{"id":35601,"date":"2022-08-04T05:00:00","date_gmt":"2022-08-04T11:00:00","guid":{"rendered":"https:\/\/memberpress.com\/?p=35601"},"modified":"2022-11-16T15:13:35","modified_gmt":"2022-11-16T22:13:35","slug":"what-are-cyber-threats-and-what-to-do-about-them","status":"publish","type":"post","link":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","title":{"rendered":"Comment lutter contre les cybermenaces (10 fa\u00e7ons)"},"content":{"rendered":"<p>Notre monde num\u00e9rique moderne regorge de processus et de fonctions uniques qui am\u00e9liorent la qualit\u00e9 de la vie et du travail. Cependant, ces technologies pr\u00e9sentent \u00e9galement certains dangers, et aucune entreprise ou organisation informatique n'est \u00e0 l'abri de ces menaces. <\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69da122ee847a\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">CE QU'IL Y A \u00c0 L'INT\u00c9RIEUR<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69da122ee847a\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#What_are_Cyber_Threats\" >Qu'est-ce que les cybermenaces ?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Why_Protect_Yourself_from_Cybersecurity_Threats\" >Pourquoi se prot\u00e9ger contre les menaces de cybers\u00e9curit\u00e9 ?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Where_Do_Cyber_Threats_Come_From\" >D'o\u00f9 viennent les cybermenaces ?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Types_of_Cyber_Threats\" >Types de cybermenaces<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Malware\" >Logiciels malveillants<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#DDoS_Attacks\" >Attaques DDoS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#_Phishing\" >\u00a0Hame\u00e7onnage<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Ransomware\" >Ransomware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Zero-Day_Exploits\" >Exploits de type Zero-Day<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Man-in-the-Middle_Attacks\" >Attaques de type \"Man-in-the-Middle<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Password_Attacks\" >Attaques par mot de passe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Data_Breaches\" >Violations de donn\u00e9es<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#_IoT_Device_Threats\" >\u00a0Menaces li\u00e9es aux dispositifs IdO<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#10_Ways_to_Protect_Yourself_from_Cyber_Threats\" >10 fa\u00e7ons de se prot\u00e9ger contre les cybermenaces<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Make_cybersecurity_a_top_priority\" >Faire de la cybers\u00e9curit\u00e9 une priorit\u00e9 absolue<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Update_with_security_patches\" >Mise \u00e0 jour des correctifs de s\u00e9curit\u00e9<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Train_your_team\" >Former votre \u00e9quipe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Dont_click_links\" >Ne cliquez pas sur les liens<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Check_out_your_sender\" >V\u00e9rifiez votre exp\u00e9diteur<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Update_your_devices\" >Mettez \u00e0 jour vos appareils<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Get_serious_about_your_passwords\" >Prenez vos mots de passe au s\u00e9rieux<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Backup_your_data\" >Sauvegardez vos donn\u00e9es<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Avoid_unsecured_networks\" >\u00c9viter les r\u00e9seaux non s\u00e9curis\u00e9s<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Encrypt_your_data\" >Cryptage des donn\u00e9es<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p>Les cybercriminels utilisent des techniques de plus en plus sophistiqu\u00e9es pour mener des campagnes nuisibles. En cons\u00e9quence, la plupart des organisations se sentent impuissantes \u00e0 prot\u00e9ger leurs donn\u00e9es et leurs actifs critiques contre les attaques malveillantes.<\/p>\n\n\n\n<p>Dans ce billet, nous verrons \u00e0 quoi ressemble une cybermenace. Et nous vous donnerons 10 moyens simples de vous en prot\u00e9ger.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_Cyber_Threats\"><\/span><strong>Qu'est-ce que les cybermenaces ?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Les cybermenaces sont des attaques malveillantes con\u00e7ues pour voler des donn\u00e9es, perturber les op\u00e9rations ou endommager les actifs num\u00e9riques. Les attaquants ciblent les particuliers et les entreprises dans le but de r\u00e9aliser des profits. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\"><img decoding=\"async\" width=\"746\" height=\"468\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\" alt=\"mot &quot;cybercriminalit\u00e9&quot; sur le clavier de l&#039;ordinateur\" class=\"wp-image-38275\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg 746w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-300x188.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-271x170.jpg 271w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-700x439.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-156x98.jpg 156w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/a><\/figure>\n\n\n\n<p>Ces menaces se pr\u00e9sentent sous de nombreuses formes, notamment <strong>virus, logiciels malveillants, violations de donn\u00e9es, attaques par d\u00e9ni de service distribu\u00e9 (DDoS), phishing, ransomware, <\/strong>et <strong>Attaques de type \"Man-in-the-Middle\" (MitM)<\/strong>entre autres.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Protect_Yourself_from_Cybersecurity_Threats\"><\/span><strong>Pourquoi se prot\u00e9ger contre les menaces de cybers\u00e9curit\u00e9 ?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Les cybermenaces sont une affaire s\u00e9rieuse et peuvent avoir des effets consid\u00e9rables qui perturbent de nombreux domaines de la vie moderne. Par exemple, les r\u00e9centes attaques de ransomware sur les cha\u00eenes d'approvisionnement en produits alimentaires et en carburant ont provoqu\u00e9 des hausses de prix et des p\u00e9nuries. <\/p>\n\n\n\n<p>Le risque de dommages importants est r\u00e9el lorsque les attaques visent des r\u00e9seaux, des syst\u00e8mes t\u00e9l\u00e9phoniques, des soins de sant\u00e9, des stations d'\u00e9puration, des r\u00e9seaux \u00e9lectriques ou des op\u00e9rations gouvernementales. <\/p>\n\n\n\n<p>Les cybermenaces sont m\u00eame une question de <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">s\u00e9curit\u00e9 nationale<\/a> et une grande priorit\u00e9 pour notre administration actuelle.<\/p>\n\n\n\n<p>\u00c0 plus petite \u00e9chelle, la menace qui p\u00e8se sur les individus est \u00e9galement grave. Toute fuite de donn\u00e9es personnelles peut rapidement conduire \u00e0 l'usurpation d'identit\u00e9, \u00e0 la fraude et \u00e0 la ruine financi\u00e8re. Ces menaces sont de plus en plus graves et de plus en plus nombreuses.<\/p>\n\n\n\n<p>Les entreprises doivent comprendre que cela n'arrive pas qu'aux autres. Les cybermenaces repr\u00e9sentent un risque pour toutes les entreprises, quelle que soit leur taille. Il est temps d'agir pour <a href=\"https:\/\/memberpress.com\/fr\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">prot\u00e9ger votre entreprise contre les pr\u00e9judices<\/a> est maintenant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Where_Do_Cyber_Threats_Come_From\"><\/span><strong>D'o\u00f9 viennent les cybermenaces ?<\/strong>?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Les agresseurs ne sont pas une seule race d'animaux dont nous devons nous pr\u00e9occuper. Malheureusement, ces menaces proviennent de <strong>diff\u00e9rents types de personnes et de groupes<\/strong> avec des agendas diff\u00e9rents.<\/p>\n\n\n\n<p>Malheureusement, bon nombre des attaques les plus pr\u00e9judiciables sont soutenues par des <strong>pays hostiles<\/strong>. Bien qu'ils ne soient pas aussi courants, <strong>groupes terroristes<\/strong> peuvent \u00e9galement \u00eatre impliqu\u00e9s dans le cyberterrorisme.<\/p>\n\n\n\n<p><strong>Criminalit\u00e9 organis\u00e9e<\/strong> utilise fr\u00e9quemment les menaces num\u00e9riques pour recueillir des informations, prendre des entreprises en otage pour obtenir des ran\u00e7ons et voler des donn\u00e9es \u00e0 des fins d'usurpation d'identit\u00e9 et de fraude. Les forces de l'ordre ont \u00e9tabli un lien entre de nombreuses escroqueries \u00e0 la carte de cr\u00e9dit et le crime organis\u00e9.<\/p>\n\n\n\n<p><strong>Pirates informatiques<\/strong>, <strong>hacktivistes<\/strong>et <strong>des initi\u00e9s m\u00e9contents<\/strong> sont \u00e9galement responsables de diverses attaques num\u00e9riques. Par exemple, il arrive que des pirates informatiques contactent un employ\u00e9 d'une entreprise et l'engagent ou le font chanter pour qu'il devienne complice.<\/p>\n\n\n\n<p>Tout cela semble assez sophistiqu\u00e9, mais n'importe qui - m\u00eame les petites entreprises - peut \u00eatre la proie de ces attaques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Cyber_Threats\"><\/span><strong>Types de cybermenaces<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Il existe un tr\u00e8s grand nombre de types de cybermenaces. Mais pour de nombreuses attaques, le concept global est le suivant <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ing\u00e9nierie sociale<\/a>. <\/p>\n\n\n\n<p>L'ing\u00e9nierie sociale consiste pour les pirates \u00e0 manipuler les gens pour qu'ils ignorent les proc\u00e9dures de s\u00e9curit\u00e9 standard et les meilleures pratiques afin d'obtenir un acc\u00e8s autoris\u00e9 aux syst\u00e8mes et aux donn\u00e9es. <\/p>\n\n\n\n<p>Voici les principaux types de menaces, dont beaucoup font appel \u00e0 l'ing\u00e9nierie sociale.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\"><img decoding=\"async\" width=\"720\" height=\"485\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\" alt=\"Mot &quot;vol d&#039;identit\u00e9&quot; sur le clavier de l&#039;ordinateur\" class=\"wp-image-38273\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg 720w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-300x202.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-252x170.jpg 252w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-700x472.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-156x105.jpg 156w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Malware\"><\/span>Logiciels malveillants<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Les logiciels malveillants sont <strong>logiciel malveillant<\/strong> con\u00e7u pour :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Espionner l'utilisateur<\/li><li>Voler des informations d'identification<\/li><li>Modifier, copier et supprimer des fichiers<\/li><li>Modifier les autorisations<\/li><li>Interruption des op\u00e9rations du r\u00e9seau<\/li><li>causer d'autres types de dommages<\/li><\/ul>\n\n\n\n<p>Il existe des dizaines de <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">types de logiciels malveillants<\/a> et ses variantes, dont beaucoup sont disponibles sur le dark web \u00e0 des fins de vente ou d'\u00e9change.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"DDoS_Attacks\"><\/span><strong>Attaques DDoS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\" alt=\"Illustration des attaques DDoS\" class=\"wp-image-38279\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-300x150.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-768x384.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-340x170.jpg 340w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-840x420.jpg 840w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-700x350.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-156x78.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Attaques par d\u00e9ni de service distribu\u00e9 (DDoS) <strong>surcharger un r\u00e9seau ou un syst\u00e8me<\/strong>. Cette interruption du flux de trafic cr\u00e9e une fen\u00eatre d'opportunit\u00e9 o\u00f9 les cybercriminels peuvent acc\u00e9der pour voler des donn\u00e9es ou installer des logiciels malveillants.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00a0<strong>Hame\u00e7onnage<\/strong><\/h3>\n\n\n\n<p>L'hame\u00e7onnage (phishing) est l'utilisation par des acteurs malveillants de <a href=\"https:\/\/memberpress.com\/fr\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">des courriels d'apparence l\u00e9gitime<\/a> pour inciter les destinataires \u00e0 cliquer sur un lien ou \u00e0 visiter un site web malveillant. <\/p>\n\n\n\n<p>Lorsque l'utilisateur visite le site ou clique sur le lien, le logiciel malveillant est automatiquement t\u00e9l\u00e9charg\u00e9. Parfois, des informations priv\u00e9es saisies dans des formulaires pirat\u00e9s sont collect\u00e9es et utilis\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ransomware\"><\/span><strong>Ransomware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\"><img decoding=\"async\" width=\"788\" height=\"443\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\" alt=\"fond abstrait avec les mots &quot;access denied&quot; (acc\u00e8s refus\u00e9)\" class=\"wp-image-38278\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg 788w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-300x169.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-768x432.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-302x170.jpg 302w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-700x394.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-156x88.jpg 156w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/a><\/figure>\n\n\n\n<p>Les attaques par ransomware impliquent la <strong>chiffrement<\/strong> des fichiers d'une entreprise ou d'un particulier. Le pirate garde ensuite les donn\u00e9es verrouill\u00e9es en otage et exige le paiement d'une ran\u00e7on. De nombreuses entreprises choisissent de ne pas payer. <\/p>\n\n\n\n<p>D'autres paient, mais ils d\u00e9couvrent que la promesse d'une cl\u00e9 de d\u00e9cryptage est vaine et que la cl\u00e9 ne permet pas de restaurer les donn\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Zero-Day_Exploits\"><\/span><strong>Exploits de type Zero-Day<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Les nouveaux logiciels et appareils comportent souvent des failles. Les cybercriminels exploitent ces failles avant que les entreprises n'aient le temps de les corriger.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\"><img decoding=\"async\" width=\"724\" height=\"483\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\" alt=\"Exploits de type &quot;zero-day&quot; illustration\" class=\"wp-image-38281\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg 724w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-300x200.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-255x170.jpg 255w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-700x467.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-156x104.jpg 156w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-600x400.jpg 600w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Man-in-the-Middle_Attacks\"><\/span><strong>Attaques de type \"Man-in-the-Middle<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Les attaques de type \"Man-in-the-middle\" affectent g\u00e9n\u00e9ralement <strong>les r\u00e9seaux Wi-Fi non s\u00e9curis\u00e9s dans les lieux publics<\/strong> comme les caf\u00e9s, les a\u00e9roports et les h\u00f4tels. <\/p>\n\n\n\n<p>Le pirate surveille les connexions sur le r\u00e9seau, puis utilise un logiciel sp\u00e9cial pour voler les frappes au clavier, obtenir les identifiants et prendre le contr\u00f4le total des appareils des utilisateurs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Password_Attacks\"><\/span><strong>Attaques par mot de passe<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\"><img decoding=\"async\" width=\"671\" height=\"520\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\" alt=\"illustration d&#039;un \u00e9cran d&#039;ordinateur avec un champ de mots de passe\" class=\"wp-image-38282\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg 671w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-300x232.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-219x170.jpg 219w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-668x518.jpg 668w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-156x121.jpg 156w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Remplissage de documents d'identit\u00e9<\/strong> c'est lorsque des acteurs de la menace utilisent des mots de passe vol\u00e9s sur un compte et tentent de les utiliser sur un autre compte. <\/p>\n\n\n\n<p>Il s'agit d'une attaque courante car de nombreuses personnes <strong>r\u00e9utiliser les m\u00eames <a href=\"https:\/\/memberpress.com\/go\/lastpass\/\" title=\"Last Pass Lien d&#039;affiliation\" class=\"pretty-link-keyword\"rel=\"nofollow \" target=\"_blank\">mot de passe<\/a><\/strong> sur leurs comptes num\u00e9riques. Le \" Credential stuffing \" est l'un des nombreux types d'attaques par mot de passe que les criminels utilisent pour s'introduire dans les comptes en ligne des utilisateurs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Data_Breaches\"><\/span><strong>Violations de donn\u00e9es<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Des dizaines de violations de donn\u00e9es ont expos\u00e9 des millions de personnes. <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Informations personnelles des Am\u00e9ricains<\/a> sur le dark web. Ces violations ont donn\u00e9 lieu \u00e0 des fraudes et \u00e0 des vols d'identit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00a0<strong>Menaces li\u00e9es aux dispositifs IdO<\/strong><\/h3>\n\n\n\n<p>Les dispositifs IdO \u00e9tant des technologies relativement nouvelles, nombre d'entre eux n'ont pas \u00e9t\u00e9 s\u00e9curis\u00e9s de mani\u00e8re appropri\u00e9e. De ce fait, ils constituent un point d'entr\u00e9e pour les pirates qui veulent acc\u00e9der au r\u00e9seau d'une maison ou d'une entreprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Ways_to_Protect_Yourself_from_Cyber_Threats\"><\/span><strong>10 fa\u00e7ons de se prot\u00e9ger contre les cybermenaces<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\" alt=\"illustration d&#039;un \u00e9cran d&#039;ordinateur avec une t\u00eate de mort\" class=\"wp-image-38284\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Bien que les menaces soient r\u00e9elles et imminentes, vous pouvez prendre des mesures pour vous prot\u00e9ger et prot\u00e9ger votre entreprise. Voici dix des meilleures choses \u00e0 faire pour \u00e9viter les cyberattaques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Make_cybersecurity_a_top_priority\"><\/span>Faire de la cybers\u00e9curit\u00e9 une priorit\u00e9 absolue<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>C'est la chose la plus simple et la plus efficace que vous puissiez faire pour <a href=\"https:\/\/memberpress.com\/fr\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">prot\u00e9gez-vous et prot\u00e9gez votre entreprise<\/a>. Soyez conscient des cyberattaques auxquelles vous \u00eates le plus vuln\u00e9rable et prenez des mesures sp\u00e9cifiques pour les \u00e9viter. <\/p>\n\n\n\n<p>Si vous exercez une activit\u00e9 en ligne, la meilleure solution est d'acheter un logiciel de gestion d'entreprise. <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">un service de surveillance de haute qualit\u00e9<\/a> qui peut garder un \u0153il sur la situation et r\u00e9soudre les probl\u00e8mes qui se posent avant qu'ils ne deviennent catastrophiques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Update_with_security_patches\"><\/span>Mise \u00e0 jour des correctifs de s\u00e9curit\u00e9<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\" alt=\"Illustration d&#039;un bel homme utilisant un ordinateur portable et surveill\u00e9\" class=\"wp-image-38276\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Veillez \u00e0 ce que tous vos syst\u00e8mes, mat\u00e9riels et logiciels soient mis \u00e0 jour avec les derniers correctifs de s\u00e9curit\u00e9. <\/p>\n\n\n\n<p>C'est l'une des raisons les plus importantes pour <strong>renouveler annuellement les licences de vos logiciels<\/strong>. Pour la grande majorit\u00e9 des plugins et des logiciels, le renouvellement de la licence permet de financer des \u00e9l\u00e9ments importants tels que le d\u00e9veloppement et la mise en \u0153uvre de correctifs de s\u00e9curit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Train_your_team\"><\/span>Former votre \u00e9quipe<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Assurez-vous que votre personnel comprend le fonctionnement des attaques par hame\u00e7onnage et de l'ing\u00e9nierie sociale. Veillez ensuite \u00e0 ce qu'ils sachent comment r\u00e9agir si votre entreprise est attaqu\u00e9e.<\/p>\n\n\n\n<p>Envisagez d'organiser un atelier \u00e0 l'\u00e9chelle de l'entreprise ou d'acheter un cours en ligne pour votre \u00e9quipe. Par exemple, Coursera propose un excellent cours en ligne \u00e0 un prix abordable. <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cours sur le renseignement sur les cybermenaces<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dont_click_links\"><\/span>Ne cliquez pas sur les liens<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\"><img decoding=\"async\" width=\"703\" height=\"497\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\" alt=\"illustration d&#039;un pirate informatique dans l&#039;obscurit\u00e9\" class=\"wp-image-38280\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg 703w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-300x212.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-240x170.jpg 240w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-700x495.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-156x110.jpg 156w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><\/figure>\n\n\n\n<p>Bien que la majorit\u00e9 des liens envoy\u00e9s par courrier \u00e9lectronique ou par SMS soient l\u00e9gitimes, il est important de ne pas se tromper de cible. <em>extr\u00eamement difficile<\/em> pour faire la diff\u00e9rence entre les liens r\u00e9els et les liens de phishing. <\/p>\n\n\n\n<p>C'est pourquoi vous devez prendre l'habitude de <strong>ne jamais cliquer sur un lien ou t\u00e9l\u00e9charger une pi\u00e8ce jointe dans un courriel ou un SMS<\/strong>. Au lieu de cela, visitez l'URL directement. Tapez simplement l'adresse dans votre navigateur et vous devriez \u00eatre en mesure de voir si le lien est honn\u00eate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Check_out_your_sender\"><\/span>V\u00e9rifiez votre exp\u00e9diteur<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>V\u00e9rifiez toujours l'identit\u00e9 de l'exp\u00e9diteur de vos courriels avant d'agir. Pour ce faire, vous pouvez<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>V\u00e9rification des fautes d'orthographe dans l'e-mail de d\u00e9part<\/li><li>V\u00e9rifier si l'adresse et le nom d'affichage sont identiques (ils devraient l'\u00eatre)<\/li><\/ol>\n\n\n\n<p>Vous pouvez \u00e9galement v\u00e9rifier l'enregistrement DMARC de l'exp\u00e9diteur. Fraudmarc dispose d'une <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Outil de v\u00e9rification des enregistrements DMARC<\/a> dont l'utilisation est gratuite. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Update_your_devices\"><\/span>Mettez \u00e0 jour vos appareils<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Pensez \u00e0 installer des plugins, des extensions et des applications pour que vos appareils soient toujours \u00e9quip\u00e9s des derniers logiciels antivirus\/antimalware.<\/p>\n\n\n\n<p>Il existe toutes sortes d'outils, dont beaucoup sont gratuits. Consultez les 2022 de PCmag <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">liste de logiciels antivirus gratuits ici<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Get_serious_about_your_passwords\"><\/span>Prenez vos mots de passe au s\u00e9rieux<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\" alt=\"\u00e9cran d&#039;accueil pour t\u00e9l\u00e9phone portable avec crochet de p\u00eache\" class=\"wp-image-38277\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Mettre en \u0153uvre des exigences et des proc\u00e9dures strictes en mati\u00e8re de mots de passe, telles que <strong>authentification \u00e0 deux facteurs<\/strong>. Si possible, passez \u00e0 <strong>biom\u00e9trie <\/strong>comme les connexions par empreintes digitales, et l'abandon total des mots de passe. <\/p>\n\n\n\n<p><strong>Et ne r\u00e9utilisez jamais vos mots de passe.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Backup_your_data\"><\/span>Sauvegardez vos donn\u00e9es<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>En cas d'attaque de ransomware, assurez-vous de disposer d'une sauvegarde solide de toutes vos donn\u00e9es. Et <strong>stocker vos sauvegardes hors site<\/strong>. Voici plusieurs plugins de sauvegarde WordPress que nous recommandons :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Capsule temporelle WP<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (par Snapcreek)<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Avoid_unsecured_networks\"><\/span>\u00c9viter les r\u00e9seaux non s\u00e9curis\u00e9s<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Id\u00e9alement, vous devriez toujours <strong>utiliser un r\u00e9seau priv\u00e9 virtuel (VPN)<\/strong> lorsque vous vous connectez \u00e0 des r\u00e9seaux publics. Un VPN \u00e9tablit une connexion crypt\u00e9e et priv\u00e9e entre votre appareil et le r\u00e9seau public. <\/p>\n\n\n\n<p>Il est conseill\u00e9 d'\u00e9viter les r\u00e9seaux publics non s\u00e9curis\u00e9s en g\u00e9n\u00e9ral.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encrypt_your_data\"><\/span>Cryptage des donn\u00e9es<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\" alt=\"\" class=\"wp-image-38286\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Vous devez crypter toutes les donn\u00e9es contenues dans vos syst\u00e8mes et sur vos appareils. Le cryptage des donn\u00e9es permet de prot\u00e9ger vos informations priv\u00e9es et sensibles. Il rend \u00e9galement la communication entre les applications clientes et les serveurs beaucoup plus s\u00fbre. <\/p>\n\n\n\n<p>Lorsque vos donn\u00e9es sont crypt\u00e9es, m\u00eame si des personnes ou des entit\u00e9s non autoris\u00e9es mettent la main sur vos donn\u00e9es, elles ne pourront pas les lire.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Une grande partie de nos informations personnelles est facilement accessible en ligne, et il y a toujours des cyber-risques \u00e0 craindre. <\/p>\n\n\n\n<p>Faites de la cybers\u00e9curit\u00e9 l'une de vos principales priorit\u00e9s pour prot\u00e9ger votre activit\u00e9 en ligne et l'ensemble de votre monde num\u00e9rique.\u00a0<\/p>\n\n\n\n<p><strong>Si vous avez aim\u00e9 cet article, n'h\u00e9sitez pas \u00e0 <\/strong><a href=\"https:\/\/memberpress.com\/fr\/subscribe-to-the-memberpress-blog\/\"><strong>s'abonner au blog MemberPress<\/strong><\/a><strong>!<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel [\u2026]<\/p>\n","protected":false},"author":63703,"featured_media":38289,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_strive_editorial_status":"complete","_strive_copy_of":0,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":"","_FSMCFIC_featured_image_hide":"","_strive_checklists":"\"\"","_strive_active_checklist":"62291e2bb2422","_strive_post_notes":"","footnotes":""},"categories":[69,258,134],"tags":[299],"class_list":{"0":"post-35601","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-advice","8":"category-fixes","9":"category-how-to-2","10":"tag-security","11":"entry"},"acf":{"plans":["scale"],"is_featured":false,"download_source":"none","mothership_slug":"","download_url":""},"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Levon Gasparian\"\/>\n\t<meta name=\"keywords\" content=\"cyber security for my site,what are cyber threats,cyber threat solutions,how to fight cyber threats,security\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"fr_FR\" \/>\n\t\t<meta property=\"og:site_name\" content=\"MemberPress\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"How to Fight Cyber Threats (10 Ways)\" \/>\n\t\t<meta property=\"og:description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1480\" \/>\n\t\t<meta property=\"og:image:height\" content=\"832\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-08-04T11:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-11-16T22:13:35+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/memberpress\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@memberpress\" \/>\n\t\t<meta name=\"twitter:title\" content=\"How to Fight Cyber Threats (10 Ways)\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#blogposting\",\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"headline\":\"How to Fight Cyber Threats (10 Ways)\",\"author\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Fight-Cyber-Threats.jpg\",\"width\":1480,\"height\":832,\"caption\":\"10 Ways to Fight Cyber Threats\"},\"datePublished\":\"2022-08-04T05:00:00-04:00\",\"dateModified\":\"2022-11-16T15:13:35-05:00\",\"inLanguage\":\"fr-FR\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\"},\"articleSection\":\"Advice, Fixes, How To, security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/memberpress.com\\\/fr\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/category\\\/advice\\\/#listItem\",\"name\":\"Advice\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/category\\\/advice\\\/#listItem\",\"position\":2,\"name\":\"Advice\",\"item\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/category\\\/advice\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#listItem\",\"name\":\"How to Fight Cyber Threats (10 Ways)\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#listItem\",\"position\":3,\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/category\\\/advice\\\/#listItem\",\"name\":\"Advice\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/#organization\",\"name\":\"MemberPress\",\"description\":\"The All-In-One WordPress Membership Plugin\",\"url\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/mp-icon-RGB_Icon-01.jpg\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#organizationLogo\",\"width\":1650,\"height\":1275,\"caption\":\"memberpress logo icon\"},\"image\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/memberpress\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/memberpressplugin\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MemberPressPlugin\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/memberpress\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/author\\\/levongasparian1\\\/#author\",\"url\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/author\\\/levongasparian1\\\/\",\"name\":\"Levon Gasparian\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/litespeed\\\/avatar\\\/8021f617f664e4349f7e6de8a1e4918d.jpg?ver=1775844140\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\",\"url\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/\",\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"description\":\"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\",\"inLanguage\":\"fr-FR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Fight-Cyber-Threats.jpg\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#mainImage\",\"width\":1480,\"height\":832,\"caption\":\"10 Ways to Fight Cyber Threats\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#mainImage\"},\"datePublished\":\"2022-08-04T05:00:00-04:00\",\"dateModified\":\"2022-11-16T15:13:35-05:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/\",\"name\":\"MemberPress\",\"description\":\"The All-In-One WordPress Membership Plugin\",\"inLanguage\":\"fr-FR\",\"publisher\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/fr\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>How to Fight Cyber Threats (10 Ways)<\/title>\n\n","aioseo_head_json":{"title":"Comment lutter contre les cybermenaces (10 fa\u00e7ons)","description":"Dans le monde num\u00e9rique d'aujourd'hui, la cybers\u00e9curit\u00e9 est essentielle pour les petites entreprises en ligne. Apprenez \u00e0 lutter contre les cybermenaces gr\u00e2ce \u00e0 ces 10 pratiques simples.","canonical_url":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","robots":"max-image-preview:large","keywords":"cyber security for my site,what are cyber threats,cyber threat solutions,how to fight cyber threats,security","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#blogposting","name":"How to Fight Cyber Threats (10 Ways)","headline":"How to Fight Cyber Threats (10 Ways)","author":{"@id":"https:\/\/memberpress.com\/fr\/blog\/author\/levongasparian1\/#author"},"publisher":{"@id":"https:\/\/memberpress.com\/fr\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","width":1480,"height":832,"caption":"10 Ways to Fight Cyber Threats"},"datePublished":"2022-08-04T05:00:00-04:00","dateModified":"2022-11-16T15:13:35-05:00","inLanguage":"fr-FR","mainEntityOfPage":{"@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage"},"isPartOf":{"@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage"},"articleSection":"Advice, Fixes, How To, security"},{"@type":"BreadcrumbList","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr#listItem","position":1,"name":"Home","item":"https:\/\/memberpress.com\/fr","nextItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr\/blog\/category\/advice\/#listItem","name":"Advice"}},{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr\/blog\/category\/advice\/#listItem","position":2,"name":"Advice","item":"https:\/\/memberpress.com\/fr\/blog\/category\/advice\/","nextItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#listItem","name":"How to Fight Cyber Threats (10 Ways)"},"previousItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#listItem","position":3,"name":"How to Fight Cyber Threats (10 Ways)","previousItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/fr\/blog\/category\/advice\/#listItem","name":"Advice"}}]},{"@type":"Organization","@id":"https:\/\/memberpress.com\/fr\/#organization","name":"MemberPress","description":"The All-In-One WordPress Membership Plugin","url":"https:\/\/memberpress.com\/fr\/","logo":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/10\/mp-icon-RGB_Icon-01.jpg","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#organizationLogo","width":1650,"height":1275,"caption":"memberpress logo icon"},"image":{"@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#organizationLogo"},"sameAs":["https:\/\/www.instagram.com\/memberpress\/","https:\/\/www.pinterest.com\/memberpressplugin\/","https:\/\/www.youtube.com\/c\/MemberPressPlugin","https:\/\/www.linkedin.com\/company\/memberpress\/"]},{"@type":"Person","@id":"https:\/\/memberpress.com\/fr\/blog\/author\/levongasparian1\/#author","url":"https:\/\/memberpress.com\/fr\/blog\/author\/levongasparian1\/","name":"Levon Gasparian","image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/litespeed\/avatar\/8021f617f664e4349f7e6de8a1e4918d.jpg?ver=1775844140"}},{"@type":"WebPage","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage","url":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","name":"How to Fight Cyber Threats (10 Ways)","description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","inLanguage":"fr-FR","isPartOf":{"@id":"https:\/\/memberpress.com\/fr\/#website"},"breadcrumb":{"@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#breadcrumblist"},"author":{"@id":"https:\/\/memberpress.com\/fr\/blog\/author\/levongasparian1\/#author"},"creator":{"@id":"https:\/\/memberpress.com\/fr\/blog\/author\/levongasparian1\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#mainImage","width":1480,"height":832,"caption":"10 Ways to Fight Cyber Threats"},"primaryImageOfPage":{"@id":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#mainImage"},"datePublished":"2022-08-04T05:00:00-04:00","dateModified":"2022-11-16T15:13:35-05:00"},{"@type":"WebSite","@id":"https:\/\/memberpress.com\/fr\/#website","url":"https:\/\/memberpress.com\/fr\/","name":"MemberPress","description":"The All-In-One WordPress Membership Plugin","inLanguage":"fr-FR","publisher":{"@id":"https:\/\/memberpress.com\/fr\/#organization"}}]},"og:locale":"fr_FR","og:site_name":"MemberPress","og:type":"article","og:title":"How to Fight Cyber Threats (10 Ways)","og:description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","og:url":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","og:image":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","og:image:secure_url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","og:image:width":1480,"og:image:height":832,"article:published_time":"2022-08-04T11:00:00+00:00","article:modified_time":"2022-11-16T22:13:35+00:00","article:publisher":"https:\/\/www.facebook.com\/memberpress\/","twitter:card":"summary_large_image","twitter:site":"@memberpress","twitter:title":"How to Fight Cyber Threats (10 Ways)","twitter:description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","twitter:image":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg"},"aioseo_meta_data":{"post_id":"35601","title":null,"description":"Dans le monde num\u00e9rique d'aujourd'hui, la cybers\u00e9curit\u00e9 est essentielle pour les petites entreprises en ligne. Apprenez \u00e0 lutter contre les cybermenaces gr\u00e2ce \u00e0 ces 10 pratiques simples.","keywords":[{"label":"cyber security for my site","value":"cyber security for my site"},{"label":"what are cyber threats","value":"what are cyber threats"},{"label":"cyber threat solutions","value":"cyber threat solutions"},{"label":"how to fight cyber threats","value":"how to fight cyber threats"}],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"},\"blockGraphs\":[]}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-10-09 19:19:34","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2022-04-01 17:04:01","updated":"2026-03-03 15:02:11"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/memberpress.com\/fr\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/memberpress.com\/fr\/blog\/category\/advice\/\" title=\"Advice\">Advice<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tHow to Fight Cyber Threats (10 Ways)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/memberpress.com\/fr"},{"label":"Advice","link":"https:\/\/memberpress.com\/fr\/blog\/category\/advice\/"},{"label":"How to Fight Cyber Threats (10 Ways)","link":"https:\/\/memberpress.com\/fr\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/"}],"app_bookmark":{"bookmark_id":0,"is_bookmarked":false,"bookmark_date":0},"comments_count":"0","content_native":[{"type":"core\/paragraph","render":"<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. <\/p>","content":[{"type":"text","data":"Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks.<\/p>","content":[{"type":"text","data":"Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them.<\/p>","content":[{"type":"text","data":"In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>What are Cyber Threats<\/strong><\/h2>","content":"Qu'est-ce que les cybermenaces ?","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. <\/p>","content":[{"type":"text","data":"Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\" alt=\"cyber crime word on computer keyboard\" class=\"wp-image-38275\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","alt":"cyber crime word on computer keyboard","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","linkDestination":"media"},"style":{"width":746,"height":468,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others.<\/p>","content":[{"type":"text","data":"These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Why Protect Yourself from Cybersecurity Threats?<\/strong><\/h3>","content":"Pourquoi se prot\u00e9ger contre les menaces de cybers\u00e9curit\u00e9 ?","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. <\/p>","content":[{"type":"text","data":"Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. <\/p>","content":[{"type":"text","data":"The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration.<\/p>","content":[{"type":"text","data":"Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers.<\/p>","content":[{"type":"text","data":"On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now.<\/p>","content":[{"type":"text","data":"Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Where Do Cyber Threats Come From<\/strong>?<\/h3>","content":"D'o\u00f9 viennent les cybermenaces ?","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas.<\/p>","content":[{"type":"text","data":"Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism.<\/p>","content":[{"type":"text","data":"Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime.<\/p>","content":[{"type":"text","data":"<strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices.<\/p>","content":[{"type":"text","data":"<strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks.<\/p>","content":[{"type":"text","data":"This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>Types of Cyber Threats<\/strong><\/h2>","content":"Types de cybermenaces","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. <\/p>","content":[{"type":"text","data":"There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. <\/p>","content":[{"type":"text","data":"Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Following are the main types of threats, many of which involve social engineering.<\/p>","content":[{"type":"text","data":"Following are the main types of threats, many of which involve social engineering."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\" alt=\"Identity theft word on computer keyboard\" class=\"wp-image-38273\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","alt":"Identity theft word on computer keyboard","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","linkDestination":"media"},"style":{"width":720,"height":485,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Malware<\/h3>","content":"Logiciels malveillants","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Malware is <strong>malicious software<\/strong> designed to:<\/p>","content":[{"type":"text","data":"Malware is <strong>malicious software<\/strong> designed to:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ul class=\"wp-block-list\"><li>Spy on the user<\/li><li>Steal credentials<\/li><li>Alter, copy, and delete files<\/li><li>Change permissions<\/li><li>Interrupt network operations<\/li><li>Cause other kinds of damage<\/li><\/ul>","content":"<ul class=\"wp-block-list\"><li>Espionner l'utilisateur<\/li><li>Voler des informations d'identification<\/li><li>Modifier, copier et supprimer des fichiers<\/li><li>Modifier les autorisations<\/li><li>Interruption des op\u00e9rations du r\u00e9seau<\/li><li>causer d'autres types de dommages<\/li><\/ul>","data":{"listType":"unordered"},"style":{"parent_style":{}}},{"type":"core\/paragraph","render":"<p>There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade.<\/p>","content":[{"type":"text","data":"There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>DDoS Attacks<\/strong><\/h3>","content":"Attaques DDoS","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\" alt=\"DDoS attacks illustration\" class=\"wp-image-38279\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","alt":"DDoS attacks illustration","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","linkDestination":"media"},"style":{"width":1024,"height":512,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software.<\/p>","content":[{"type":"text","data":"Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">&nbsp;<strong>Phishing<\/strong><\/h3>","content":"&nbsp;Hame\u00e7onnage","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. <\/p>","content":[{"type":"text","data":"Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used.<\/p>","content":[{"type":"text","data":"When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h3>","content":"Ransomware","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\" alt=\"abstract background with the words access denied\" class=\"wp-image-38278\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","alt":"abstract background with the words access denied","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","linkDestination":"media"},"style":{"width":788,"height":443,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. <\/p>","content":[{"type":"text","data":"Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data.<\/p>","content":[{"type":"text","data":"Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Zero-Day Exploits<\/strong><\/h3>","content":"Exploits de type Zero-Day","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities.<\/p>","content":[{"type":"text","data":"New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\" alt=\"zero-day exploits illustration\" class=\"wp-image-38281\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","alt":"zero-day exploits illustration","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","linkDestination":"media"},"style":{"width":724,"height":483,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Man-in-the-Middle Attacks<\/strong><\/h3>","content":"Attaques de type \"Man-in-the-Middle","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. <\/p>","content":[{"type":"text","data":"Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices.<\/p>","content":[{"type":"text","data":"The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Password Attacks<\/strong><\/h3>","content":"Attaques par mot de passe","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\" alt=\"illustration of a computer screen with password field\" class=\"wp-image-38282\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","alt":"illustration of a computer screen with password field","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","linkDestination":"media"},"style":{"width":671,"height":520,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p><strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. <\/p>","content":[{"type":"text","data":"<strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This is a common attack because many people <strong>reuse the same password<\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts.<\/p>","content":[{"type":"text","data":"This is a common attack because many people <strong>reuse the same password<\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Data Breaches<\/strong><\/h3>","content":"Violations de donn\u00e9es","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft.<\/p>","content":[{"type":"text","data":"Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">&nbsp;<strong>IoT Device Threats<\/strong><\/h3>","content":"&nbsp;Menaces li\u00e9es aux dispositifs IdO","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network.<\/p>","content":[{"type":"text","data":"Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>10 Ways to Protect Yourself from Cyber Threats<\/strong><\/h2>","content":"10 fa\u00e7ons de se prot\u00e9ger contre les cybermenaces","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\" alt=\"illustration of computer screen with death skull\" class=\"wp-image-38284\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","alt":"illustration of computer screen with death skull","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks.<\/p>","content":[{"type":"text","data":"Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Make cybersecurity a top priority<\/h3>","content":"Faire de la cybers\u00e9curit\u00e9 une priorit\u00e9 absolue","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. <\/p>","content":[{"type":"text","data":"This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events.<\/p>","content":[{"type":"text","data":"If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Update with security patches<\/h3>","content":"Mise \u00e0 jour des correctifs de s\u00e9curit\u00e9","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\" alt=\"illustration of a handsome man using laptop and being watched\" class=\"wp-image-38276\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","alt":"illustration of a handsome man using laptop and being watched","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Make sure you keep all your systems, hardware, and software updated with the latest security patches. <\/p>","content":[{"type":"text","data":"Make sure you keep all your systems, hardware, and software updated with the latest security patches. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation.<\/p>","content":[{"type":"text","data":"This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Train your team<\/h3>","content":"Former votre \u00e9quipe","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked.<\/p>","content":[{"type":"text","data":"Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>.<\/p>","content":[{"type":"text","data":"Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Don't click links<\/h3>","content":"Ne cliquez pas sur les liens","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\" alt=\"illustration of hacker in the dark\" class=\"wp-image-38280\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","alt":"illustration of hacker in the dark","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","linkDestination":"media"},"style":{"width":703,"height":497,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. <\/p>","content":[{"type":"text","data":"While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest.<\/p>","content":[{"type":"text","data":"Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Check out your sender<\/h3>","content":"V\u00e9rifiez votre exp\u00e9diteur","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Always verify the sender of your emails before taking any action. You can do this by:<\/p>","content":[{"type":"text","data":"Always verify the sender of your emails before taking any action. You can do this by:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ol class=\"wp-block-list\"><li>Checking the from email for misspellings<\/li><li>Verifying whether the address and display name are they same (they should be)<\/li><\/ol>","content":"<ol class=\"wp-block-list\"><li>V\u00e9rification des fautes d'orthographe dans l'e-mail de d\u00e9part<\/li><li>V\u00e9rifier si l'adresse et le nom d'affichage sont identiques (ils devraient l'\u00eatre)<\/li><\/ol>","data":{"listType":"ordered"},"style":{"parent_style":{}}},{"type":"core\/paragraph","render":"<p>You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. <\/p>","content":[{"type":"text","data":"You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Update your devices<\/h3>","content":"Mettez \u00e0 jour vos appareils","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software.<\/p>","content":[{"type":"text","data":"Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>.<\/p>","content":[{"type":"text","data":"There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Get serious about your passwords<\/h3>","content":"Prenez vos mots de passe au s\u00e9rieux","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\" alt=\"cell phone sign in screen with fish hook\" class=\"wp-image-38277\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","alt":"cell phone sign in screen with fish hook","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. <\/p>","content":[{"type":"text","data":"Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>And never, ever reuse passwords.<\/strong><\/p>","content":[{"type":"text","data":"<strong>And never, ever reuse passwords.<\/strong>"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Backup your data<\/h3>","content":"Sauvegardez vos donn\u00e9es","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:<\/p>","content":[{"type":"text","data":"In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Time Capsule<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (by Snapcreek)<\/li><\/ul>","content":"<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Capsule temporelle WP<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (par Snapcreek)<\/li><\/ul>","data":{"listType":"unordered"},"style":{"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Avoid unsecured networks<\/h3>","content":"\u00c9viter les r\u00e9seaux non s\u00e9curis\u00e9s","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. <\/p>","content":[{"type":"text","data":"Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>It's a good practice to avoid unsecured public networks in general.<\/p>","content":[{"type":"text","data":"It's a good practice to avoid unsecured public networks in general."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Encrypt your data<\/h3>","content":"Cryptage des donn\u00e9es","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\" alt=\"\" class=\"wp-image-38286\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. <\/p>","content":[{"type":"text","data":"You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it.<\/p>","content":[{"type":"text","data":"When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\">Conclusion<\/h2>","content":"Conclusion","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>So much of our personal information is readily available online, and there are always cyber risks to worry about. <\/p>","content":[{"type":"text","data":"So much of our personal information is readily available online, and there are always cyber risks to worry about. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Make cybersecurity one of your main priorities to protect your online business and your entire digital world.&nbsp;<\/p>","content":[{"type":"text","data":"Make cybersecurity one of your main priorities to protect your online business and your entire digital world.&nbsp;"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong><\/p>","content":[{"type":"text","data":"<strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong>"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}}],"app_access":{"can_access":true,"restrict_message":null},"_links":{"self":[{"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/posts\/35601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/users\/63703"}],"replies":[{"embeddable":true,"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/comments?post=35601"}],"version-history":[{"count":0,"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/posts\/35601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/media\/38289"}],"wp:attachment":[{"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/media?parent=35601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/categories?post=35601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memberpress.com\/fr\/wp-json\/wp\/v2\/tags?post=35601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}