{"id":42510,"date":"2024-12-31T11:53:15","date_gmt":"2024-12-31T16:53:15","guid":{"rendered":"https:\/\/www.federated.ca\/blog\/non-classifiee\/how-to-prepare-for-a-corporate-data-breach\/"},"modified":"2025-01-16T12:18:26","modified_gmt":"2025-01-16T17:18:26","slug":"comment-preparer-votre-entreprise-a-une-cyberintrusion","status":"publish","type":"post","link":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/","title":{"rendered":"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1404px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Aucune entreprise n\u2019est \u00e0 l\u2019abri d\u2019une cyberintrusion, peu importe l\u2019\u00e9tendue de ses connaissances en cybers\u00e9curit\u00e9. C\u2019est pourquoi il est crucial de mettre en place un plan d\u2019intervention en cas d\u2019incident et de cr\u00e9er une documentation connexe. Dans votre plan d\u2019intervention, vous devez inclure les mesures \u00e0 prendre par votre entreprise si vous soup\u00e7onnez la violation de vos donn\u00e9es. Plus vite votre entreprise suivra son plan en cas d\u2019incident, en meilleure posture vous serez pour att\u00e9nuer les r\u00e9percussions sur votre entreprise.<\/p>\n<p>Une \u00e9tude de 2021 r\u00e9alis\u00e9e par IBM sur la cyberr\u00e9silience des entreprises a r\u00e9v\u00e9l\u00e9 que 54\u00a0% des soci\u00e9t\u00e9s n\u2019ont pas de plan d\u2019intervention applicable \u00e0 l\u2019\u00e9chelle de leur entreprise en cas d\u2019incident. En outre, comme les incidents se multiplient de plus en plus rapidement de nos jours, de nombreux observateurs pr\u00e9voient que la plupart des entreprises finiront t\u00f4t ou tard par \u00eatre victimes d\u2019un incident. C\u2019est donc maintenant qu\u2019il faut songer \u00e0 pr\u00e9parer votre entreprise.<\/p>\n<h3>Formez votre \u00e9quipe d\u2019intervention en cas de cyberintrusion<\/h3>\n<p>Votre personnel d\u2019intervention cl\u00e9 doit \u00eatre form\u00e9 et bien comprendre ses responsabilit\u00e9s pour intervenir efficacement en cas de br\u00e8che de s\u00e9curit\u00e9 informatique. En d\u00e9tectant et en contenant une br\u00e8che informatique, une entreprise peut \u00e9conomiser beaucoup d\u2019argent et \u00e9viter des cons\u00e9quences n\u00e9gatives.<\/p>\n<p>Au moment d\u2019\u00e9tablir votre plan d\u2019intervention en cas d\u2019atteinte \u00e0 la protection des donn\u00e9es, vous devez penser \u00e0 coordonner les activit\u00e9s de toutes vos \u00e9quipes afin de r\u00e9duire les risques d\u2019erreurs. Voici quelques-unes des \u00e9quipes qui devraient \u00eatre impliqu\u00e9es dans votre plan, ainsi que les t\u00e2ches qui leur incombent\u00a0:<\/p>\n<p><strong>Technologie de l\u2019information et s\u00e9curit\u00e9<\/strong><\/p>\n<p>Votre personnel de la s\u00e9curit\u00e9 et des technologies de l\u2019information (TI)\u00a0devrait constamment r\u00e9\u00e9valuer les lacunes de l\u2019entreprise concernant la s\u00e9curit\u00e9 des donn\u00e9es, s\u2019exercer \u00e0 d\u00e9tecter les vuln\u00e9rabilit\u00e9s et mettre en \u0153uvre les mesures de s\u00e9curit\u00e9, car il sera le premier \u00e0 intervenir en cas de br\u00e8che informatique pour contenir l\u2019incident et appliquer les correctifs.<\/p>\n<p><strong>Services juridiques<\/strong><\/p>\n<p>L\u2019\u00e9quipe des services juridiques peut \u00eatre amen\u00e9e \u00e0 travailler avec les TI, selon la gravit\u00e9 des incidents, pour d\u00e9terminer les obligations l\u00e9gales de l\u2019entreprise et fournir des conseils. Le travail conjoint des deux \u00e9quipes contribuera \u00e0 r\u00e9duire le risque que des amendes vous soient impos\u00e9es par des gouvernements provinciaux ou f\u00e9d\u00e9ral, conform\u00e9ment \u00e0 la r\u00e9glementation en vigueur, par exemple la Loi sur la protection des renseignements personnels et les documents \u00e9lectroniques (LPRPDE) du Canada, et par des gouvernements \u00e9trangers, si vous avez des clients \u00e0 l\u2019ext\u00e9rieur du Canada.<\/p>\n<p>La Loi sur la protection des renseignements personnels et les documents \u00e9lectroniques (LPRPDE) fournit le cadre l\u00e9gal pour les avis que doit fournir votre entreprise. Toutes les organisations sont tenues de d\u00e9clarer au commissaire \u00e0 la protection de la vie priv\u00e9e du Canada (CPVP) les atteintes aux mesures de s\u00e9curit\u00e9 pr\u00e9sentant un risque r\u00e9el de pr\u00e9judice grave (RRPG). En vous familiarisant avec les exigences l\u00e9gales, vous r\u00e9duirez possiblement vos risques de litiges et d\u2019amendes.<\/p>\n<p><strong>Ressources humaines<\/strong><\/p>\n<p>Les ressources humaines agiront en premi\u00e8re ligne en cas d\u2019incident pour communiquer avec les employ\u00e9s, surtout ceux dont les donn\u00e9es personnelles auront \u00e9t\u00e9 touch\u00e9es. Elles peuvent aussi fournir des ressources aux employ\u00e9s et leur indiquer des fa\u00e7ons de mieux se prot\u00e9ger, leur famille et eux (\u00e0 la fois avant et apr\u00e8s un incident de s\u00e9curit\u00e9).<\/p>\n<p><strong>Marketing et communications<\/strong><\/p>\n<p>En cas d\u2019incident, l\u2019\u00e9quipe des communications sera charg\u00e9e d\u2019informer les personnes touch\u00e9es \u00e0 l\u2019ext\u00e9rieur de l\u2019entreprise, ainsi que la presse. Elle collaborera avec l\u2019\u00e9quipe des services juridiques pour s\u2019assurer que les communications sont exactes et produites en temps opportun. De m\u00eame, respecter les d\u00e9lais d\u2019envoi des avis peut contribuer \u00e0 promouvoir votre honn\u00eatet\u00e9, ce qui pourra vous aider \u00e0 prot\u00e9ger la r\u00e9putation de votre entreprise et \u00e0 r\u00e9duire la perte \u00e9ventuelle de clients.<\/p>\n<h3>\u00c9tablissez un plan de communication<\/h3>\n<p>En tant qu\u2019entreprise de renom, vous avez la responsabilit\u00e9 d\u2019informer les forces de l\u2019ordre, les autres entreprises concern\u00e9es, vos partenaires, vos employ\u00e9s et vos clients de toute divulgation potentielle de donn\u00e9es apr\u00e8s un incident. Les communications qui suivront peuvent viser \u00e0 expliquer comment s\u2019est produit l\u2019incident, quelles donn\u00e9es ont \u00e9t\u00e9 compromises, quelles mesures ont \u00e9t\u00e9 prises pour rem\u00e9dier \u00e0 la situation et lesquelles seront prises pour prot\u00e9ger les personnes touch\u00e9es.<\/p>\n<p>Il est important de prendre note qu\u2019il vous faudra d\u00e9signer des porte-parole. Vous devrez les pr\u00e9parer \u00e0 r\u00e9pondre aux questions, par exemple en leur fournissant une foire aux questions officielle, ainsi qu\u2019aux demandes de renseignements transmises par t\u00e9l\u00e9phone, par courrier \u00e9lectronique, dans les m\u00e9dias sociaux ou dans la presse.<\/p>\n<h3>Renseignement et formation<\/h3>\n<p>Pour que votre strat\u00e9gie d\u2019intervention soit efficace, les membres de votre \u00e9quipe d\u2019intervention doivent faire des simulations pour s\u2019exercer p\u00e9riodiquement \u00e0 la mettre en \u0153uvre. Ainsi, si un v\u00e9ritable incident survient, ils conna\u00eetront les processus et les proc\u00e9dures \u00e0 mettre en \u0153uvre et seront pr\u00eats \u00e0 passer \u00e0 l\u2019action. Lors de vos simulations, pr\u00eatez attention aux obstacles potentiels qui pourraient se dresser et apportez des am\u00e9liorations d\u2019une fois \u00e0 l\u2019autre. En faisant des simulations r\u00e9guli\u00e8rement, votre entreprise sera mieux pr\u00e9par\u00e9e \u00e0 faire face \u00e0 un incident r\u00e9el.<\/p>\n<h3>Assurez-vous que votre entreprise est prot\u00e9g\u00e9e<\/h3>\n<p>Il est essentiel de s\u2019assurer que votre entreprise dispose d\u2019un plan d\u2019intervention en cas d\u2019incident bien pens\u00e9 et soigneusement \u00e9tabli. Mais il est tout aussi important de vous doter de la protection n\u00e9cessaire en cas de probl\u00e8me. L\u2019assurance des cyberrisques est con\u00e7ue pour prot\u00e9ger votre entreprise en cas d\u2019atteinte \u00e0 ses r\u00e9seaux informatiques. Pour en savoir plus, consultez notre page sur l\u2019<a href=\"https:\/\/www.federated.ca\/fr\/types-dassurance\/assurance-cyberrisques\/\">assurance des cyberrisques<\/a>.<\/p>\n<p><em>Le pr\u00e9sent billet de blogue est fourni uniquement \u00e0 titre informatif et ne vise pas \u00e0 remplacer les conseils de professionnels.<\/em><em> Nous ne faisons aucune assertion et n\u2019offrons aucune garantie relativement \u00e0 l\u2019exactitude ou \u00e0 l\u2019int\u00e9gralit\u00e9 des renseignements pr\u00e9sent\u00e9s. Nous ne pourrons en aucun cas \u00eatre tenus responsables des pertes pouvant d\u00e9couler de leur utilisation.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":33,"featured_media":42507,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[813],"tags":[800],"class_list":["post-42510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risque-cybernetique","tag-cyber-risk-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Violation de donn\u00e9es d\u2019entreprise \u2013 Les assurances Federated<\/title>\n<meta name=\"description\" content=\"Il faut un plan d\u2019intervention en cas d\u2019incident pour se prot\u00e9ger des cyberrisques. Voyez comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/\" \/>\n<meta property=\"og:site_name\" content=\"La Federated, Compagnie d\u2019assurance du Canada\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FedInsCanada\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-31T16:53:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-16T17:18:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.federated.ca\/wp-content\/uploads\/2025\/01\/fed-data-breaches-1030x441.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"441\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Elizabeth Tela\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elizabeth Tela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/\"},\"author\":{\"name\":\"Elizabeth Tela\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#\\\/schema\\\/person\\\/d1b1ec52fb6bf9e27c526ee5c665e807\"},\"headline\":\"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion\",\"datePublished\":\"2024-12-31T16:53:15+00:00\",\"dateModified\":\"2025-01-16T17:18:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.federated.ca\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/fed-data-breaches.png\",\"keywords\":[\"cyber risk\"],\"articleSection\":[\"Risque Cybern\u00e9tique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/\",\"url\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/\",\"name\":\"Violation de donn\u00e9es d\u2019entreprise \u2013 Les assurances Federated\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.federated.ca\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/fed-data-breaches.png\",\"datePublished\":\"2024-12-31T16:53:15+00:00\",\"dateModified\":\"2025-01-16T17:18:26+00:00\",\"description\":\"Il faut un plan d\u2019intervention en cas d\u2019incident pour se prot\u00e9ger des cyberrisques. Voyez comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.federated.ca\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/fed-data-breaches.png\",\"contentUrl\":\"https:\\\/\\\/www.federated.ca\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/fed-data-breaches.png\",\"width\":6300,\"height\":2696},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/blog\\\/risque-cybernetique\\\/comment-preparer-votre-entreprise-a-une-cyberintrusion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/\",\"name\":\"Federated Insurance Company of Canada\",\"description\":\"La s\u00e9curit\u00e9 de votre entreprise en t\u00eate\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#organization\",\"name\":\"Les assurances Federated\",\"url\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.federated.ca\\\/wp-content\\\/uploads\\\/2015\\\/03\\\/FED_ENG_NOtag_shiftnav_210x52.png\",\"contentUrl\":\"https:\\\/\\\/www.federated.ca\\\/wp-content\\\/uploads\\\/2015\\\/03\\\/FED_ENG_NOtag_shiftnav_210x52.png\",\"width\":210,\"height\":52,\"caption\":\"Les assurances Federated\"},\"image\":{\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/FedInsCanada\\\/\",\"https:\\\/\\\/www.instagram.com\\\/federatedinsuranceca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/authwall?trk=ripf&amp;amp;amp;trkInfo=AQExgtg9_9rmAQAAAVx-tQL4XBOielaWooxEaw4kQGfXIqAVlPw7IbVWBdg-4ezDWDNXO2cp0GXtaWrXpPlk3S8ZhjlEcvoxf5Jti8CypWckNTc3e85aDADZtFHeDNEVc5LgQ80=&amp;amp;amp;originalReferer=http:\\\/\\\/avada.federated.ca\\\/business-insurance\\\/automotive-dealers-insurance\\\/&amp;amp;amp;sessionRedirect=https:\\\/\\\/www.linkedin.com\\\/company\\\/federated-insurance\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC2TYZAr9C3puo4Tvg9Q151Q\"],\"description\":\"With Federated Insurance, you work directly with an industry expert who is committed to understanding the unique risks and opportunities associated with your business. With a dedicated agent and risk management team on your side, you will always get the right coverage for your company and can focus on what matters most. Trust. Advise. Protect.\",\"email\":\"info@federated.ca\",\"telephone\":\"1.844.628.6800\",\"legalName\":\"Federated Insurance\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.federated.ca\\\/fr\\\/#\\\/schema\\\/person\\\/d1b1ec52fb6bf9e27c526ee5c665e807\",\"name\":\"Elizabeth Tela\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Violation de donn\u00e9es d\u2019entreprise \u2013 Les assurances Federated","description":"Il faut un plan d\u2019intervention en cas d\u2019incident pour se prot\u00e9ger des cyberrisques. Voyez comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion","og_url":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/","og_site_name":"La Federated, Compagnie d\u2019assurance du Canada","article_publisher":"https:\/\/www.facebook.com\/FedInsCanada\/","article_published_time":"2024-12-31T16:53:15+00:00","article_modified_time":"2025-01-16T17:18:26+00:00","og_image":[{"width":1030,"height":441,"url":"https:\/\/www.federated.ca\/wp-content\/uploads\/2025\/01\/fed-data-breaches-1030x441.png","type":"image\/png"}],"author":"Elizabeth Tela","twitter_misc":{"\u00c9crit par":"Elizabeth Tela","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#article","isPartOf":{"@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/"},"author":{"name":"Elizabeth Tela","@id":"https:\/\/www.federated.ca\/fr\/#\/schema\/person\/d1b1ec52fb6bf9e27c526ee5c665e807"},"headline":"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion","datePublished":"2024-12-31T16:53:15+00:00","dateModified":"2025-01-16T17:18:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/www.federated.ca\/fr\/#organization"},"image":{"@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.federated.ca\/wp-content\/uploads\/2025\/01\/fed-data-breaches.png","keywords":["cyber risk"],"articleSection":["Risque Cybern\u00e9tique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/","url":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/","name":"Violation de donn\u00e9es d\u2019entreprise \u2013 Les assurances Federated","isPartOf":{"@id":"https:\/\/www.federated.ca\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#primaryimage"},"image":{"@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.federated.ca\/wp-content\/uploads\/2025\/01\/fed-data-breaches.png","datePublished":"2024-12-31T16:53:15+00:00","dateModified":"2025-01-16T17:18:26+00:00","description":"Il faut un plan d\u2019intervention en cas d\u2019incident pour se prot\u00e9ger des cyberrisques. Voyez comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion.","breadcrumb":{"@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#primaryimage","url":"https:\/\/www.federated.ca\/wp-content\/uploads\/2025\/01\/fed-data-breaches.png","contentUrl":"https:\/\/www.federated.ca\/wp-content\/uploads\/2025\/01\/fed-data-breaches.png","width":6300,"height":2696},{"@type":"BreadcrumbList","@id":"https:\/\/www.federated.ca\/fr\/blog\/risque-cybernetique\/comment-preparer-votre-entreprise-a-une-cyberintrusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.federated.ca\/fr\/"},{"@type":"ListItem","position":2,"name":"Comment pr\u00e9parer votre entreprise \u00e0 une cyberintrusion"}]},{"@type":"WebSite","@id":"https:\/\/www.federated.ca\/fr\/#website","url":"https:\/\/www.federated.ca\/fr\/","name":"Federated Insurance Company of Canada","description":"La s\u00e9curit\u00e9 de votre entreprise en t\u00eate","publisher":{"@id":"https:\/\/www.federated.ca\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.federated.ca\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.federated.ca\/fr\/#organization","name":"Les assurances Federated","url":"https:\/\/www.federated.ca\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.federated.ca\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.federated.ca\/wp-content\/uploads\/2015\/03\/FED_ENG_NOtag_shiftnav_210x52.png","contentUrl":"https:\/\/www.federated.ca\/wp-content\/uploads\/2015\/03\/FED_ENG_NOtag_shiftnav_210x52.png","width":210,"height":52,"caption":"Les assurances Federated"},"image":{"@id":"https:\/\/www.federated.ca\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FedInsCanada\/","https:\/\/www.instagram.com\/federatedinsuranceca\/","https:\/\/www.linkedin.com\/authwall?trk=ripf&amp;amp;amp;trkInfo=AQExgtg9_9rmAQAAAVx-tQL4XBOielaWooxEaw4kQGfXIqAVlPw7IbVWBdg-4ezDWDNXO2cp0GXtaWrXpPlk3S8ZhjlEcvoxf5Jti8CypWckNTc3e85aDADZtFHeDNEVc5LgQ80=&amp;amp;amp;originalReferer=http:\/\/avada.federated.ca\/business-insurance\/automotive-dealers-insurance\/&amp;amp;amp;sessionRedirect=https:\/\/www.linkedin.com\/company\/federated-insurance","https:\/\/www.youtube.com\/channel\/UC2TYZAr9C3puo4Tvg9Q151Q"],"description":"With Federated Insurance, you work directly with an industry expert who is committed to understanding the unique risks and opportunities associated with your business. With a dedicated agent and risk management team on your side, you will always get the right coverage for your company and can focus on what matters most. Trust. Advise. Protect.","email":"info@federated.ca","telephone":"1.844.628.6800","legalName":"Federated Insurance"},{"@type":"Person","@id":"https:\/\/www.federated.ca\/fr\/#\/schema\/person\/d1b1ec52fb6bf9e27c526ee5c665e807","name":"Elizabeth Tela"}]}},"_links":{"self":[{"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/posts\/42510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/comments?post=42510"}],"version-history":[{"count":0,"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/posts\/42510\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/media\/42507"}],"wp:attachment":[{"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/media?parent=42510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/categories?post=42510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.federated.ca\/fr\/wp-json\/wp\/v2\/tags?post=42510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}