{"id":1,"date":"2024-10-29T09:10:33","date_gmt":"2024-10-29T09:10:33","guid":{"rendered":"https:\/\/wordpress-test.innlog.fr\/?p=1"},"modified":"2025-01-27T14:52:37","modified_gmt":"2025-01-27T14:52:37","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/wordpress-test.innlog.fr\/?p=1","title":{"rendered":"R\u00e9agir face aux cyber attaques"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/wordpress-test.innlog.fr\/wp-content\/uploads\/2024\/11\/Home-_-Innlog-2.svg\u00a0\u00bb background_size=\u00a0\u00bbcontain\u00a0\u00bb background_position=\u00a0\u00bbtop_center\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb||2px|||\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb\u00a0\u00bb custom_padding_phone=\u00a0\u00bb||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb|700|||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#042a1a\u00a0\u00bb text_font_size=\u00a0\u00bb48px\u00a0\u00bb header_font=\u00a0\u00bb|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#041a1a\u00a0\u00bb header_font_size=\u00a0\u00bb35px\u00a0\u00bb header_line_height=\u00a0\u00bb1.2em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||3px||false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb35px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb20px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1 class=\"entry-title\">R\u00e9agir face aux cyber attaques<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb|300|||||||\u00a0\u00bb text_font_size=\u00a0\u00bb24px\u00a0\u00bb text_line_height=\u00a0\u00bb1.6em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb|0px||0px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|0px||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|0px||0px|false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb custom_padding=\u00a0\u00bb|0px||0px|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|0px||0px|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|0px||0px|false|false\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; text_font_size_tablet=\u00a0\u00bb24px\u00a0\u00bb text_font_size_phone=\u00a0\u00bb15px\u00a0\u00bb text_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<p><span>La recrudescence des cyber-attaques observ\u00e9e en 2020 n\u2019\u00e9pargne pas le secteur de la logistique, qui doit faire face \u00e0 de nombreux d\u00e9fis li\u00e9s \u00e0 la cyber-s\u00e9curit\u00e9. La logistique, avec l\u2019interconnexion de ses multiples acteurs, repr\u00e9sente de facto une cible de choix pour les hackers et peut \u00e0 ce titre subir de graves dommages sur son activit\u00e9 \u00e0 moyen et long terme. Ralentissement voire arr\u00eat de la production, retard de livraison ou encore perte nette de chiffres d\u2019affaires, l\u2019impact d\u2019une cyber-attaque sur la cha\u00eene logistique vient ainsi parfois toucher le c\u0153ur de l\u2019activit\u00e9 de l\u2019entreprise.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb2_5,3_5&Prime; custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb5px||0px||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb2_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/wordpress-test.innlog.fr\/wp-content\/uploads\/2024\/11\/Design-sans-titre-92.png\u00a0\u00bb alt=\u00a0\u00bbE-commerce\u00a0\u00bb title_text=\u00a0\u00bbE-commerce\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb align_tablet=\u00a0\u00bbcenter\u00a0\u00bb align_phone=\u00a0\u00bbcenter\u00a0\u00bb align_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_height=\u00a0\u00bb436px\u00a0\u00bb custom_padding=\u00a0\u00bb27px|||||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; border_radii=\u00a0\u00bbon|20px|20px|20px|20px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb3_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_2_line_height=\u00a0\u00bb1.5em\u00a0\u00bb custom_padding=\u00a0\u00bb42px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb text_font_size_tablet=\u00a0\u00bb\u00a0\u00bb text_font_size_phone=\u00a0\u00bb\u00a0\u00bb text_font_size_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb text_orientation_tablet=\u00a0\u00bbleft\u00a0\u00bb text_orientation_phone=\u00a0\u00bbleft\u00a0\u00bb text_orientation_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2 class=\"wp-block-heading\">Par quelles failles les cyber-attaques s\u2019immiscent-elles ?<\/h2>\n<p>Les syst\u00e8mes informatiques de la supply-chain fonctionnent aujourd\u2019hui au sein de syst\u00e8me ouverts, faisant cohabiter diff\u00e9rentes g\u00e9n\u00e9rations de logiciels, aux normes de s\u00e9curit\u00e9 plus ou moins harmonis\u00e9es. Or, les syst\u00e8mes informatiques industriels g\u00e8rent des automates de plus en plus connect\u00e9s qui utilisent dor\u00e9navant les m\u00eames r\u00e9seaux que l\u2019informatique bureautique de l\u2019entreprise, facilitant ainsi l\u2019acc\u00e8s \u00e0 internet que n\u00e9cessite ces nouvelles technologies. L\u2019interconnexion entre les diff\u00e9rents syst\u00e8mes informatiques de l\u2019entreprise, initialement v\u00e9ritable levier de performance, devient le cheval de Troie de ces attaques informatiques.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=\u00a0\u00bbPRENDRE RENDEZ-VOUS\u00a0\u00bb button_alignment=\u00a0\u00bbleft\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#042a1a\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb30px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb button_icon=\u00a0\u00bb&#xf2a0;||fa||900&Prime; button_icon_placement=\u00a0\u00bbleft\u00a0\u00bb button_on_hover=\u00a0\u00bboff\u00a0\u00bb custom_padding=\u00a0\u00bb15px|25px|15px|50px|false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb button_bg_color__hover_enabled=\u00a0\u00bbon|hover\u00a0\u00bb button_bg_color__hover=\u00a0\u00bb#0b5a36&Prime; button_bg_enable_color__hover=\u00a0\u00bbon\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les ran\u00e7ongiciels ou ransomware repr\u00e9sentent les attaques les plus fr\u00e9quentes depuis quelques ann\u00e9es\u00a0avec une nette recrudescence en 2020, due \u00e0 la crise sanitaire et aux conditions de travail particuli\u00e8res, ces derni\u00e8res ayant mis \u00e0 mal la s\u00e9curit\u00e9 informatique de nombre d\u2019organisations. Ces attaques consistent \u00e0 chiffrer l\u2019ensemble des donn\u00e9es de la victime et demander ensuite une ran\u00e7on en \u00e9change du mot de passe cens\u00e9 d\u00e9bloquer l\u2019acc\u00e8s auxdites informations. Dans les faits, les donn\u00e9es ne sont que rarement restitu\u00e9es.<\/p>\n<h2 class=\"wp-block-heading\">Comment r\u00e9agir ?<\/h2>\n<p>Comme toute crise, la cybers\u00e9curit\u00e9 repose sur deux piliers\u00a0: la pr\u00e9paration et la r\u00e9activit\u00e9. Tout d\u2019abord, il est important d\u2019effectuer des audits r\u00e9guliers de son syst\u00e8me informatique. En parall\u00e8le, la v\u00e9rification des failles de s\u00e9curit\u00e9 de ses logiciels aupr\u00e8s des \u00e9diteurs concern\u00e9s s\u2019av\u00e8re une \u00e9tape cl\u00e9\u00a0: un grand nombre de cyberattaque s\u2019infiltrent en amont d\u00e8s la conception des logiciels. Outre la n\u00e9cessit\u00e9 de se doter d\u2019outils cl\u00e9s afin de parer des cyber-attaques de plus en plus sophistiqu\u00e9es, il s\u2019av\u00e8re n\u00e9cessaire de r\u00e9aliser r\u00e9guli\u00e8rement des exercices de crise\u00a0: v\u00e9ritables simulations de cyberattaques, ces derni\u00e8res permettent d\u2019am\u00e9liorer la r\u00e9activit\u00e9, cl\u00e9 de r\u00e9silience lors des tentatives de malveillance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/wordpress-test.innlog.fr\/wp-content\/uploads\/2024\/11\/Frame-2608651.svg\u00a0\u00bb custom_margin=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||0px||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_3_font=\u00a0\u00bbInter||||||||\u00a0\u00bb header_3_font_size=\u00a0\u00bb30px\u00a0\u00bb custom_margin=\u00a0\u00bb|||-159px||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb custom_padding=\u00a0\u00bb|||0px||\u00a0\u00bb header_3_font_size_tablet=\u00a0\u00bb30px\u00a0\u00bb header_3_font_size_phone=\u00a0\u00bb24px\u00a0\u00bb header_3_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_3_line_height_tablet=\u00a0\u00bb\u00a0\u00bb header_3_line_height_phone=\u00a0\u00bb1.3em\u00a0\u00bb header_3_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3>Pr\u00eat \u00e0 s\u00e9curiser votre entrep\u00f4t ?<\/h3>\n<p>[\/et_pb_text][et_pb_button button_text=\u00a0\u00bbCONTACTEZ-NOUS\u00a0\u00bb button_alignment=\u00a0\u00bbleft\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_text_color=\u00a0\u00bb#042a1a\u00a0\u00bb button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb1px\u00a0\u00bb button_border_radius=\u00a0\u00bb30px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb button_icon=\u00a0\u00bb&#xf2a0;||fa||900&Prime; button_icon_placement=\u00a0\u00bbleft\u00a0\u00bb button_on_hover=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb|||-159px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb custom_padding=\u00a0\u00bb15px|25px|15px|50px|false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb button_bg_color__hover_enabled=\u00a0\u00bbon|hover\u00a0\u00bb button_bg_color__hover=\u00a0\u00bb#0b5a36&Prime; button_bg_enable_color__hover=\u00a0\u00bbon\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>R\u00e9agir face aux cyber attaquesLa recrudescence des cyber-attaques observ\u00e9e en 2020 n\u2019\u00e9pargne pas le secteur de la logistique, qui doit faire face \u00e0 de nombreux d\u00e9fis li\u00e9s \u00e0 la cyber-s\u00e9curit\u00e9. La logistique, avec l\u2019interconnexion de ses multiples acteurs, repr\u00e9sente de facto une cible de choix pour les hackers et peut \u00e0 ce titre subir de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":839,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>Welcome to WordPress. This is your first post. Edit or delete it, then start writing!<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"2880","inline_featured_image":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-innovation"],"_links":{"self":[{"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":7,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":1019,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/1019"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=\/wp\/v2\/media\/839"}],"wp:attachment":[{"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress-test.innlog.fr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}