{"id":1147,"date":"2011-09-26T23:59:17","date_gmt":"2011-09-26T21:59:17","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1147"},"modified":"2011-09-27T00:00:08","modified_gmt":"2011-09-26T22:00:08","slug":"eviter-les-intrusions-informatiques-en-appliquant-les-regles-de-securite-de-base","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1147","title":{"rendered":"Eviter les intrusions informatiques en appliquant les r\u00e8gles de s\u00e9curit\u00e9 de base"},"content":{"rendered":"<p style=\"text-align: justify;\">Comment les entreprises peuvent-elles se prot\u00e9ger des attaques informatiques ? En commen\u00e7ant par appliquer des r\u00e8gles de base. C&#8217;est ce que rappelle l\u2019article intitul\u00e9 \u00ab 96% des attaques informatiques peuvent \u00eatre \u00e9vit\u00e9es \u00bb publi\u00e9 sur Silicon.fr qui pr\u00e9sente les principales d\u2019entre-elles :<\/p>\n<p style=\"text-align: justify;\">\u2022 Se concentrer sur les contr\u00f4les essentiels,<\/p>\n<p style=\"text-align: justify;\">\u2022 Ne conserver que les donn\u00e9es utiles,<\/p>\n<p style=\"text-align: justify;\">\u2022 S\u00e9curiser les services d\u2019acc\u00e8s \u00e0 distance,<\/p>\n<p style=\"text-align: justify;\">\u2022 Restreindre l\u2019acc\u00e8s aux informations sensibles au sein du r\u00e9seau,<\/p>\n<p style=\"text-align: justify;\">\u2022 Surveiller les comptes des employ\u00e9s ayant les droits les plus larges,<\/p>\n<p style=\"text-align: justify;\">\u2022 V\u00e9rifier r\u00e9guli\u00e8rement les comptes utilisateurs,<\/p>\n<p style=\"text-align: justify;\">\u2022 G\u00e9rer et analyser les logs (fichiers-journaux),<\/p>\n<p style=\"text-align: justify;\">\u2022 Sensibiliser les employ\u00e9s aux m\u00e9thodes d\u2019ing\u00e9nierie sociale et aux diff\u00e9rents vecteurs d\u2019attaques qu\u2019elles repr\u00e9sentent : leur apprendre \u00e0 s\u2019interroger<\/p>\n<p style=\"text-align: justify;\">Lire la suite : <a href=\"http:\/\/www.silicon.fr\/96-des-attaques-informatiques-peuvent-etre-evitees-58580.html\">http:\/\/www.silicon.fr\/96-des-attaques-informatiques-peuvent-etre-evitees-58580.html<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Eviter%20les%20intrusions%20informatiques%20en%20appliquant%20les%20r%C3%A8gles%20de%20s%C3%A9curit%C3%A9%20de%20base\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Comment les entreprises peuvent-elles se prot\u00e9ger des attaques informatiques ? En commen\u00e7ant par appliquer des r\u00e8gles de base. C&#8217;est ce que rappelle l\u2019article intitul\u00e9 \u00ab 96% des attaques informatiques peuvent \u00eatre \u00e9vit\u00e9es \u00bb publi\u00e9 sur Silicon.fr qui pr\u00e9sente les principales d\u2019entre-elles : \u2022 Se concentrer sur les contr\u00f4les essentiels, \u2022 Ne conserver que les donn\u00e9es &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1147\" class=\"more-link\">Continue reading &lsquo;Eviter les intrusions informatiques en appliquant les r\u00e8gles de s\u00e9curit\u00e9 de base&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Eviter%20les%20intrusions%20informatiques%20en%20appliquant%20les%20r%C3%A8gles%20de%20s%C3%A9curit%C3%A9%20de%20base\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[10,4,35,30,33],"tags":[505,481,504,1622,506,502,66,118,137,26,172,503,156,1628,317,1627],"class_list":["post-1147","post","type-post","status-publish","format-standard","hentry","category-controle-interne","category-fraude","category-securite-informatique","category-sites-internet","category-systeme-informatique","tag-acces-a-distance","tag-administrateur","tag-attaque-informatique","tag-controle-interne","tag-informations-sensibles","tag-intrusion","tag-journalisation","tag-piratage","tag-politique-de-securite","tag-prevention-de-la-fraude","tag-recherche-des-exceptions","tag-regles-de-securite","tag-securisation-des-acces","tag-securite-informatique","tag-sensibilisation-des-utilisateurs","tag-systeme-informatique"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1147"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1147\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}