﻿{"id":1347,"date":"2020-01-03T16:42:26","date_gmt":"2020-01-03T20:42:26","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1347"},"modified":"2020-01-03T16:44:27","modified_gmt":"2020-01-03T20:44:27","slug":"des-resolutions-du-nouvel-an","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/des-resolutions-du-nouvel-an\/","title":{"rendered":"Des r\u00e9solutions du nouvel an"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/01\/new-years-eve-1953253_960_720.jpg\" alt=\"\" class=\"wp-image-1345\" width=\"559\" height=\"372\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/01\/new-years-eve-1953253_960_720.jpg 960w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/01\/new-years-eve-1953253_960_720-300x200.jpg 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/01\/new-years-eve-1953253_960_720-768x511.jpg 768w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/figure><\/div>\n\n\n\n<p style=\"background-color:#5a7510\" class=\"has-text-color has-background has-medium-font-size has-very-light-gray-color\">Pour cette nouvelle ann\u00e9e qui commence voici des r\u00e9solutions \u00e0 prendre et \u00e0 tenir tout au long de l&rsquo;ann\u00e9e.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Utiliser un mot de passe robuste, diff\u00e9rent pour chaque application et le changer fr\u00e9quemment.<\/li><li>Utiliser un r\u00e9seau WIFI s\u00e9curis\u00e9.<\/li><li>Utiliser des privil\u00e8ges administrateurs seulement au besoin.<\/li><li>Utiliser un antivirus et le maintenir \u00e0 jour.<\/li><li>Installer les mises \u00e0 jour de s\u00e9curit\u00e9.<\/li><li>Activer le pare-feu sur mon poste de travail.<\/li><li>Supprimer l\u2019historique de ma navigation sur Internet. <\/li><li>Supprimer les courriels douteux.<\/li><li>Respecter les configurations s\u00e9curitaires mises en place par le Service des technologies de l\u2019information sur mon poste de travail.<\/li><li>D\u00e9clarer les incidents de s\u00e9curit\u00e9.<\/li><\/ul>\n\n\n\n<p style=\"background-color:#5a7410;font-size:28px;text-align:center\" class=\"has-text-color has-background has-very-light-gray-color\">Bonne et heureuse ann\u00e9e 2020 !<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour cette nouvelle ann\u00e9e qui commence voici des r\u00e9solutions \u00e0 prendre et \u00e0 tenir tout au long de l&rsquo;ann\u00e9e. Utiliser un mot de passe robuste, diff\u00e9rent pour chaque application et le changer fr\u00e9quemment. Utiliser un r\u00e9seau WIFI s\u00e9curis\u00e9. Utiliser des privil\u00e8ges administrateurs seulement au besoin. Utiliser un antivirus et le maintenir \u00e0 jour. Installer les [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-calendrier"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1347"}],"version-history":[{"count":4,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1347\/revisions"}],"predecessor-version":[{"id":1352,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1347\/revisions\/1352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/1345"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}