﻿{"id":158,"date":"2018-10-29T18:43:31","date_gmt":"2018-10-29T17:43:31","guid":{"rendered":"http:\/\/www.uqac.ca\/cybersecurite\/?p=158"},"modified":"2019-01-08T16:09:11","modified_gmt":"2019-01-08T15:09:11","slug":"lavenir-de-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/lavenir-de-la-cybersecurite\/","title":{"rendered":"L&rsquo;avenir de la cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>L\u2019avenir de la cybers\u00e9curit\u00e9 de l\u2019UQAC est en d\u00e9veloppement, des pas sont franchis avec la mise en place de la politique de s\u00e9curit\u00e9, son cadre de gestion, un comit\u00e9 de s\u00e9curit\u00e9 de l\u2019information et des activit\u00e9s de sensibilisation, comme celles de ce mois-ci qui tire \u00e0 sa fin.<br \/>\nLa cybers\u00e9curit\u00e9 c\u2019est un ensemble de mesures, de pratiques, d\u2019outils, d\u2019instance, mais par-dessus tout, une maturit\u00e9 de la culture de la communaut\u00e9 universitaire.<br \/>\nN\u2019oubliez pas que votre r\u00f4le est important pour assurer la continuit\u00e9 de la mission d\u2019enseignement, de recherche et cr\u00e9ation et de soutien.<\/p>\n<p>\u2022 Respectez la politique de s\u00e9curit\u00e9 de l\u2019information ;<br \/>\n\u2022 D\u00e9clarez rapidement les incidents de s\u00e9curit\u00e9 \u00e0 support_sti@uqac.ca ;<br \/>\n\u2022 Utilisez les meilleures pratiques dans votre environnement de travail ;<br \/>\n\u2022 Si vous avez des commentaires ou suggestions, n\u2019h\u00e9sitez pas \u00e0 nous contacter securitesti@uqac.ca<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019avenir de la cybers\u00e9curit\u00e9 de l\u2019UQAC est en d\u00e9veloppement, des pas sont franchis avec la mise en place de la politique de s\u00e9curit\u00e9, son cadre de gestion, un comit\u00e9 de s\u00e9curit\u00e9 de l\u2019information et des activit\u00e9s de sensibilisation, comme celles de ce mois-ci qui tire \u00e0 sa fin. La cybers\u00e9curit\u00e9 c\u2019est un ensemble de mesures, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-158","post","type-post","status-publish","format-standard","hentry","category-actualite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=158"}],"version-history":[{"count":1,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/158\/revisions"}],"predecessor-version":[{"id":159,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/158\/revisions\/159"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}