{"id":3676,"date":"2023-03-30T15:39:21","date_gmt":"2023-03-30T19:39:21","guid":{"rendered":"https:\/\/www.indigoconsulting.ca\/?p=3676"},"modified":"2023-03-30T15:46:15","modified_gmt":"2023-03-30T19:46:15","slug":"les-3-principales-menaces-de-la-cybersecurite-en-2021","status":"publish","type":"post","link":"https:\/\/www.indigoconsulting.ca\/fr\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/","title":{"rendered":"Les 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3676\" class=\"elementor elementor-3676\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2549b3a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2549b3a1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46f3ac69\" data-id=\"46f3ac69\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ad4fbef elementor-widget elementor-widget-text-editor\" data-id=\"2ad4fbef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-843\" src=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog-1024x683.jpg\" alt=\"\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog-1024x683.jpg 1024w, https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog-300x200.jpg 300w, https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog-768x512.jpg 768w, https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg 1500w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/span><\/p><p class=\"p1\">Le paysage des menaces est en constante \u00e9volution en mati\u00e8re de cybers\u00e9curit\u00e9, il faut constamment \u00eatre conscient des vuln\u00e9rabilit\u00e9s nouvelles et \u00e9mergentes et des vecteurs d&#8217;attaque que les mauvais acteurs utilisent. Dans ce post, nous allons couvrir nos trois principales menaces qui affectent actuellement les industries.<\/p><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><h2><span style=\"; color: #003a5d;\">Vol d\u2019identit\u00e9<\/span><\/h2><p class=\"p1\">Le vol d&#8217;identit\u00e9 demeure une menace majeure en raison de la facilit\u00e9 et du caract\u00e8re lucratif de ces attaques. Comme d&#8217;habitude, les gens doivent faire attention \u00e0 ce qu&#8217;ils partagent et \u00e0 l&#8217;endroit o\u00f9 ils le font ; vous devez toujours valider une demande inhabituelle faite \u00e0 cette personne en utilisant un canal s\u00e9curis\u00e9 et v\u00e9rifiable (par exemple, appelez-la directement !); m\u00e9fiez-vous de tous les types d&#8217;attaques de phishing, car certaines peuvent \u00eatre tr\u00e8s sophistiqu\u00e9es et cibl\u00e9es sur un groupe ou une personne tr\u00e8s sp\u00e9cifique.<\/p><p class=\"p1\">L&#8217;authentification forte \u00e0 l&#8217;aide d&#8217;une solution d&#8217;authentification multifactorielle (AMF), <a href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63-3.html\"><span class=\"s1\">telle que sugg\u00e9r\u00e9e dans le document NIST SP800-63-3<\/span><\/a>,\u00a0permet de r\u00e9duire l&#8217;impact du vol de mots de passe et devrait toujours faire partie d&#8217;une architecture robuste de gestion des identit\u00e9s et des acc\u00e8s.<\/p><h2><span style=\"; color: #003a5d;\">Ransomware<\/span><\/h2><p class=\"p1\">C&#8217;est un classique. Cependant, ces derniers temps, les pirates ont chang\u00e9 de tactique, passant de l&#8217;infection de masses de machines \u00e0 des attaques cibl\u00e9es sur de grandes entreprises. Par exemple, il y a eu <a href=\"https:\/\/www.engadget.com\/cd-projekt-red-data-breach-online-114047285.html\"><span class=\"s1\">la ran\u00e7on de CD Projekt Red<\/span><\/a> o\u00f9 leur code source <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cd-projekts-stolen-source-code-allegedly-sold-by-ransomware-gang\/\"><span class=\"s1\">aurait \u00e9t\u00e9 vendu pour 1 \u00e0 7 millions de dollars<\/span><\/a>; la <a href=\"https:\/\/www.cbc.ca\/news\/canada\/montreal\/stm-refused-to-pay-2-8-million-ransomware-attack-1.5782838\"><span class=\"s1\">STM a refus\u00e9 de payer une ran\u00e7on de 2,8 millions de dollars<\/span><\/a> pour d\u00e9bloquer tous ses serveurs ; <a href=\"https:\/\/www.wsj.com\/articles\/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636\"><span class=\"s1\">Colonial Pipeline a pay\u00e9 une ran\u00e7on de 4,4 millions de dollars<\/span><\/a> pour restaurer ses serveurs ; et bien d&#8217;autres. Ces montants sont bien loin des centaines de dollars demand\u00e9s \u00e0 l&#8217;origine par les masses. M\u00eame si la ran\u00e7on n&#8217;est pas pay\u00e9e, les co\u00fbts de r\u00e9cup\u00e9ration et de perte d&#8217;activit\u00e9 s&#8217;\u00e9l\u00e8vent \u00e0 des sommes consid\u00e9rables.<\/p><p class=\"p1\">Assurez-vous que vos points d\u2019extr\u00e9mit\u00e9s et vos serveurs sont s\u00e9curis\u00e9s et prot\u00e9g\u00e9s par des correctifs, disposez d&#8217;un syst\u00e8me de d\u00e9tection des intrusions et formez vos utilisateurs finaux \u00e0 la d\u00e9tection des courriels frauduleux (les pirates ont p\u00e9n\u00e9tr\u00e9 dans le syst\u00e8me du CDPR gr\u00e2ce \u00e0 un utilisateur final qui a cliqu\u00e9 sur un lien malveillant dans un courriel).<\/p><h2><span style=\"; color: #003a5d;\">Attaques de la cha\u00eene d&#8217;approvisionnement<\/span><\/h2><p class=\"p1\">Les attaques de la cha\u00eene d&#8217;approvisionnement sont g\u00e9n\u00e9ralement associ\u00e9es \u00e0 des \u00ab\u00a0\u00e9l\u00e9ments physiques\u00a0\u00bb comme les puces et les micrologiciels, mais avez-vous pens\u00e9 \u00e0 la cha\u00eene d&#8217;approvisionnement de votre code ? C&#8217;est <a href=\"https:\/\/orangematter.solarwinds.com\/2021\/01\/11\/new-findings-from-our-investigation-of-sunburst\/\"><span class=\"s1\">ainsi qu&#8217;est n\u00e9 le piratage de SolarWinds<\/span><\/a>; des pirates ont pu <a href=\"https:\/\/krebsonsecurity.com\/2021\/01\/solarwinds-what-hit-us-could-hit-others\/\"><span class=\"s1\">injecter du code malveillant dans leur cha\u00eene de d\u00e9veloppement de code<\/span><\/a> \u00e0 l&#8217;aide d&#8217;un logiciel malveillant personnalis\u00e9 afin d&#8217;\u00e9viter toute d\u00e9tection. Ce malware a atteint 18 000 de ses clients, dont le gouvernement f\u00e9d\u00e9ral am\u00e9ricain et des entreprises figurant au palmar\u00e8s Fortune 500 !<\/p><p class=\"p1\">Assurez-vous que l&#8217;acc\u00e8s \u00e0 votre code est s\u00e9curis\u00e9, que les points d&#8217;extr\u00e9mit\u00e9 sont s\u00e9curis\u00e9s afin que les pirates ne puissent pas prendre pied dans votre r\u00e9seau. En outre, ne stockez jamais de secrets dans des d\u00e9p\u00f4ts de code, gardez-les dans un coffre-fort s\u00e9curis\u00e9 comme Hashicorp.<\/p><p class=\"p1\">Soyez prudents !<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Le paysage des menaces est en constante \u00e9volution en mati\u00e8re de cybers\u00e9curit\u00e9, il faut constamment \u00eatre conscient des vuln\u00e9rabilit\u00e9s nouvelles et \u00e9mergentes et des vecteurs d&#8217;attaque que les mauvais acteurs utilisent. Dans ce post, nous allons couvrir nos trois principales menaces qui affectent actuellement les industries. Vol d\u2019identit\u00e9 Le vol d&#8217;identit\u00e9 demeure une menace majeure [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[125],"tags":[],"class_list":["post-3676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-french-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The 3 Biggest Cybersecurity Threats of 2021 | Indigo ConsultingLes 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021<\/title>\n<meta name=\"description\" content=\"In cybersecurity, a little knowledge goes a long way. With that in mind, we&#039;ll go over how to defend against the biggest security risks of the year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.indigoconsulting.ca\/fr\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021\" \/>\n<meta property=\"og:description\" content=\"In cybersecurity, a little knowledge goes a long way. With that in mind, we&#039;ll go over how to defend against the biggest security risks of the year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.indigoconsulting.ca\/fr\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"Indigo Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-30T19:39:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-30T19:46:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The 3 Biggest Cybersecurity Threats of 2021 | Indigo ConsultingLes 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021","description":"In cybersecurity, a little knowledge goes a long way. With that in mind, we'll go over how to defend against the biggest security risks of the year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.indigoconsulting.ca\/fr\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/","og_locale":"fr_CA","og_type":"article","og_title":"Les 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021","og_description":"In cybersecurity, a little knowledge goes a long way. With that in mind, we'll go over how to defend against the biggest security risks of the year.","og_url":"https:\/\/www.indigoconsulting.ca\/fr\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/","og_site_name":"Indigo Consulting","article_published_time":"2023-03-30T19:39:21+00:00","article_modified_time":"2023-03-30T19:46:15+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg","type":"image\/jpeg"}],"author":"Sam","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sam","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#article","isPartOf":{"@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/"},"author":{"name":"Sam","@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/person\/cf952c04cd174fc8a6149d0acf0dd8fe"},"headline":"Les 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021","datePublished":"2023-03-30T19:39:21+00:00","dateModified":"2023-03-30T19:46:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/"},"wordCount":581,"publisher":{"@id":"https:\/\/www.indigoconsulting.ca\/#organization"},"image":{"@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg","articleSection":["French Blog"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/","url":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/","name":"The 3 Biggest Cybersecurity Threats of 2021 | Indigo ConsultingLes 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021","isPartOf":{"@id":"https:\/\/www.indigoconsulting.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg","datePublished":"2023-03-30T19:39:21+00:00","dateModified":"2023-03-30T19:46:15+00:00","description":"In cybersecurity, a little knowledge goes a long way. With that in mind, we'll go over how to defend against the biggest security risks of the year.","breadcrumb":{"@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#primaryimage","url":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg","contentUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2021\/06\/Indigo-Cybersecurity-Blog.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.indigoconsulting.ca\/french-blog\/les-3-principales-menaces-de-la-cybersecurite-en-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.indigoconsulting.ca\/"},{"@type":"ListItem","position":2,"name":"Les 3 principales menaces de la cybers\u00e9curit\u00e9 en 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.indigoconsulting.ca\/#website","url":"https:\/\/www.indigoconsulting.ca\/","name":"Indigo Consulting","description":"A Leading IAM, Compliance, &amp; IT Consultant","publisher":{"@id":"https:\/\/www.indigoconsulting.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.indigoconsulting.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.indigoconsulting.ca\/#organization","name":"Indigo Consulting","url":"https:\/\/www.indigoconsulting.ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2020\/03\/logo_indigo.png","contentUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2020\/03\/logo_indigo.png","width":363,"height":109,"caption":"Indigo Consulting"},"image":{"@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/indigo-technologies-canada-inc.\/"]},{"@type":"Person","@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/person\/cf952c04cd174fc8a6149d0acf0dd8fe","name":"Sam","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/eb87e724a72801ada273ef7f1093da58a95dbf03dde6e02b356860341ee1c737?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eb87e724a72801ada273ef7f1093da58a95dbf03dde6e02b356860341ee1c737?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb87e724a72801ada273ef7f1093da58a95dbf03dde6e02b356860341ee1c737?s=96&d=mm&r=g","caption":"Sam"},"url":"https:\/\/www.indigoconsulting.ca\/fr\/author\/sambradley\/"}]}},"_links":{"self":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/posts\/3676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/comments?post=3676"}],"version-history":[{"count":0,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/posts\/3676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/media\/843"}],"wp:attachment":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/media?parent=3676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/categories?post=3676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/tags?post=3676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}