{"id":13054,"date":"2013-07-01T22:00:00","date_gmt":"2013-07-01T20:00:00","guid":{"rendered":"http:\/\/51.210.246.10\/blog\/securite-des-donnees-les-10-points-cles-verifier-pour\/"},"modified":"2024-07-19T14:50:49","modified_gmt":"2024-07-19T12:50:49","slug":"securite-des-donnees-les-10-points-cles-verifier-pour","status":"publish","type":"post","link":"https:\/\/continew.fr\/en\/blog\/securite-des-donnees-les-10-points-cles-verifier-pour\/","title":{"rendered":"S\u00e9curit\u00e9 des donn\u00e9es : les 10 points cl\u00e9s \u00e0 v\u00e9rifier pour &#8230;"},"content":{"rendered":"<h2>S\u00e9curit\u00e9 des donn\u00e9es : les 10 points cl\u00e9s \u00e0 v\u00e9rifier pour passer un bon \u00e9t\u00e9<\/h2>\n<p>En 2013, la grande majorit\u00e9 des entreprises et des collectivit\u00e9s poss\u00e8dent, utilisent et g\u00e9n\u00e8rent des actifs num\u00e9riques. Agendas, e-mails, donn\u00e9es comptables, donn\u00e9es commerciales (CRM), site internet, logiciel sp\u00e9cifique constituent autant d\u2019\u00e9l\u00e9ments cl\u00e9s pour le bon fonctionnement de l\u2019entreprise.<\/p>\n<p>G\u00e9rer une situation de crise li\u00e9e \u00e0 leur perte ou \u00e0 une d\u00e9faillance permet de r\u00e9duire les risques, le stress et les co\u00fbts de r\u00e9cup\u00e9ration des donn\u00e9es et offre la possibilit\u00e9 de reprendre l\u2019activit\u00e9 rapidement.<\/p>\n<p>CONTINEW, sp\u00e9cialiste de la<strong> continuit\u00e9<\/strong> et de la <strong>s\u00e9curit\u00e9 des donn\u00e9es num\u00e9riques<\/strong> animera une session de l\u2019Arsenal Num\u00e9rique, le collectif des experts du Num\u00e9rique de la Loire, jeudi 4 juillet prochain.<\/p>\n<p>Au programme :<strong> les 10 questions indispensables \u00e0 se poser sur ses donn\u00e9es pour passer un bon \u00e9t\u00e9<\/strong>.<\/p>\n<p>Les sessions de l\u2019Arsenal Num\u00e9rique sont ouvertes aux professionnels de tout secteur.<\/p>\n<p>Il reste encore des places ! Inscrivez-vous d\u00e8s maintenant sur le site <a href=\"http:\/\/arsenal-numerique.org\" target=\"_blank\" rel=\"noopener\">arsenal-numerique.org<\/a> ou <a href=\"\/en\/contact\/\">contactez-nous<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>G&eacute;rer une situation de crise li&eacute;e &agrave; la perte de ses donn&eacute;es permet de r&eacute;duire les risques, le stress et les co&ucirc;ts&#8230;<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-13054","post","type-post","status-publish","format-standard","hentry","category-cybersecurite"],"featured_image_src":{"landsacpe":false,"list":false,"medium":false,"full":false},"_links":{"self":[{"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/posts\/13054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/comments?post=13054"}],"version-history":[{"count":2,"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/posts\/13054\/revisions"}],"predecessor-version":[{"id":14645,"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/posts\/13054\/revisions\/14645"}],"wp:attachment":[{"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/media?parent=13054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/categories?post=13054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/continew.fr\/en\/wp-json\/wp\/v2\/tags?post=13054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}