{"id":3215,"date":"2025-11-27T11:35:25","date_gmt":"2025-11-27T10:35:25","guid":{"rendered":"http:\/\/mon-entreprise-et-moi.test\/?page_id=3215"},"modified":"2026-04-16T11:00:55","modified_gmt":"2026-04-16T09:00:55","slug":"cyber","status":"publish","type":"page","link":"https:\/\/devakitchen.com\/MEEM\/cyber\/","title":{"rendered":"Cyber"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3215\" class=\"elementor elementor-3215\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_header e-flex e-con-boxed e-con e-parent\" data-id=\"cyb_header\" data-element_type=\"container\" id=\"page-header\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cyb_header_left e-con-full e-flex e-con e-child\" data-id=\"cyb_header_left\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_breadcrumbs elementor-widget elementor-widget-breadcrumbs\" data-id=\"cyb_breadcrumbs\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/devakitchen.com\/MEEM\/\">Accueil<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_title elementor-widget elementor-widget-heading\" data-id=\"cyb_title\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber risques en milieu professionnel<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_intro elementor-widget elementor-widget-text-editor\" data-id=\"cyb_intro\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Le risque cyber concerne l\u2019ensemble des attaques malveillantes que peuvent subir les syst\u00e8mes informatiques d\u2019une entreprise. Les grandes entreprises ne sont pas les seules \u00e0 susciter l\u2019int\u00e9r\u00eat des cybercriminels. Toutes, m\u00eame les plus petites et quel que soit leur secteur d\u2019activit\u00e9, peuvent un jour devoir faire face \u00e0 une attaque.<\/p><p>&nbsp;<\/p><p>Il est donc primordial de mettre en place des mesures de pr\u00e9vention et d\u2019inclure dans la culture d\u2019entreprise la notion de cyber s\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_header_right e-con-full e-flex e-con e-child\" data-id=\"cyb_header_right\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_header_img elementor-widget elementor-widget-image\" data-id=\"cyb_header_img\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1938\" height=\"1293\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png\" class=\"attachment-full size-full wp-image-3876\" alt=\"\" srcset=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png 1938w, https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise-300x200.png 300w, https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise-150x100.png 150w, https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise-768x512.png 768w\" sizes=\"(max-width: 1938px) 100vw, 1938px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_body e-flex e-con-boxed e-con e-parent\" data-id=\"cyb_body\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_s1_title elementor-widget elementor-widget-heading\" data-id=\"cyb_s1_title\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Anticiper et R\u00e9agir<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_s1_text elementor-widget elementor-widget-text-editor\" data-id=\"cyb_s1_text\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AXA Pr\u00e9vention est partenaire de l\u2019ASSOVICA, association qui apporte son aide et son soutien aux victimes professionnelles des cyberattaques ciblant les organisations. D\u00e9couvrez les bons conseils de pr\u00e9vention pour se pr\u00e9munir et agir en cas de cyberattaque.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_carousel1_container e-con-full e-flex e-con e-child\" data-id=\"cyb_carousel1_container\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_carousel1 elementor-widget elementor-widget-loop-carousel\" data-id=\"cyb_carousel1\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;2647&quot;,&quot;slides_to_show&quot;:&quot;2&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t<style id=\"loop-2647\">.elementor-2647 .elementor-element.elementor-element-71b0a9ff{--display:flex;}.elementor-2647 .elementor-element.elementor-element-71b0a9ff.e-con{--flex-grow:0;--flex-shrink:0;}.elementor-2647 .elementor-element.elementor-element-3f681aa0{margin:20px 020px calc(var(--kit-widget-spacing, 0px) + 0px) 020px;}.elementor-2647 .elementor-element.elementor-element-2eac2b2b{margin:0px 20px calc(var(--kit-widget-spacing, 0px) + 0px) 20px;}.elementor-2647 .elementor-element.elementor-element-7686d6bf{margin:20px 20px calc(var(--kit-widget-spacing, 0px) + 0px) 20px;}@media(min-width:768px){.elementor-2647 .elementor-element.elementor-element-71b0a9ff{--width:100%;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3840 post-3840 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-pdf\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/assovica-aide-soutien-victimes-professionnelles-cyberattaques-rl0po9xyykktr34q30urfmtuo0hbx9mtc4fmqbas00.jpeg\" title=\"ASSOVICA aide soutien victimes cyberattaques\" alt=\"ASSOVICA aide soutien victimes cyberattaques\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>PDF<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7 fiches ASSOVICA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAXA Pr\u00e9vention est partenaire de l\u2019ASSOVICA, association qui apporte son aide et son soutien aux victimes professionnelles des cyberattaques ciblant les organisations. D\u00e9couvrez les bons conseils de pr\u00e9vention pour se pr\u00e9munir et agir en cas de cyberattaque.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/devakitchen.com\/MEEM\/7-fiches-assovica\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3841 post-3841 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-e-learning\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/cyber-securite-rl0pocrhj2oopx0mmk2n5448g63fkcy0cie3656lhc.jpeg\" title=\"Essentiels cybers\u00e9curit\u00e9 e-learning\" alt=\"Essentiels cybers\u00e9curit\u00e9 e-learning\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>E-learning<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les Essentiels de la Cybers\u00e9curit\u00e9<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tE-learning de 25 minutes gratuit. Cette formation 2D immersive permet de mieux comprendre les enjeux, identifier les diff\u00e9rents types de cyberattaques, s\u2019entra\u00eener avec des mises en situation et acqu\u00e9rir les bons r\u00e9flexes pour s\u00e9curiser au mieux votre activit\u00e9.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/devakitchen.com\/MEEM\/les-essentiels-de-la-cybersecurite\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_section2 e-flex e-con-boxed e-con e-parent\" data-id=\"cyb_section2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_s2_title elementor-widget elementor-widget-heading\" data-id=\"cyb_s2_title\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Se prot\u00e9ger et S\u2019adapter<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_s2_text elementor-widget elementor-widget-text-editor\" data-id=\"cyb_s2_text\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Retrouvez les r\u00e8gles simples et efficaces pour adopter une cyber hygi\u00e8ne.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_carousel2_container e-con-full e-flex e-con e-child\" data-id=\"cyb_carousel2_container\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_carousel2 elementor-widget elementor-widget-loop-carousel\" data-id=\"cyb_carousel2\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;2647&quot;,&quot;slides_to_show&quot;:&quot;2&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3842 post-3842 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/cyber_guide-cyber-securite_mockup-scaled-rlggkz67qyjujqcrlsou2ki6jolccsrelta9aj45ds.png\" title=\"cyber_guide-cyber-securite_mockup\" alt=\"cyber_guide-cyber-securite_mockup\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Guide de cyber s\u00e9curit\u00e9<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tLes bonnes pratiques et les r\u00e9flexes \u00e0 adopter pour prot\u00e9ger votre entreprise contre les cybermenaces.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2021\/05\/Guide-de-cybersecurite-a-destination-des-dirigeants-de-TPE-PME-et-ETI.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3843 post-3843 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/cyber-hygiene-entreprise-rl0poavt5em42p3cxj9e04lb9ecp4yqjo9347l9dts.jpeg\" title=\"Cyber hygi\u00e8ne entreprise\" alt=\"Cyber hygi\u00e8ne entreprise\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6 r\u00e8gles simples de cyber hygi\u00e8ne<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tEn adoptant une cyber hygi\u00e8ne, prot\u00e9gez votre entreprise avec 6 r\u00e8gles simples et efficaces.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/en-securite-au-travail.fr\/wp-content\/uploads\/Six-regles.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_section3 e-flex e-con-boxed e-con e-parent\" data-id=\"cyb_section3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_s3_title elementor-widget elementor-widget-heading\" data-id=\"cyb_s3_title\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">S\u2019informer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_s3_text elementor-widget elementor-widget-text-editor\" data-id=\"cyb_s3_text\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Les principales cyber attaques et leurs mesures de pr\u00e9vention.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_carousel3_container e-con-full e-flex e-con e-child\" data-id=\"cyb_carousel3_container\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_carousel3 elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-loop-carousel\" data-id=\"cyb_carousel3\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;2647&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show&quot;:&quot;3&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3844 post-3844 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/rancongiciel-entreprise-tpe-pme-rl0poieio2wenksfpmiek2p00hbmujkedab01sy8g0.jpeg\" title=\"Ran\u00e7ongiciel entreprise TPE PME\" alt=\"Ran\u00e7ongiciel entreprise TPE PME\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Le ran\u00e7ongiciel<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tComprenez comment r\u00e9agir face \u00e0 un ransomware et \u00e9viter de perdre vos donn\u00e9es.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2019\/11\/230417_FicheReflexe_Rancongiciels.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3845 post-3845 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/hameconnage-entreprise-tpe-pme-rl0pofl03ksjoqwj63aiulem8bpj7g97cwcjlz2eyo.jpeg\" title=\"Hame\u00e7onnage entreprise TPE PME\" alt=\"Hame\u00e7onnage entreprise TPE PME\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">L\u2019Hame\u00e7onnage<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tRep\u00e9rez les pi\u00e8ges, prot\u00e9gez vos donn\u00e9es et adoptez les bons r\u00e9flexes anti-fraude.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2022\/12\/230417_FicheReflexe_Hameconnage.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3846 post-3846 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/attaque-d\u00e9ni-service-tpe-pme-rl0poavt5em42p3cxj9e04lb9ecp4yqjo9347l9dts.png\" title=\"Attaque d\u00e9ni de service TPE PME\" alt=\"Attaque d\u00e9ni de service TPE PME\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les attaques en d\u00e9ni de service<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tD\u00e9couvrez comment faire face \u00e0 une attaque qui bloque votre service ou votre site.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2019\/10\/230417_FicheReflexe_DeniService.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3847 post-3847 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/piratage-systeme-informatique-tpe-pme-rl0pohgoh8v4bytsv43rzkxjf3g9mugo15nikizmm8.jpeg\" title=\"Piratage syst\u00e8me informatique TPE PME\" alt=\"Piratage syst\u00e8me informatique TPE PME\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Le piratage d\u2019un syst\u00e8me informatique<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tComment r\u00e9agir vite apr\u00e8s un piratage et \u00e9viter que l\u2019attaque ne se propage ?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2022\/04\/230417_FicheReflexe_Piratage_Particuliers.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3848 post-3848 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/virus-informatiques-tpe-pme-rl0pojccuwxoz6r2k4x14kgglv7028o4peyhj2wu9s.jpeg\" title=\"Virus informatiques TPE PME\" alt=\"Virus informatiques TPE PME\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les virus informatiques<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tApprenez \u00e0 rep\u00e9rer, supprimer et pr\u00e9venir les virus qui menacent vos appareils.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2021\/05\/230417_FicheReflexe_Virus.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"2647\" class=\"elementor elementor-2647 swiper-slide e-loop-item e-loop-item-3849 post-3849 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber tag-lien\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-71b0a9ff aller-plus-loin-bloc e-con-full e-flex e-con e-parent\" data-id=\"71b0a9ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9855e1c elementor-widget elementor-widget-image\" data-id=\"9855e1c\" data-element_type=\"widget\" target=\"\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/elementor\/thumbs\/premieres-actions-cyber-attaque-tpe-pme-entreprise-rl0pohgoh8v4bytsv43rzkxjf3g9mugo15nikizmm8.jpeg\" title=\"Premi\u00e8res actions cyber attaque\" alt=\"Premi\u00e8res actions cyber attaque\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f681aa0 elementor-widget elementor-widget-heading\" data-id=\"3f681aa0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><span>Lien<\/span><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eac2b2b elementor-widget elementor-widget-heading\" data-id=\"2eac2b2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les premi\u00e8res actions en cas de cyberattaque<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7686d6bf elementor-widget elementor-widget-text-editor\" data-id=\"7686d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tD\u00e9couvrez les bons r\u00e9flexes pour ma\u00eetriser une cybercrise et prot\u00e9ger votre organisation.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a17ffc6 elementor-widget elementor-widget-button\" data-id=\"4a17ffc6\" data-element_type=\"widget\" target=\"\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2022\/01\/Fiche_QueFaireCyberAttaque_Dirigeants.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je consulte<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Pr\u00e9c\u00e9dent\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Suivant\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cyb_questions e-flex e-con-boxed e-con e-parent\" data-id=\"cyb_questions\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cyb_q_title elementor-widget elementor-widget-heading\" data-id=\"cyb_q_title\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Questions fr\u00e9quentes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-faq_acc elementor-widget elementor-widget-n-accordion\" data-id=\"faq_acc\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1020\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1020\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Combien de temps faut-il en moyenne pour pirater un mot de passe\u00a0? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1020\" class=\"elementor-element elementor-element-faq_c0 e-con-full e-flex e-con e-child\" data-id=\"faq_c0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-faq_t0 elementor-widget elementor-widget-text-editor\" data-id=\"faq_t0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>30 secondes, c\u2019est le temps n\u00e9cessaire pour pirater un mot de passe de 8 caract\u00e8res dont majuscules, minuscules, chiffres et caract\u00e8res sp\u00e9ciaux.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1021\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1021\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Les TPE\/PME se pr\u00e9parent-elles aux attaques\u00a0? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1021\" class=\"elementor-element elementor-element-faq_c1 e-con-full e-flex e-con e-child\" data-id=\"faq_c1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-faq_t1 elementor-widget elementor-widget-text-editor\" data-id=\"faq_t1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>80% ne sont pas pr\u00e9par\u00e9es aux attaques. <em>Source\u00a0: France Num, octobre 2025<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1022\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1022\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Quel pourcentage de TPE\/PME a d\u00e9j\u00e0 \u00e9t\u00e9 confront\u00e9 \u00e0 un incident de cyber s\u00e9curit\u00e9\u00a0? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1022\" class=\"elementor-element elementor-element-faq_c2 e-con-full e-flex e-con e-child\" data-id=\"faq_c2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-faq_t2 elementor-widget elementor-widget-text-editor\" data-id=\"faq_t2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>36%. <em>Source\u00a0: Barom\u00e8tre France Num 2025<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber risques en milieu professionnel Le risque cyber concerne l\u2019ensemble des attaques malveillantes que peuvent subir les syst\u00e8mes informatiques d\u2019une entreprise. Les grandes entreprises ne sont pas les seules \u00e0 susciter l\u2019int\u00e9r\u00eat des cybercriminels. Toutes, m\u00eame les plus petites et quel que soit leur secteur d\u2019activit\u00e9, peuvent un jour devoir faire face \u00e0 une attaque. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3876,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3215","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber - Mon Entreprise et Moi<\/title>\n<meta name=\"description\" content=\"AXA Pr\u00e9vention vous accompagne gratuitement dans la mise en place de mesures de pr\u00e9vention des cyber risques.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber - Mon Entreprise et Moi\" \/>\n<meta property=\"og:description\" content=\"AXA Pr\u00e9vention vous accompagne gratuitement dans la mise en place de mesures de pr\u00e9vention des cyber risques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devakitchen.com\/MEEM\/cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Mon Entreprise et Moi\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T09:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/\",\"url\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/\",\"name\":\"Cyber - Mon Entreprise et Moi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyber-securite-entreprise.png\",\"datePublished\":\"2025-11-27T10:35:25+00:00\",\"dateModified\":\"2026-04-16T09:00:55+00:00\",\"description\":\"AXA Pr\u00e9vention vous accompagne gratuitement dans la mise en place de mesures de pr\u00e9vention des cyber risques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/#primaryimage\",\"url\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyber-securite-entreprise.png\",\"contentUrl\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyber-securite-entreprise.png\",\"width\":1938,\"height\":1293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/cyber\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/#website\",\"url\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/\",\"name\":\"Mon Entreprise et Moi\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/#organization\",\"name\":\"Mon Entreprise et Moi\",\"url\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Mon Entreprise et Moi\"},\"image\":{\"@id\":\"https:\\\/\\\/devakitchen.com\\\/MEEM\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber - Mon Entreprise et Moi","description":"AXA Pr\u00e9vention vous accompagne gratuitement dans la mise en place de mesures de pr\u00e9vention des cyber risques.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Cyber - Mon Entreprise et Moi","og_description":"AXA Pr\u00e9vention vous accompagne gratuitement dans la mise en place de mesures de pr\u00e9vention des cyber risques.","og_url":"https:\/\/devakitchen.com\/MEEM\/cyber\/","og_site_name":"Mon Entreprise et Moi","article_modified_time":"2026-04-16T09:00:55+00:00","og_image":[{"width":1938,"height":1293,"url":"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/devakitchen.com\/MEEM\/cyber\/","url":"https:\/\/devakitchen.com\/MEEM\/cyber\/","name":"Cyber - Mon Entreprise et Moi","isPartOf":{"@id":"https:\/\/devakitchen.com\/MEEM\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devakitchen.com\/MEEM\/cyber\/#primaryimage"},"image":{"@id":"https:\/\/devakitchen.com\/MEEM\/cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png","datePublished":"2025-11-27T10:35:25+00:00","dateModified":"2026-04-16T09:00:55+00:00","description":"AXA Pr\u00e9vention vous accompagne gratuitement dans la mise en place de mesures de pr\u00e9vention des cyber risques.","breadcrumb":{"@id":"https:\/\/devakitchen.com\/MEEM\/cyber\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devakitchen.com\/MEEM\/cyber\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/devakitchen.com\/MEEM\/cyber\/#primaryimage","url":"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png","contentUrl":"https:\/\/devakitchen.com\/MEEM\/wp-content\/uploads\/2026\/03\/cyber-securite-entreprise.png","width":1938,"height":1293},{"@type":"BreadcrumbList","@id":"https:\/\/devakitchen.com\/MEEM\/cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/devakitchen.com\/MEEM\/"},{"@type":"ListItem","position":2,"name":"Cyber"}]},{"@type":"WebSite","@id":"https:\/\/devakitchen.com\/MEEM\/#website","url":"https:\/\/devakitchen.com\/MEEM\/","name":"Mon Entreprise et Moi","description":"","publisher":{"@id":"https:\/\/devakitchen.com\/MEEM\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devakitchen.com\/MEEM\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/devakitchen.com\/MEEM\/#organization","name":"Mon Entreprise et Moi","url":"https:\/\/devakitchen.com\/MEEM\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/devakitchen.com\/MEEM\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Mon Entreprise et Moi"},"image":{"@id":"https:\/\/devakitchen.com\/MEEM\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/pages\/3215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/comments?post=3215"}],"version-history":[{"count":62,"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/pages\/3215\/revisions"}],"predecessor-version":[{"id":4106,"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/pages\/3215\/revisions\/4106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/media\/3876"}],"wp:attachment":[{"href":"https:\/\/devakitchen.com\/MEEM\/wp-json\/wp\/v2\/media?parent=3215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}