{"id":1119,"date":"2011-09-23T11:41:07","date_gmt":"2011-09-23T09:41:07","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1119"},"modified":"2011-11-11T23:22:51","modified_gmt":"2011-11-11T21:22:51","slug":"lu-sur-silicon-fr-les-conseils-d%e2%80%99administration-au-centre-de-l%e2%80%99insecurite-des-entreprises","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1119","title":{"rendered":"Lu sur Silicon.fr : Les conseils d\u2019administration au centre de l\u2019ins\u00e9curit\u00e9 des entreprises"},"content":{"rendered":"<p style=\"text-align: justify;\">Les communications et traitement de l\u2019information par les membres du conseil repr\u00e9sente un maillon faible dans la cha\u00eene de s\u00e9curit\u00e9 de l\u2019information d\u2019entreprise. Alors que la plupart des soci\u00e9t\u00e9s prennent des mesures extraordinaires pour prot\u00e9ger les informations partag\u00e9es avec les cadres et les employ\u00e9s, les membres du conseil \u2013 souvent des administrateurs externes \u2013 fonctionnent en grande partie en dehors des r\u00e8gles de s\u00e9curit\u00e9 des r\u00e9seaux informatiques.<\/p>\n<p style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Des niveaux de s\u00e9curit\u00e9 insuffisants<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">[\u2026] Les documents de nature confidentielle sont stock\u00e9s sur les PC personnels des d\u00e9tenteurs de jetons de pr\u00e9sence dans 79 % des cas, voire sur les terminaux mobiles (smartphone, tablettes, laptop\u2026) pour 75 % des sond\u00e9s. Bonjour les d\u00e9g\u00e2ts potentiels en cas de perte ou vol. Ce qui arrive dans 10 % des cas.<\/p>\n<p style=\"text-align: justify;\">Et que dire des 73 % de courriels, souvent farcis d\u2019informations strat\u00e9giques ou confidentielles, envoy\u00e9s sur des adresses personnelles ? Qui plus est lorsque les documents en question sont accessibles depuis un r\u00e9seau, wifi ou filaire, non s\u00e9curis\u00e9 dans 71 % des cas? Autant de br\u00e8ches de nature \u00e0 exciter les cyber-criminels comme le miel attire les ours.<\/p>\n<p>Lire l\u2019article complet : <a href=\"http:\/\/www.silicon.fr\/les-conseils-dadministration-au-centre-de-linsecurite-des-entreprises-61367.html\">http:\/\/www.silicon.fr\/les-conseils-dadministration-au-centre-de-linsecurite-des-entreprises-61367.html<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Lu%20sur%20Silicon.fr%20%3A%20Les%20conseils%20d%E2%80%99administration%20au%20centre%20de%20l%E2%80%99ins%C3%A9curit%C3%A9%20des%20entreprises\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Les communications et traitement de l\u2019information par les membres du conseil repr\u00e9sente un maillon faible dans la cha\u00eene de s\u00e9curit\u00e9 de l\u2019information d\u2019entreprise. Alors que la plupart des soci\u00e9t\u00e9s prennent des mesures extraordinaires pour prot\u00e9ger les informations partag\u00e9es avec les cadres et les employ\u00e9s, les membres du conseil \u2013 souvent des administrateurs externes \u2013 fonctionnent &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1119\" class=\"more-link\">Continue reading &lsquo;Lu sur Silicon.fr : Les conseils d\u2019administration au centre de l\u2019ins\u00e9curit\u00e9 des entreprises&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Lu%20sur%20Silicon.fr%20%3A%20Les%20conseils%20d%E2%80%99administration%20au%20centre%20de%20l%E2%80%99ins%C3%A9curit%C3%A9%20des%20entreprises\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[10,36,35,30,33],"tags":[495,155,494,1622,499,493,62,169,99,164,593,500,25,100,118,498,26,1629,1628,497,496,145],"class_list":["post-1119","post","type-post","status-publish","format-standard","hentry","category-controle-interne","category-protection-des-donnees","category-securite-informatique","category-sites-internet","category-systeme-informatique","tag-appareils-nomades","tag-chaine-de-linformation","tag-conseil-dadministration","tag-controle-interne","tag-cybercriminalite","tag-dirigeants","tag-echanges-de-donnees","tag-exception-a-des-regles","tag-faille-de-securite","tag-informatique-decisionnelle","tag-intelligence-daffaires","tag-nomadisme","tag-nouvelles-technologies","tag-perte-de-donnees","tag-piratage","tag-portables","tag-prevention-de-la-fraude","tag-protection-des-donnees","tag-securite-informatique","tag-smartphones","tag-tablettes","tag-vol-de-donnees"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1119"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1119\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}