisieme-niveau\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-troisieme-niveau\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/cyber-guru-awareness-modules-de-troisieme-niveau\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modules de troisi\u00e8me niveau\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Modules de troisi\u00e8me niveau - Cyber Guru","description":"Lista de los m\u00f3dulos del segundo a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/","og_locale":"fr_FR","og_type":"article","og_title":"Modules de troisi\u00e8me niveau","og_description":"Lista de los m\u00f3dulos del segundo a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness","og_url":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T09:05:46+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/","url":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/","name":"Modules de troisi\u00e8me niveau - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"datePublished":"2023-01-04T18:21:55+00:00","dateModified":"2024-09-09T09:05:46+00:00","description":"Lista de los m\u00f3dulos del segundo a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/cyber-guru-awareness-modules-de-troisieme-niveau\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Modules de troisi\u00e8me niveau"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/24074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=24074"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/24074\/revisions"}],"predecessor-version":[{"id":39606,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/24074\/revisions\/39606"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=24074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}